VNX Cli
VNX Cli
VNX Cli
Version 1.0
Copyright 2012 EMC Corporation. All rights reserved.CLI Version 1.5.2.1 Published January, 2012 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date regulatory document for your product line, go to the Technical Documentation and Advisories section on EMC Powerlink. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners.
Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Storage types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Use Unisphere CLI in scripts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Set up the Unisphere CLI client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Install the Unisphere CLI client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Launch the Unisphere CLI client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Certificate verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Unisphere CLI syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Executable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Object qualifiers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Actions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Action qualifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Size qualifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Action commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 The create action command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 The set action command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 The show action command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 The delete action command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Get help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Help on the Unisphere CLI client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Help on parent object types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Help on child object types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Help on actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Chapter 2
Use Switches
View the switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Access the system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Upload an upgrade candidate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Hide header information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
VNXe Unisphere CLI User Guide 3
Contents
Manage SSL certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure a certificate policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Clear all certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Import certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Save Unisphere CLI settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
32 32 32 33 33 33 34
Chapter 3
Configure general system settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View system settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change general system settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manually fail back storage servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Perform a system health check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure system information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View system information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change system information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage security settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage system time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View system time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change system time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage support configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View support configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change support configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage support credentials. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View support credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change support credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete support credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage support contracts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View support contracts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View user roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View user accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change user accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View installed feature licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View and accept the End User License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View the EULA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Accept the EULA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage ESRS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View ESRS configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change ESRS configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage Unisphere Remote Management/Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create the remote manager configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage remote logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View settings for remote logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure settings for remote logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View system software versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Upgrade the system software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents
Create upgrade sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View upgrade sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage snapshot protection schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View protection schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete protection schedules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage task rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create task rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View task rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete task rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
69 70 71 71 72 73 73 77 78
Chapter 4
Manage Shared Folder Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Create Shared Folder Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 View Shared Folder Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Change Shared Folder Server settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Delete Shared Folder Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Manage reverse CHAP for mutual CHAP authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 View reverse CHAP secret settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Specify the reverse CHAP secret password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Disable the reverse CHAP secret password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Set up iSNS for iSCSI storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Create iSNS server records. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 View iSNS server records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Delete iSNS server records. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Manage iSCSI configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 View iSCSI configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Change iSCSI configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Manage iSCSI nodes (servers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Create iSCSI nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 View iSCSI nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Change iSCSI node settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Delete iSCSI nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Manage Network ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 View port settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Change port settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Manage network interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Create interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 View interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Change interface settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Delete interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Manage static IP routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Create IP routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 View IP routes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Delete IP routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Manage link aggregations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Create link aggregations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 View link aggregations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Change link aggregations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Delete link aggregations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Manage DNS settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Create DNS server domains. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 View DNS server domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Delete DNS server domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Contents
Designate default DNS addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View default DNS addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage NTP server settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create an NTP server record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View NTP server settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete NTP server settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage NIS server domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create NIS server domains. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View NIS server domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change NIS server domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete NIS server domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage SMTP server settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View SMTP server settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure SMTP server settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage NDMP server settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View NDMP server settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure NDMP server settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage LDAP settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure LDAP settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View LDAP settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change LDAP settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Verify LDAP settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete LDAP settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage Advanced storage access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View Advanced storage access settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change Advanced storage access settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
113 113 115 115 116 117 118 118 118 119 120 121 121 122 123 123 123 125 126 128 129 130 131 132 132 132
Chapter 5
Manage host configurations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create host configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View host configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change host configuration settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete host configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage iSCSI initiators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create iSCSI initiators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View iSCSI initiators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete iSCSI initiators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage iSCSI CHAP accounts for one-way CHAP authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . Create iSCSI CHAP accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View iSCSI CHAP accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change iSCSI CHAP account settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete iSCSI CHAP accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage remote storage systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create remote system configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Verify settings for remote storage systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View settings for remote storage systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change settings for remote storage systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete remote system configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 6
Manage Environment
Manage Storage Processor (SP) environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 View Storage Processor environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Contents
Manage disk environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View disk environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage battery environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View battery environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage power supply environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View power supply environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage link control card (LCC) environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View link control card environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage SSD environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View SSD environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage disk array enclosure (DAE) environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View disk array enclosure environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage disk processor enclosure (DPE) environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View disk processor enclosure environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage memory module environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View memory module environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage IO module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View memory module environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage cache card environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View cache card module environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage I/O modules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Commit I/O modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View I/O modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
158 158 160 160 161 161 162 162 163 163 164 164 165 165 166 166 167 167 169 169 170 170 171
Chapter 7
Manage Storage
174 174 175 176 177 178 179 180 181 182 183 185 185 187 187 189 191 192 195 197 198 199 200 200 200 201 201 204
Configure storage pools automatically. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Initiate automatic storage pool configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View configuration settings for automatic storage pool creation . . . . . . . . . . . . . . . . . . . . . . . . Configure custom storage pools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure storage pools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View storage pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change storage pool settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add disks to storage pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Recycle unused disks from storage pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View storage profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View recommended storage profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage disk groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View disk groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add spares to disk groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View recommended disk group configurations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View local storage pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View supported storage resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage shared folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create shared folders. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View shared folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change shared folder settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete shared folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage CIFS settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View CIFS settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change CIFS settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage NFS network shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create NFS network shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View NFS share settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents
Change NFS share settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Delete NFS network shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Manage CIFS network shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Create CIFS network shares. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 View CIFS network shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Change CIFS share settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 Delete CIFS network shares. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Manage generic iSCSI storage resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 Create iSCSI storage resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 View iSCSI storage resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 Change iSCSI storage resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 Delete iSCSI storage resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Manage iSCSI virtual disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 Create virtual disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 View virtual disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 Change virtual disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Delete virtual disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Manage VMware NFS datastores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Create NFS datastores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 View NFS datastores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Change NFS datastore settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Delete NFS datastores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Manage VMware VMFS datastores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Create VMware VMFS datastores. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 View VMware VMFS datastores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Change VMware VMFS datastore settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Delete VMware VMFS datastores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 MS Exchange 2007 resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 View Exchange 2007 resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 MS Exchange 2010 resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 View Exchange 2010 resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 MS Exchange 2007 storage group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 View Exchange 2007 storage groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .MS Exchange 2010 storage group 244 View Exchange 2010 storage groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 MS Exchange 2007 virtual disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 View Exchange 2007 virtual disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 MS Exchange 2010 virtual disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 View Exchange 2010 virtual disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Hyper-V resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Create a Hyper-V resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 Object qualifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 View Hyper-V resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 Change Hyper-V resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Delete Hyper-V resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Manage data deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 View deduplication settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 Configure deduplication settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Force a rescan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Chapter 8
Protect Data
Contents
View snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Promote snapshots to hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Demote snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restore storage resources to snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage replication sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create replication sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View replication sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change replication session settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manually synchronize replication sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete replication sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Switch over replication sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fail over replication sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fail back replication sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Update replication sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manage Common Anti Virus Agent (CAVA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View CAVA settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change replication session settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
264 265 266 266 267 269 272 274 274 275 276 276 277 278 279 280 280 280
Chapter 9
View event logs and alerts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View event records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View alert history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure alert settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View alert settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure alert settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure SNMP destinations for alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create SNMP destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View SNMP destinations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change SNMP destination settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete SNMP destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Appendix A
Reference
Storage resource size limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Unisphere CLI encoding information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
Index
Contents
10
Preface
As part of an effort to improve and enhance the performance and capabilities of its product line, EMC periodically releases revisions of its hardware and software. Therefore, some functions described in this document may not be supported by all versions of the software or hardware currently in use. For the most up-to-date information on product features, refer to your product release notes. If a product does not function properly or does not function as described in this document, please contact your EMC representative.
Audience
This document is part of the EMC VNXe documentation set, and is intended for EMC service personnel and/or advanced users who have experience working with a command line interface (CLI). Audience should be familiar with the following topics:
Using a CLI Storage provisioning and management Network management and security Data protection
Related documentation
Related documents include:
EMC Unisphere online help Using an EMC VNXe System with Generic iSCSI Storage Using an EMC VNXe System with CIFS Shared Folders Using an EMC VNXe System with NFS Shared Folders Using an EMC VNXe system with NFS Datastores Using an EMC VNXe system with VMFS Datastores
Preface CAUTION
A caution contains information essential to avoid data loss or damage to the system or equipment.
IMPORTANT
An important notice contains information essential to operation of the software. Typographical conventions EMC uses the following type style conventions in this document: Normal
Used in running (nonprocedural) text for: Names of interface elements (such as names of windows, dialog boxes, buttons, fields, and menus) Names of resources, attributes, pools, Boolean expressions, buttons, DQL statements, keywords, clauses, environment variables, functions, utilities URLs, pathnames, filenames, directory names, computer names, filenames, links, groups, service keys, filesystems, notifications Used in running (nonprocedural) text for: Names of commands, daemons, options, programs, processes, services, applications, utilities, kernels, notifications, system calls, man pages Used in procedures for: Names of interface elements (such as names of windows, dialog boxes, buttons, fields, and menus) What user specifically selects, clicks, presses, or types
Bold
Italic
Used in all text (including procedures) for: Full titles of publications referenced in text Emphasis (for example a new term) Variables Used for: System output, such as an error message or script URLs, complete paths, filenames, prompts, and syntax when shown outside of running text Used for user input (such as commands) Used in procedures for: Variables on command line User input variables Angle brackets enclose parameter or variable values supplied by the user Square brackets enclose optional values Vertical bar indicates alternate selections - the bar means or Braces indicate content that you must specify (that is, x or y or z) Ellipses indicate nonessential information omitted from the example Double quotes enclose values that contain spaces or special characters, such as commas, new lines, double quotes, or periods.
Courier
<> [] | {} ...
12
Preface
Technical support: For technical support, go to the EMC Online Support website. To open a service request, you must have a valid support agreement. Please contact your EMC sales representative for details about obtaining a valid support agreement or to answer any questions about your account.
Your comments
Your suggestions will help to improve the accuracy, organization, and overall quality of the user publications. Please send your opinion of this document to: techpub_comments@EMC.com
Preface
14
1
This chapter addresses the following topics:
Introduction
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Set up the Unisphere CLI client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Unisphere CLI syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Action commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Get help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Chapter 1, Introduction
Overview
Unisphere CLI enables you to run commands on a system through a prompt from a Microsoft Windows or UNIX/Linux host. Use EMC Unisphere for managing a system. Unisphere CLI is intended for advanced users who want to use commands in scripts for automating routine tasks. Use Unisphere CLI to manage a system. Tasks include:
Configuring and monitoring the system. Managing users. Provisioning storage. Protecting data. Controlling host access to storage.
Storage types
Unisphere CLI supports provisioning and management of network block and file-based storage, including:
Shared folder storage, which contains one or more shares. Allows clients to store data and easily access shared folders and shares that integrate seamlessly into: Windows environments that use the CIFS protocol for file sharing, Microsoft Active Directory for authentication, and Windows directory access for folder permissions. Linux/UNIX environments that use the NFS protocol for file sharing and POSIX access control lists for folder permissions.
Generic iSCSI storage, which contains one or more virtual disks. Provides generic block-level storage to hosts and applications that use the iSCSI protocol to access storage in the form of virtual disks. Storage for VMware virtual machines through datastores that are accessible through either the NFS protocol or VMFS (over iSCSI) protocol. Install Service Pack 3 (SP3) or higher of the system management software to use this functionality.
16
Chapter 1, Introduction
Certificate verification
In order to establish a secure connection between UEM CLI and its backend VNXe server, a Public Key infrastructure (PKI) is used. An important component of PKI, is certificate verification. Certificate verification provides a way for a user to verify the backend server being contacted. When UEM CLI connects to a VNXe server requesting a secure connection, the server sends its identification in the form of a digital certificate. The certificate usually contains the following:
Server name Trusted certificate authority (CA) Server's public encryption key.
Chapter 1, Introduction
The UEM CLI client may contact the server that issued the certificate (the trusted CA) and confirm the validity of the certificate before proceeding. When the certificate is verified, UEM CLI and its backend VNXe server will establish the connection and begin to exchange data.
18
Chapter 1, Introduction
Executable
All command lines begin with the executable uemcli. If you do not start each command line with uemcli, the command fails and you must rerun the command. If you run only uemcli, without any switches or commands, the list of switches and their descriptions appears.
Switches
Use local switches to configure Unisphere CLI and connect to a system. Type switches immediately after uemcli. When typing more than one switch on the same line, separate each switch with a space. All switches start with a hyphen (-). Chapter 2, Use Switches provides details on all available switches.
Objects
Objects identify the type of object on which to perform an action, such as a user, host, LDAP setting, or the system your managing. All objects are categorized into types and are nested, as parent/child, to form a path to the actual object on which to perform an action, similar to locating a file in a filesystem. An object type can be a parent or a child of a parent. Not all parent object types contain child objects. For example, the deduplication object type does not contain children objects. All actions require the fully qualified path to the object. The one exception is the help switch, which applies to an object at any level in a path. Get help on page 24 explains how to use the -help switch. The actual object on which you perform an action is identified by an ID called an object qualifier, as explained in Object qualifiers on page 19.
Example 1
In the following example for creating a user account, the two object types are user and account: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /user/account create name user1 type local passwd Password789! role operator
Example 2
In the following example for viewing all user accounts on the system, the object types are user and account. An object ID is not specified, so the show action is performed on account, which displays a list of all user accounts: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /user/account show
Object qualifiers
Object qualifiers are unique identifiers for objects on the system. The format is: -<identifier> <value> where:
identifier Type of object qualifier. The most common is -id. value Actual object qualifier.
Chapter 1, Introduction
When you create an object, such as a user or network interface, it receives an ID, which is the object qualifier for that object. When performing actions such as viewing, changing, or deleting an object, you specify its object qualifier. The most common identifier is the -id parameter. The uniqueness of the qualifier is only guaranteed in the scope of the specified object type. All object qualifiers start with a hyphen (-).
Example
In the following example for changing the password of a user account, the object qualifier is local_user: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /user/account id local_user set passwd NewPassword456! oldpasswd password123
Actions
Actions are the operations performed on an object or object type, including creating, changing, viewing, and deleting. Actions are always required. Action commands on page 21 provides details on each of the action commands.
Example
In the following example for changing the password of a user account, the action is set: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /user/account id local_user set passwd NewPassword456! oldpasswd password123
Action qualifiers
Action qualifiers are parameters specific to actions, such as attributes or settings to modify when changing an object. All action qualifiers start with a hyphen (-).
Example
In the following example for changing a role and password for a user account, the action qualifiers are -passwd, -oldpasswd, and -role: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /user/account id local_user set passwd newpassword oldpasswd password123 -role administrator
Size qualifiers
Use size qualifiers to indicate a specific capacity-size value. To specify a fraction, use a period. For example, type 2.4T for 2.4 terabytes. The output for a size value displays the exact number of bytes and the specified size value: Size = 1209462790557 (1.1TB) Table 1 on page 20 lists the size qualifiers. The qualifiers are case-sensitive.
Table 1 Size qualifiers
Qualifier
K M G T P
Measurement
Kilobyte Megabyte Gigabyte Terabyte Petabyte
20
Chapter 1, Introduction
Action commands
When using Unisphere CLI, there are four primary action commands that you can perform on object types or objects, including creating, changing, viewing, and deleting. This section explains each of these four action commands. Unisphere CLI syntax on page 19 explains the relationship between action commands, object types, and objects.
Format
<object> create [<action qualifiers>]
Example
The following example uses the create action command to create a local user account. The new user account receives the ID Local_user/user1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /user/account create name user1 type local passwd Password789! role operator Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = Local_user/user1 Operation completed successfully.
Format
<object path> set <object qualifier> [<action qualifiers>]
Example
The following example uses the set action command to change the password for a user account. The path /user/account specifies that the object type is a user account. The -id object qualifier identifies local_user as the user account to change: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /user/account id local_user set passwd NewPassword456! oldpasswd OldPassword456! Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = local_user Operation completed successfully.
Action commands 21
Chapter 1, Introduction
qualifiers for changing the display of the output, including the format and the attributes to include. The available output formats are name-value pair (NVP), table, and comma-separated values (CSV).
Format
<object path> [<object qualifier>] show [-output {nvp|table[-wrap]|csv}] [{-brief|-detail}]
Action qualifiers
Qualifier
-output|-o
Description
Specify the output format. Value is one of the following: nvp The name-value pair (NVP) format displays output as name=value. Name-value pair format on page 22 provides an example of the NVP format. table The table format displays output as a table, with column headers and rows. By default, values that are too long to fit in a column are cut off. Add -wrap after the table qualifier, separated by a space, so that the values wrap. Table format on page 22 provides an example of the table format. csv The comma-separated values (CSV) format is similar to the table format, but the names and values are separated by commas. Comma-separated values format on page 22 provides an example of the CSV format. Display all attributes. Display only the basic attributes (default).
-detail -brief
2:
Table format
ID | SP | Ports | Health state | Operational status --------+-----+-------------------+---------------+------------------la0_SPA | SPA | eth0_SPA,eth1_SPA | OK (5) | OK (0x2) la0_SPB | SPB | eth0_SPB,eth1_SPB | OK (5) | OK (0x2)
Format
<object path> <object qualifier> delete
22
Chapter 1, Introduction
Example
The following command deletes user account local_user1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /user/account id local_user1 delete
Action commands 23
Chapter 1, Introduction
Get help
For help with using the CLI, use the -help, -h, or -? switch for information about the syntax, an object type, or a specific object or action command.
Example
The following command displays information about the syntax and switches: uemcli -? [Get help on client options] uemcli help {CMDHELP|CMD|-upload|-download|-version|-saveUser|-removeUser|-removeAllUse rs|-default|-certList|-certClear|-certDel|-certImport} [Get help on objects or actions] uemcli [-d <address>] [-port <number>] [-u <user_name>] [-p <password>] [-sslPolicy {interactive|reject|accept|store}] [-t <seconds>] [-silent] [-noHeader] [-cmdTime] <object> [<action>] help [Perform an action on an object on the destination system] uemcli [-d <address>] [-port <number>] [-u <user_name>] [-p <password>] [-sslPolicy {interactive|reject|accept|store}] [-s <name>[:<version>]] [-gmtoff [-|+]<HH>[:<MM>]] [-t <seconds>] [-silent] [-noHeader] [-cmdTime] <object> [<qualifiers>] <action> [<qualifiers>] [Upload a file to the destination system] uemcli [-d <address>] [-port <number>] [-u <user_name>] [-p <password>] [-sslPolicy {interactive|reject|accept|store}] [-t <seconds>] [-silent] [-noHeader] -upload -f <file_path> <type> [-<parameter> <value> ...] [<action>] [Download a file from the destination system] uemcli [-d <address>] [-port <number>] [-u <user_name>] [-p <password>] [-sslPolicy {interactive|reject|accept|store}] [-t <seconds>] [-silent] [ noHeader] -download {-d <directory>|-f <file_path>} <type> [-<parameter> <value> ...] [<action>] [Display the version of this client] uemcli -version [Save access credentials for the destination system locally] uemcli [-d <address>] [-port <number>] -u <user_name> -p <password> [-silent] -saveUser [Remove access credentials for the destination system from this client] uemcli [-d <address>] [-port <number>] [-silent] -removeUser [Remove all stored access credentials from this client] uemcli [-silent] -removeAllUsers [Save the destination address as the default for this client] uemcli -d <address> -port <number> [-silent] -default
24
Chapter 1, Introduction
[List certificates saved for this client] uemcli [-silent] -certList [Delete a certificate from this client] uemcli [-silent] -certDel <certificate_id> [Delete all certificates from this client] uemcli [-silent] -certClear [Import an SSL certificate from a file] uemcli [-silent] -certImport <file>
Example
The following command displays a list of DNS object types: /net is the parent object type and /dns is the child object type. In the output, the items in brackets are the objects on which you perform actions, such as creating and changing. uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/dns help +- /net/dns/ +- [config] +- [domain] Note: To get help on all object types, type only a forward slash (/). For example, / -help.
Example
The following command displays the action commands to set (change) and show a DNS server setting: /net is the parent object type and /dns and /config are the child object types. In the output, the items in brackets are the actions, such as creating and changing, you can perform on the specified object types:
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/dns/config ? Configure system DNS client settings. Actions: [Set] /net/dns/config set -nameServer <value> [Show] /net/dns/config show [-output {nvp|csv|table[-wrap]}] [{-brief|-detail}]
Get help 25
Chapter 1, Introduction
Help on actions
For help on an action command, type the fully qualified object parameter and action command, followed by the help action qualifier.
Example
The following command displays the list of interface attributes that you can change: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/if set ? /net/if -id <value> set [-vlanId <value>] [-ipv4 static [-addr <value>][-netmask <value>][-gateway <value>]] Where: -id <value> Type the ID of the interface to change. [Optional] -vlanId <value> Type the virtual LAN (VLAN) ID for the interface. The interface uses the ID to accept packets that have VLAN tags. The value range is 0 to 4096. If the VLAN ID is 0, the default, packets do not have VLAN tags. [Optional] -ipv4 static [ -addr <value>][-netmask <value>] [-gateway <value>] Specify to type the (IPv4) configuration information for the interface. static Type the value 'static', without quotes, to specify that you will type the configuration information. [Optional] -addr <value> Type the IP address for the interface. [Optional] -netmask <value> Type the subnet mask for the interface. [Optional] -gateway <value> Type the gateway for the interface.
26
2
This chapter addresses the following topics:
Use Switches
View the switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Access the system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Upload an upgrade candidate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Hide header information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Manage SSL certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Save Unisphere CLI settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Format
uemcli [{-help|-h|-?}] Table 2 on page 28 describes each of the switches:.
Table 2 Switches
Switch
-destination|-d -port -user|-u -password|-p -timeout|-t -sslPolicy
Description
IP address or network name of the destination system. If you do not include this switch, the client uses the addresses specified for -default. If no default address exists, the client uses the localhost address 127.0.0.1. Port number on the system. Username for logging in to the system. Password for logging in to the system. Timeout (in seconds) after which you are automatically logged out of the system due to user inactivity or a system problem. The default value is 600 seconds (10 minutes). Policy for handling unknown SSL certificates downloaded from the system. Value is one of the following: interactive Prompt the user to accept the certificates for the current session (default). reject Automatically reject the certificates. accept Automatically accept the certificates. store Automatically accept and store the certificates. List of all certificates stored locally in the lockbox. Delete all certificates stored locally in the lockbox. Delete one or more certificates from the lockbox. Type a comma-separated list of certificate IDs. Note: Use certlist to view a list of stored certificates with their IDs.
-certImport
Import a certificate from a file. Supported formats are: Privacy Enhanced Mail (PEM) Distinguished Encoding Rules (DER) Cryptographic Message Syntax (PKCS #7) Syntax name and version (optional) to use in the client. Separate the name and version with a colon. For example, the following switch applies the UEM version 1.5 syntax: -syntax uem:1.5
-syntax|-s
28
Switch
-upload
Description
Upload a file to the system. Type the file type and location in the following format: {-help|<type> -help|{-f|-file} <file> <type> [<parameter>=<value>...]} where: -help Display a list of file types you can upload to the system. type -help Display information about a file type. Value is one of the following: - license A license file. During upload the license is installed on the system. - upgrade A system software upgrade candidate file. When you upload an upgrade candidate file onto your system, it replaces the previous version. There can be only one upgrade candidate on the system at a time. Upgrade the system software on page 69 explains upgrading the system software using an uploaded upgrade candidate. - certificate An Lightweight Directory Access Protocol (LDAP) certificate file. During upload the certificate is installed on the system. -f|-file file type For file, type the path and filename of the file to upload. For type, type the file type to upload. parameter=value Optional parameter=value pairs for including specific parameters during the upload. Note: For a list of supported file types, type -upload -help
-gmtoff
Greenwich Mean Time (GMT) offset for converting the time on the system to the time on the client system. Type auto to send the offset of the current client system. Type the following to specify the offset: [-|+]<HH>[:<MM>] where: -|+ Type the sign of the GMT offset. If the offset is ahead of GMT, you can omit the plus sign. HH Type the hours for the offset. MM Type the minutes for the offset (optional). Separate the minutes from the hours with a colon. Display information about the syntax and switches. Save the access credentials specified for the -user and -password switches to a local security file in the lockbox. With the access credentials saved, Unisphere CLI automatically applies them to the specified system destination and port pair each time you run a command. Save Unisphere CLI settings on page 34 explains saving user account credentials to the local client system. Remove the specified user account from the lockbox. Save the destination and port pair as the default system to access. When you run a command, Unisphere CLI will run the command on the default system. Unisphere CLI saves the specified destination and port pair to a local security file in the lockbox. Each time you include the -default switch, Unisphere CLI overwrites the previous saved destination and port pair with the current destination and port pair. If you include the -port switch, the specified port value is paired with the -destination value and saved to the local security file. Save Unisphere CLI settings on page 34 explains saving user account credentials to the local client system. Allow a command to complete by suppressing the output and not requiring user confirmation. This is useful when there are commands in scripts. Hide the header message (system IP address, port number, and so on) that appears above the command output. Hide header information on page 32 explains how to hide the header from the output. Display the version of your Unisphere CLI. Display the current time on the destination system.
-help|-h|-? -saveUser
-removeUser -default
Unisphere CLI does not provide a session mode in which you log in to the system once and run commands. You must type the destination system, your username, and your password each time you run a command. Doing so logs in to the system, runs the command, and then logs out. To avoid having to type the access credentials each time you run a command, include the -saveUser switch to save the username and password for the specified destination system and port pair.
Format
[{-d|-destination} <value>] [{-u|-user} <user_name>] [{-p|-password} <password>]
Switches
Switch
-destination|-d
Description
IP address or network name of the destination system. If you do not include this switch, the client uses the addresses specified for -default. If no default address exists, the client uses the localhost address 127.0.0.1. Domain and username for logging in to the system. For example, Local/joe. Password for logging in to the system. Specify the port number through which to access the system. If you do not include the -port switch, Unisphere CLI accesses the system through default port 443. Save the destination and port pair as the default system to access. When you run a command, Unisphere CLI runs the command on the default system. Unisphere CLI saves the specified system and port pair to a local file. Each time you include the -default switch, Unisphere CLI overwrites the previously saved destination and port pair with the current destination and port pair. If you include the -port switch, the specified port value is paired with the -destination value and saved to the local file. Hide header information on page 32 explains saving user account credentials on the local client system. Save the access credentials specified for the -user and -password switches to a local file. With the access credentials saved, Unisphere CLI automatically applies them to the specified destination and port pair each time you run a command. Hide header information on page 32 explains saving user account credentials on the local client system. Remove saved access credentials for the specified destination and port pair.
-default
-saveUser
-removeUser
Example 1
The following example accesses the destination system 10.0.0.1 as user Local/joe with password 12345: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456!
Example 2
The following example saves the access credentials for the specified user: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! -saveUser
30
Example 3
The following example sets the destination system as the default: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! -default
Example 4
The following example accesses the default system: uemcli -u Local/joe -p MyPassword456!
Example 5
The following example removes the saved access credentials of user Local/joe and password 12345 from destination system 10.0.0.1: uemcli -d 10.0.0.1 -removeUser
Prerequisite
Download the latest system software upgrade candidate from the EMC Online Support website.
Format
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! -upload -f <file> upgrade
Option
Option
-f
Description
Type the path and filename of the upgrade candidate file to upload. Wrap the path and file name in quotes.
Example
The following example upload a upgrade candidate file to the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! -upload -f \\upgrade_image\upgrade-2.0.0.12190-MAGNUM-RETAIL.tgz.bin upgrade Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
-sslPolicy <value>
Switch
Switch
-sslPolicy
Description
Value is one of the following: interactive Client prompts the user to take action (default). reject Client automatically rejects the certificates. accept Client automatically accepts the certificates. store Client automatically accepts and stores the certificates in the lockbox.
View certificates
View a list of all SSL certificates stored in the lockbox. Note: The show action command on page 21 explains how to change the output format.
Format
-certList
32
Delete certificates
Delete one or more SSL certificates from the lockbox.
Format
-certDel <certificate IDs>
Switch
Switch
-certDel
Description
Typea comma-separated list of certificate IDs to delete. Note: Use certList to view a list of stored certificates with their IDs.
Format
-certClear
Import certificates
Import a SSL certificate from a file.
Format
-certImport <file>
Switch
Switch
-certImport
Description
Type the path and name for the file to import. Supported formats are: Privacy Enhanced Mail (PEM) Distinguished Encoding Rules (DER) Cryptographic Message Syntax (PKCS #7)
User access credentials, including your username and password, for each system you access. SSL certificates imported from the system. Information about default system to access through Unisphere CLI, including the system name or IP address and the system port number.
Unisphere CLI saves the settings to a secure lockbox that resides locally on the host on which Unisphere CLI is installed. The stored data is only available on the host where it was saved and to the user who saved it. The lockbox resides in the following locations:
Locate the files config.xml and config.key. If you uninstall Unisphere CLI, these directories and files are not deleted, giving you the option of retaining them. However, for security reasons, you may want to delete these files.
34
3
This chapter addresses the following topics:
Configure general system settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Configure system information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Manage security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Manage system time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Manage support configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Manage support credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Manage support contracts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Manage users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 View installed feature licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 View and accept the End User License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Manage ESRS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Manage Unisphere Remote Management/Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Manage remote logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 View system software versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Upgrade the system software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Manage snapshot protection schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Manage task rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Enable or disable automatic failback for SP. Manually fail back storage servers (Shared Folder Servers and iSCSI nodes). Perform a check of the overall system health.
Note: Failover occurs when there is a hardware or software problem with an SP. This failover causes all storage servers that run on it to fail over to the another SP with minimal disruption to connected hosts. Once the SP is fixed, and automatic failover is enabled, all storage servers automatically fail back to their original SP. Table 3 on page 36 lists the general system attributes.
Table 3 General system attributes
Attribute
System name Model Platform type Product serial number Auto failback Health state
Description
Name of the system. System model. Hardware platform of the system. System serial number. Indication of whether auto failback is enabled for the SP. Value is on or off. Health state of the system. The health state code appears in parentheses. Value is one of the following: Unknown (0) Status is unknown. OK (05) Working correctly. OK BUT (7) Working correctly, but there could be a problem. Degraded/Warning (10) Working and performing all functions, but the performance may not be optimum. Minor failure (15) Working and performing all functions but overall performance is degraded. This condition has a minor impact on the system and should be remedied at some point, but does not have to be fixed immediately. Major failure (20) Failing and some or all functions may be degraded or not working. This condition has a significant impact on the system and should be remedied immediately. Critical failure (25) Failed and recovery may not be possible. This condition has resulted in data loss and should be remedied immediately. Non-recoverable error (30) Completely failed and cannot be recovered.
Format
/sys/general show
36
Example
The following command displays the general settings for the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/general show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully. 1: System name = Vorpal Model = SENTRY DUAL SP 12GB RAM WM PHTM Platform type = Sentry_DualSP Product serial number = FNM00102000154 Auto failback = on Health state = Degraded/Warning (10)
Format
/sys/general set [-name <value>] [autoFailback {on|off}]
Action qualifiers
Qualifier
-name -autoFailback
Description
Type a name for the system. Enable or disable automatic failback. Value is on or off.
Example
The following command disables automatic failback: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/general set autoFailback off Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/sys/general failback
Example
The following command fails back all storage servers that have failed over: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/general failback Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/sys/general healthcheck
Example
The following command performs a health check of the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/general healthcheck Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
38
Attribute
Location name Rack location Contact name Address 1 Address 2 City State Country Postal Code Contact email address Contact phone number Comment
Description
Location name Rack location name Contact name for the system Contact address for the system Apartment, unit or suite number City name State or province name Two-letter country code Postal code Contact email address for the system Contact phone number for the system Notes about the system
Format
/sys/info show
Example
The following command displays the general setting information for the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/info show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully. 1: Location name Rack location Contact name Contact email address Contact phone number = = = = = Headquarters Lab 4 Joe joe@somemail.com 123456789
Format
/sys/info set [-location <value>] [-rackLocation <value>] [-contactName <value>] [-contactEmail <value>] [-contactPhone <value>] [-addr1 <value>] [-addr2 <value>] [-city <value>] [-state <value>] [-country <value>] [ postalCode <value>] [-comment <value>]
Action qualifiers
Qualifier
-location -rackLocation -contactName -contactEmail -contactPhone -addr1 -addr2 -city -state -country -postalCode -comment
Description
Specify a location name. Specify a rack location name. Specify the contact name for the system. This is required for new certificate creation. Specify the contact email address for the system. Specify the contact phone number for the system. Specify the contact address for the system. Specify the apartment, unit, or suite number. Specify the city name. Specify the state. Specify the country, using a two-letter country code. Specify the postal code. Specify the text of the comment.
Example
The following command changes the system information attributes: uemcli /sys/info set location Headquarters rackLocation Lab 4 contactName Joe contactEmail joe@somemail.com contactPhone 123456789 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
40
Attribute
FIPS 140 mode
Description
Indicates whether the system is working in FIPS mode. Valid values are: enabled disabled Note: Values are case-insensitive.
Format
/sys/security show
Example
The following command displays the security settings for the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/security show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: FIPS 140 mode = enabled
Format
sys/security set -fips140Enabled {yes | no}
Action qualifiers
Qualifier
-fips140Enabled
Description
Enables or disables FIPS 140 compliance mode. Valid values are: yes no Note: Values are case-insensitive.
Example
The following command changes the system security settings: uemcli /sys/security set -fips140Enabled yes Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
42
Attribute
Time
Description
System time - not including the command processing delay. See note below. NOTE: The difference between the requested time and the resulting time can be up to one minute due to the command processing delay.
Format
/sys/time show
Example
The following command displays the system time: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/time show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully. 1: Time = 2011-01-01 03:00:00
Format
/sys/time set {-clientTime | -utc <value>} [-force {noReboot | allowReboot | allowDU}]
Action qualifiers
Qualifier
-clientTime
Description
Indicates that the system time should be synchronized with the time on the system from which the CLI is being run. Note: The difference between the client time and the resulting system time can be up to one minute as a result of the command processing delay.
-utc
Specify time to set on the system (in UTC format). Format: <YYYY>-<MM>-<DD><hh>:<mm>:<ss> Note: The difference between the requested time and the resulting time can be up to one minute due to the command processing delay.
-force
Specify whether to accept or decline the system reboot, which may be needed to complete the time change. If the qualifier is not specified, you will be asked to confirm the reboot if its needed. Specify one of the following: noReboot allowReboot allowDU Note: allowDU is used if the system is in a degraded state or has one SP (data will be unavailable during its reboot). Otherwise allowReboot is used. In silent mode, system will be rebooted it needed.
Example
The following command accepts the system reboot: uemcli /sys/time set -utc "2011-05-17 14:26:20" -force allowReboot Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection
44
Name of IP address of proxy server. Port number of the proxy server. Name of the account on the proxy server. Password of the account.
Attribute
Support proxy server address Support proxy server port Support proxy server user name Support proxy server password
Description
Name or IP address of the support services proxy server. Port number of the support services proxy server Name of the account on the support proxy server. Password of the account on the support proxy server.
Format
/sys/support/config show
Example
The following command displays the support configuration: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/support/config show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully. 1: Support proxy server address: Support proxy server port: = 10.64.75.201 = Lab 4
Format
/sys/support/config set { [supportProxyAddr <value>] [-supportProxyPort <value>] [-supportProxyUser <value>] [supportProxyPasswd <value>] [-supportProxyProtocol {http | socks}] | -noSupportProxy} [-autoUpdateContracts {yes | no}]
Action qualifiers
Qualifier
-supportProxyAddr -supportProxyPort -supportProxyUser -supportProxyPasswd -supportProxyProtocol
Description
Specify the name or IP address of the support services proxy server. Specify the port of the support services proxy server. Specify the user name of an account on the support services proxy server. Specify the password for the support services proxy server account. Specify the protocol used for communications with the support proxy server. Valid values are: http socks Note: Values are case-insensitive.
-noSupportProxyUser -autoUpdateContracts
Clears support proxy settings. Specify whether the system automatically updates its service contracts list once a week, Valid values are: yes no Note: Values are case-insensitive.
Example
The following command specifies the support services proxy server parameters: uemcli /sys/support/config set -supportProxyAddr 10.0.0.1 -supportProxyPort 8080 -supportProxyUser user1 -supportProxyPasswd password123 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
46
User name of the EMC Online User account. Password of the EMC Online User account.
Attribute
Support user name Support password
Description
Name of the EMC Online user account. Password of the EMC Online user account.
Format
/sys/support/account show
Example
The following command displays the support credentials: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/support/account show Storage system address: 10.64.75.201 Storage system port: 443 HTTPS connection 1: Username = user1
Format
/sys/support/account set -user <value> -passwd <value>
Action qualifiers
Qualifier
-user -passwd
Description
Specify the user name of the EMC Online Support account. Specify the new password of the EMC Online Support account.
Example
The following command specifies the new password of the EMC Online Support account: uemcli /sys/support/account set -user user1 -passwd Password123 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/sys/support/account delete
Example
The following command deletes support credentials: uemcli /sys/support/account delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
48
Attribute
ID Status
Description
Support contract identifier. State of the support contract. Value is one of the following: active about to expire expired Type of the support contract. Start date of the support contract. Expiration date of the support contract
Format
/sys/support/contract [-id <value>] show
Example
The following command displays the support contracts: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/support/contract show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Status Service type Expiration date = = = = contract1 active software 2012/12/31
Action qualifiers
Qualifier
-id
Description
Identifies the support contracts
Manage users
Control user access to the system and functionality by creating user accounts for each manager or administrator who needs to configure and monitor the system. The accounts combine a unique username and password with a specific role for each identity. The specified role determines the types of actions that the user can perform after logging in. When users connect to the system through Unisphere CLI or Unisphere, the system prompts them to type their username and password to gain access. Table 10 on page 50 lists the attributes for user roles
Table 10 User role attributes
Attribute
Name
Description
Name of the user role. Value is one of the following: administrator Administrator role: Can view system data, edit system settings, and perform all major administrator tasks. storageadmin Storage administrator role: Can view system data, edit settings, and create and delete storage and hosts. Cannot add user accounts or host configurations, perform initial system configuration, modify network settings, create or delete storage servers, or upgrade system software. operator Operator role: Can view system and storage status information but cannot change system settings. This role provides view-only permissions. Brief description of the user role.
Description
Format
/user/role [name <value>] show
Object qualifier
Qualifier
-name
Description
Type the name of the user role. Value is one of the following: administrator Administrator role storageadmin Storage Administrator role operator Operator role (view only)
Example
The following command displays a list of user roles on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /user/role show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection
1:
50
2:
Name = storageadmin Description = User has access to all administrative and management interfaces and data. Name = operator Description = User is allowed to see all storage system data but not to perform any storage management operations.
3:
Format
/user/account create name <value> -type {local -passwd <value>|ldapuser|ldapgroup} -role <name>
Action qualifiers
Qualifier Description
-name Type a name for the account. For LDAP users and groups that are required to indicate the domain, use the following format: <domain>/<name> where: domain LDAP domain. name Account name. Type the type of user or user group. Value is one of the following: local Local user. ldapuser User has an LDAP account. ldapgroup Group has an LDAP account. For local users, type the user password. The following are the password requirements for user accounts: Passwords must be 8 to 40 characters in length and cannot contain spaces. Passwords must include mixed case, a number, and a special character from this list: !,@#$%^*?_~ When changing a password, do not reuse any of the last 3 passwords. Type the name of the role for the account. Value is one of the following: administrator Administrator storageadmin Storage Administrator operator Operator (view only) Table 10 on page 50 provides a description of each user role.
-type
-passwd
-role
Manage users 51
Example
The following command creates a user account that assigns user1 as local user to the operator role: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /user/account create name user1 type local passwd Password987! role operator Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = 1_Local/user1 Operation completed successfully.
Format
/user/account [-id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of a user account.
Example
The following command displays a list of all user accounts on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /user/account show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Role Type ID Name Role Type ID Name Role Type = = = = = = = = = = = = local_user1 user1 administrator local ldapuser_ldapdomain.com/ldapUser ldapdomain.com/ldapUser operator ldapuser ldapgroup_ldapdomain.com/ldapGroup ldapdomain.com/ldapGroup storagadmin ldapgroup
2:
3:
52
Format
/user/account id <value> set [passwd <value> {-oldpasswd <value>}|-force} [-role <value>]
Object qualifier
Qualifier Description
-id Type the ID of the user account to change.
Action qualifiers
Qualifier
-passwd
Description
Type a new password for a local user. The following are the password requirements: Passwords must be 8 to 40 characters in length and cannot contain spaces. Passwords must include mixed case, a number, and a special character from this list: !,@#$%^*?_~ When changing a password, do not reuse any of the last 3 passwords. Type the old password to set the new password. Reset the password. Note: You must be an administrator to use this qualifier.
-oldpasswd -force
-role
Type the name of a new role for the user account. Value is one of the following: administrator Administrator storageadmin Storage Administrator operator Operator (view only)
Example
The following command changes the password for user account local_user: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /user/account id local_user set passwd NewPassword456! oldpasswd OldPassword456! Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = local_user Operation completed successfully.
Manage users 53
Format
/user/account id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the user account to delete.
Example
The following command deletes user account local_user1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /user/account -id user_user1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
54
Attribute
Feature Installed Version Issued Expires Health state
Description
Name of the feature. Indication of whether a feature is installed with the license. Value is yes or no. Version of the license. Date when the license was made available. Date when the license will expire. Health state of the license. The health code appears in parentheses. Value is one of the following: OK (5) License is active. Degraded/Warning (10) License will soon expire. Major failure (20) License has expired. To update a license that has expired or is about to expire, go to the Manage Licenses page in Unisphere.
View licenses
View details about installed licenses. Note: The show action command on page 21 explains how to change the output format.
Format
/sys/lic show
Example
The following command displays a list of all feature licenses on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/lic show 1: Feature Installed Version Issued Expires Health state Feature Installed Version Issued Expires Health state = = = = = = = = = = = = ISCSI yes 1.1 2009-11-09 2010-11-09 OK (5) CIFS yes 1.1 2009-01-19 Never OK (5)
2:
Format
/sys/eula show
Example
The following command displays the agreement status of the EULA and a URL for viewing the EULA as a text file: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/eula show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: Agree = yes URL = https:/10.0.0.1/eula.txt
Format
/sys/eula set -agree yes
Example
The following command accepts the EULA: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/eula set -agree yes Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
56
Manage ESRS
EMC Secure Remote Support (ESRS) is a feature that provides EMC with remote access capabilities to VNXe systems in the field through a secure and encrypted tunnel. Table 12 on page 57 lists the ESRS attributes:
Table 12 ESRS attributes
Attribute
ESRS enabled ESRS connection status
Description
Indicates whether the ESRS service is enabled. The proxy server and policy manager must be set in order to enable the ESRS service. Status of the connection to the ESRS server. Value is one of the following: Connected Not connected Disabled Not running Policy manager name or IP address. Policy manager port number. Protocol used for communications with the policy manager. Value is one of the following: http https (default) Note: Values are case insensitive.
Policy proxy server address Policy proxy server port Policy proxy user name Policy proxy user password Policy proxy protocol
Name or IP address of the proxy server used by the policy manager. Port of the proxy server used by the policy manager. User name of the account on the policy proxy server. Password of the account on the policy proxy server. The protocol used for communications with the policy proxy server. Valid values are: http socks (default) Note: Values are case-insensitive.
Manage ESRS 57
Format
/sys/support/esrs show
Example
The following command displays the ESRS configuration: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/support/esrs show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ESRS enabled ESRS connection status Policy manager address Policy manager port Policy proxy server address Policy proxy server port = = = = = = yes active 10.10.0.2 10.0.0.3 8080
Format
/sys/support/esrs set [-enable {yes | no}] { [-policyManagerAddr <value>] [ policyManagerPort <value>] [-protocol {http | https}] [ policyProxyAddr <value>] [ policyProxyPort <value>] [-policyProxyUser <value>] [-policyProxyPasswd <value>] [-policyProxyProtocol {http | socks}]|-noPolicyManager} [-pingRate high]
58
Action qualifiers
Qualifier
-enable
Description
Specify whether to enable or disable the ESRS. Possible values include: yes no NOTE: Values are case insensitive.
-policyManagerAddr -policyManagerProtocol
Specify the name or IP address of the policy manager. Specify the protocol used for communications with the policy manager. Possible values include: http https NOTE: Values are case insensitive.
Specify the name or IP address of the proxy server used by the policy manager. Specify the port number of the policy proxy server. Specify the user name of the account on policy proxy server. Specify the password of the account on policy proxy server. Specifies the protocol used for communications with the policy proxy server. Possible values include: http socks NOTE: Values are case insensitive.
-noPolicyManager -pingRate
Clears policy manager and policy proxy settings. Specify to increase the ping rate for a period of time. Value is: high NOTE: Values are case insensitive.
Manage ESRS 59
Example
The following command modifies the ESRS configuration: uemcli /sys/support/esrs set -enable yes -policyManagerAddr 10.10.0.2 -policyManagerPort 8090 -policyManagerProtocol https policyProxyAddr 10.0.0.3 policyProxyPort 8080 -policyProxyUser user2 -policyProxyPasswd password456 -policyProxyProtocol http Storage system address: 10.0.0.2 Storage system port: 443 HTTPS connection Operation completed successfully.
60
Attribute
ID Address Certificate Challenge phrase
Description
Unisphere Remote managementserver identifier. Unisphere Remote managementserver network address (network name or IP address) Unisphere Remote managementserver certificate SHA1 hash. Passphrase used by the Unisphere Remote managementserver to sign a certificate.
Action qualifiers
Qualifier
-addr -certificate -passphrase -unsecured
Description
Specify the Unisphere Remote managementserver name or IP address. Specify the hash of the existing certificate. Specify the challenge phrase for the Unisphere Remote manager to sign the certificate. Skip certificate and challenge phrase.
Example
uemcli /sys/ur create -addr 10.10.0.2 -certificate 2fd4e1c67a2d28fced849ee1bb76e7391b93eb12 -passphrase password Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = ur_0 Operation completed successfully.
Format
/sys/ur show
Example
The following command displays the Unisphere Remote manager configuration: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/ur show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Address = ur_0 = 10.10.0.2
Format
/sys/ur [-id <value>] set [-addr <value>] [ {-certificate <value> -passphrase <value> | -unsecured} ]
Object qualifier
Qualifier
-id
Description
Identifies the Unisphere Remote management server. Optional if there is only one remote manager configured.
Action qualifiers
Qualifier
-addr -certificate -passphrase -unsecured
Description
Specify the Unisphere Remote managementserver name or IP address. Specify the hash of existing certificate. Specify the challenge phrase for the remote manager to sign the certificate. Skip certificate and challenge phrase.
Example
uemcli /sys/ur set -addr 10.10.0.2 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
62
Object qualifier
Qualifier
-id
Description
Identifies the Unisphere Remote management server. Optional if there is only one remote manager configured.
Example
The following command deletes the Unisphere Remote management server configuration information: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/ur delete
Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully
The facility that will generate the log messages. The network name or IP address of a remote host that will receive the log data.
The remote host must be accessible from the system. Security for the log information must be provided through network access controls or the system security at the remote host. You can configure the log transmission method (UDP or TCP) and the host port that the system uses. By default, the system transfers log information on port 515 over the UDP protocol. Log files record messages to flat log files. The user-level system messages are recorded in English. However, you can specify a facility to select the type of information contained in the logs, according to the system component that issues it, and the language of any text in the log. View event logs and alerts on page 284 explains viewing details about current logs and alerts on the system. Table 14 on page 64 lists the attributes for remote system logging.
Table 14 Remote logging attributes
Attribute
Enabled Host Port Protocol Facility
Description
Indication of whether remote logging is currently enabled. Value is yes or no. IP address or network name of the remote host. Port number on the remote host. Default is 515. Protocol for transferring the log. Value is TCP or UDP. Facility that will process the log. Value is one of the following: KERN Kernel messages. USER User-level messages. MAIL Mail system. DAEMON System daemons. AUTH Security/authorization messages. Syslog Message generated internally by syslogd (default). LPR Line printer subsystem. NEWS Network news subsystem. UUCP UNIX-to-UNIX copy. CRON Clock daemon. AUTHPRIV Security/authorization messages. FTP FTP daemon.
64
Format
/sys/rlog show
Example
The following command displays the settings for remote system logging: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/rlog show 1: Enabled Host Port Protocol Facility = = = = = yes 10.64.75.201 500 UDP Kernel messages
Format
/sys/rlog set [-enabled {yes|no}] [-host <value>] [-port <value>] [-protocol {UDP|TCP}] [-facility {KERN|USER|MAIL|DAEMON|AUTH|SYSLOG|LPR|NEWS|UUCP|CRON|AUTHPRIV|FTP}]
Action qualifier
Qualifier
-enabled
Description
Specify to enable remote system logging. Value is yes or no. If you specify yes, include -host <value>, where value is the IP address of the target remote host that will receive the logs. Type the IP address or network name of the remote host that will receive the log files. Type the port number on the remote host. Default is 515. Type the protocol for transferring the log files. Value is TCP or UDP. Type the facility that will process the log files. Value is one of the following: KERN Kernel messages. USER User-level messages. MAIL Mail system. DAEMON System daemons. AUTH Security/authorization messages. Syslog Message generated internally by syslogd (default). LPR Line printer subsystem. NEWS Network news subsystem. UUCP UNIX-to-UNIX copy. CRON Clock daemon. AUTHPRIV Security/authorization messages. FTP FTP daemon.
Example
The following command configures remote system logging with these settings:
Remote target host is 10.64.74.12 Uses host port 500. Uses protocol UDP. Uses the MAIL facility.
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/rlog set enabled yes host 10.64.74.12 port 500 protocol UDP -facility MAIL Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
66
Attribute
ID Type
Description
ID of the system software. System software type. Value is one of the following: installed System software that is currently installed on the system. candidate Upgrade candidate uploaded to the system for upgrading the system software. Software version. Software release date. Filename of the software image.
Note: The show action command on page 21 explains how to change the output format.
Format
/sys/soft/ver [{-id <value>|-type {installed|candidate}}] show
Object qualifiers
Qualifier
-id -type
Description
Type the ID of the system software. Type the software type. Value is one of the following: installed View the version of the system software that is installed. candidate View the version of the system software upgrade candidate that was uploaded to the system. NOTE: Values are case-insensitive.
Example
The following command displays details about the installed system software and an uploaded upgrade candidate: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/soft/ver show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Type Version Release date ID Type Version Release date = = = = = = = = INST_1 installed 0.1.0.1487 2009-04-30 CAND_1 candidate 0.1.0.2187 2009-11-14
2:
68
Attribute
Status
Description
Current status of the upgrade session. Value is one of the following: running Session is upgrading the system software. completed Session has completed upgrading the system software. failed Upgrade session has failed. Current progress of the upgrade session. Date and time when the upgrade session was created. Amount of time that the upgrade session has been running.
Estimated time left Estimated time required to complete the upgrade session.
Do not use Unisphere or Unisphere CLI to manage or configure the system during a software upgrade.
Format
/sys/soft/upgrade create candId <value>
Action qualifiers
Qualifier
-candId
Description
Type the ID of the uploaded upgrade candidate. View system software versions on page 67 explains how to view the ID of the uploaded software candidate.
Example
The following command creates a session to upgrade the system software to upgrade candidate CAND_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/soft/upgrade create candId CAND_1 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = UPGSES_1 Operation completed successfully.
Format
/sys/soft/upgrade show
Example
The following command displays details about the system software upgrade session: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/soft/upgrade show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: Status Progress Creation time Elapsed time Status Progress Creation time Elapsed time = = = = = = = = Running Task 5 of 25 (Stopping c4 stack on SPA) 2009-11-09 19:43:08 01h 43m 08s Failed Task 5 of 25 (Stopping c4 stack on SPA) 2009-11-09 19:43:08 00h 20m 08s
2:
70
Attribute
ID Name Type
Description
ID of the schedule. Name of the schedule. Type of schedule. Value is one of the following: System Defined by the system. User Defined by a user. List of IDs for each task rule in the schedule. Manage task rules on page 73 provides details about schedule rules.
Rules
Format
/sys/task/sched [-id <value>] show
Object qualifier
Qualifier Description
-id Type the ID of a schedule.
Example
The following command displays details about all schedules (user- and system-defined) on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/task/sched show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Type Rules ID Name = = = = LessProtectionID Less Protection System RULE_1, RULE2
2:
3:
= = = =
Format
/sys/task/sched [-id <value>] delete
Object qualifier
Qualifier
-id
Description
Type the ID of the schedule to delete.
Example
The following command deletes schedule MySchedID: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/task/sched -id MySchedID delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
72
Attribute
ID Type
Description
ID of the rule. Type of rule, which specifies when a task executes. Value is one of the following: HoursInterval Task executes on an interval of the specified number of hours or minutes within an hour. HoursList Task executes everyday on the specified hours and, optionally, on a specific minute within the specified hour. DaysInterval Task executes on an interval of the specified number of days and, optionally, on a specific hour of each specified day. WeekDaysList Task executes on the specified days of the week or on a specific hour of each specified day. MonthDaysList Task executes each month on a specified day and time. Frequency that a task executes. For snapshots, the amount of time the system retains a snapshot before deleting it.
Format
/sys/task/rule create {schedId <value>|-schedName <value>} -type {HoursInterval -every <value> [-at <value>]|HoursList -hours <value> [-at <value>]|DaysInterval -every <value> [-at <value>]|WeekDaysList -days <value> [-at <value>]|MonthDaysList -days <value> [-at <value>]} [-keepFor <value>]
Action qualifiers
Qualifier
-schedId
Description
Type the ID of an existing protection schedule to which to assign the rule. View protection schedules on page 71 explains viewing details about existing schedules, including their IDs. Type a name for a new protection schedule to which to assign the rule. Specify the type of rule, which indicates how often the task will execute. Value is one of the following: HoursInterval Task executes on an interval of the specified number of hours or minutes within an hour. HoursList Task executes everyday on the specified hours and, optionally, on a specific minute within the specified hour. DaysInterval Task executes on an interval of the specified number of days and, optionally, on a specific hour of each specified day. WeekDaysList Task executes on the specified days of the week or on a specific hour of each specified day. MonthDaysList Task executes each month on a specified day and time. If the value of -type is HoursInterval or DaysInterval, type the time interval when the task will execute. Value is one of the following: HoursInterval Number of hours within the range 124. DaysInterval Number of days within the range 131. If the value of -type is HoursList, type a comma-separated list of the hours of the day when the task will execute. The range is 023.
-schedName -type
-every
-hours
74
Qualifier
-at
Description
Type the specific number of minutes of an hour and the minutes of a day when the task will execute based on the value of -type. Value is one of the following: HoursInterval or HoursList Type the number of minutes after the hour within the range 059. Default is 0. DaysInterval, WeekDaysList, or MonthDaysList Type the time of a day in the following format: <HH>[:MM] where: - HH Hour of the day. - MM Minutes within the specified hour. Value range is 0:0023:59. Default value is 0:00. If the value of -type is WeekDaysList or MonthDaysList, type the days of the week or the day of the month when the task will execute: WeekDaysListType a comma-separated list of the days of the week. Value is one of the following: - Mon Monday - Tue Tuesday - Wed Wednesday - Thu Thursday - Fri Friday - Sat Saturday - Sun Sunday MonthDaysList Type the day of the month within the range 131. Note: Values are case-insensitive.
-days
Note: For MonthDaysList, you can specify only 1 day of the month. -keepFor Type the number of days or hours the system will retain a snapshot before deleting it. Use the following format: <value>[<qualifier>] where: value Type the number of hours or days. Value is: - Hours Number of hours within the range 124. - Days Number of days within the range 131. qualifier Type the value qualifier. Value is one of the following: - h Indicates hours. - d Indicates days. Default value is 1h (1 hour).
Example 1
The following command creates a task rule with these settings:
Assigns the rule to the new protection schedule MyScheduleID. Takes a snapshot every 12 hours and 30 minutes. Keeps the snapshot for 10 hours before deleting it:
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/task/rule create schedName MyScheduleID -type HoursInterval -every 12 at 30 keepFor 10h Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection
Example 2
The following command creates a task rule with these settings:
Assigns the rule to the existing protection schedule MySchedID. Takes a snapshot everyday at 12:30 a.m., 8:30 a.m., and 8:30 p.m.:
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/task/rule create schedId MySchedID -type HoursList hours 0,8,20 at 30 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = RULE_2 Operation completed successfully.
Example 3
The following command creates a task rule with these settings:
Assigns the rule to the existing protection schedule MySchedID. Takes a snapshot every 2 days at 1:20 p.m. Keeps the snapshot for 1 week (7 days) before deleting it:
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/task/rule create schedId MySchedID -type DaysInterval -every 2 at 13:20 keepFor 7d Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = RULE_3 Operation completed successfully.
Example 4
The following command creates a task rule with these settings:
Assigns the rule to the existing protection schedule MySchedID. Takes a snapshot every Monday, Wednesday, and Friday at 6 a.m.:
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/task/rule create schedId MySchedID -type WeekDaysList -days Mon,Wed,Fri at 6 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = RULE_4 Operation completed successfully.
Example 5
The following command creates a task rule with these settings:
Assigns the rule to the existing protection schedule MySchedID. Takes a snapshot on the first day of every month at 12 p.m.:
76
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/task/rule create schedId MySchedID -type MonthDaysList -days 1
Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = RULE_5 Operation completed successfully.
Format
/sys/task/rule [{-id <value>|-schedId <value>}] show
Object qualifiers
Qualifier
-id -schedId
Description
Type the ID of a rule. Type the ID of a protection schedule to view the rules associated with it.
Example
The following command lists details for all task rules assigned to protection schedule SCHD_3: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/task/rule schedId SCHD_3 show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Type Frequency Keep for ID Type Frequency Keep for ID Type Frequency Keep for = = = = = = = = = = = = RULE_1 HoursInterval Every 12h at 30m after the hour 10h RULE_2 HoursList Every day at 0:20, 8:20, 20:20 1h RULE_3 DaysInterval Every 2d at 13:20 7d
2:
3:
4:
Format
/sys/task/rule -id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the rule to delete.
Example
The following command deletes rule RULE_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /sys/task/rule id RULE_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
78
4
This chapter addresses the following topics:
Manage Shared Folder Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Manage reverse CHAP for mutual CHAP authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Set up iSNS for iSCSI storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Manage iSCSI configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Manage iSCSI nodes (servers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Manage Network ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Manage network interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Manage static IP routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Manage link aggregations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Manage DNS settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Manage NTP server settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Manage NIS server domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Manage SMTP server settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Manage NDMP server settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Manage LDAP settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Manage Advanced storage access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Attribute
ID Name Health state
Description
ID of the Shared Folder Server. Name of the Shared Folder Server. Health state of the Shared Folder Server. The health state code appears in parentheses. Value is one of the following: Unknown (0) Status is unknown. OK (5) Working correctly. Degraded/Warning (10) Working and performing all functions, but the performance may not be optimum. Critical failure (25) Failed and recovery may not be possible. This condition has resulted in data loss and should be remedied immediately. Primary SP on which the Shared Folder Server runs. Value is SPA or SPB. Note: If the primary SP is degraded or has failed, the server fails over to the other SP. The value displays the current SP the server is using in parentheses. For example, SPA (failed over to SPB).
SP
Indication of whether CIFS shared folders are enabled on the Shared Folder Server. Value is yes or no. Default is no. CIFS shared folders provide support for CIFS network shares. Indication of whether NFS shared folders are enabled on the Shared Folder Server. Value is yes or no. Default is yes. NFS shared folders provide support for NFS network shares. ID of the network interface assigned to the Shared Folder Server that defines the server IP address and allows the server to communicate with the network and hosts. Manage network interfaces on page 99 explains how to configure network interfaces on the system. Workgroup name. For support of CIFS shared folders, the Windows domain name.
80
Attribute
User name Password Organization unit
Description
Windows domain user name. Windows domain user password. For support of CIFS shared folders, the organizational unit setting for the Active Directory domain. In Active Directory, organizational units represent containers where users, groups, computers, and other organizational units are organized. They provide the smallest scope or unit to which you can assign Group Policy settings or delegate administrative authority in an Active Directory environment. The default value is: ou=Computers:ou=EMC Celerra The Unisphere online help provides more details about this attribute.
Format
/net/nas/server create -name <value> -if <value> [-enableNFS {yes|no}] [-enableCIFS {yes cifsDomain <value> -cifsDomUser <value> -cifsDomPwd <value> [cifsOrgUnit <value>]|no}]
Action qualifiers
Qualifier
-name
Description
Type a name for the Shared Folder Server. Note: Storage server names can contain alphanumeric characters, a single dash, and a single underscore. Server names cannot contain spaces or begin or end with a dash. You can create Storage Server names in four parts that are separated by periods (example: aa.bb.cc.dd). Names can contain up to 255 characters, but the first part of the name (before the first period) is limited to 15 characters.
-if
Type the ID of a network interface to assign to the Shared Folder Server. The interface assigns an IP address to the server and allows the server to communicate with the network and hosts. Manage network interfaces on page 99 explains how to view and manage network interfaces. Note: There can be one or two interfaces.
Enable NFS shared folders on the Shared Folder Server. Value is yes or no. Default is yes. Enable CIFS shared folders on the Shared Folder Server. Value is yes or no. Default is no. For CIFS shared folders, type the Windows domain name. For CIFS shared folders, type the username of the administrator account within the Windows domain. For CIFS shared folders, type the user password of the administrator account within the Windows domain. For CIFS shared folders, type the organizational unit setting for the Active Directory domain. The default value is: ou=Computers:ou=EMC Celerra The Unisphere online help provides more details about this qualifier. Specify the workgroup of the standalone CIFS server. Specify the new local admin password of the standalone CIFS server.
-workgroup -adminPasswd
Example
The following command creates a Shared Folder Server with these settings:
The server receives the ID SFS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/nas/server create name MySFS1 if IF_1 -enableNFS yes Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = SFS_1 Operation completed successfully.
82
Format
/net/nas/server [-id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of a Shared Folder Server.
Example
The following command displays a list of all configured Shared Folder Servers: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/nas/server show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Health state CIFS enabled NFS enabled SP Interface ID Name Health state CIFS enabled NFS enabled SP Interface = = = = = = = = = = = = = = SFS_1 MySFS1 OK (5) yes no SPA IF_1 SFS_2 MySFS2 OK (5) no yes SPA IF_2
2:
Format
/net/nas/server -id <value> set [-if <value>] [-enableNFS {yes|no}] [-enableCIFS {yes cifsDomain <value> -cifsDomUser <value> -cifsDomPwd <value> [cifsOrgUnit <value>]|no}]
Object qualifier
Qualifier Description
-id Type the ID of the Shared Folder Server to change.
Action qualifiers
Qualifier
-if
Description
Type the ID of a network interface to assign to the Shared Folder Server. The interface assigns an IP address to the server and allows the server to communicate with the network and hosts. Manage network interfaces on page 99 explains how to create and manage network interfaces. Enable NFS shared folders on the Shared Folder Server. Value is yes or no. Default is yes. Enable CIFS shared folders on the Shared Folder Server. Value is yes or no. Default is no. For CIFS shared folders, type the Windows domain name. For CIFS shared folders, type the username of the administrator account within the Windows domain. For CIFS shared folders, type the user password of the administrator account within the Windows domain. For CIFS shared folders, type the organizational unit setting for the Active Directory domain. The default value is: ou=Computers:ou=EMC Celerra The Unisphere online help provides more details about this qualifier.
Example
The following command updates Shared Folder Server SFS_1 with these settings:
Enable support for CIFS shared folders. Use Windows domain: domain_1. Use organizational unit: unit_1.
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/nas/server -id SFS_1 set -enableCIFS yes -cifsDomain domain_1 -cifsDomUser user -cifsDomPwd password -cifsOrgUnit unit_1 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = SFS_1 Operation completed successfully.
84
Prerequisite
Before you can delete a Shared Folder Server, you must first delete all storage resources associated with it.
CAUTION
Deleting a Shared Folder Server removes all storage resources that use it, such as CIFS and NFS shared folders, and associated network shares and snapshots from the system. After the storage resource is deleted, the files and folders inside it cannot be restored from snapshots. Back up the data from the storage resource before deleting it from the system.
Format
/net/nas/server id <value> delete
Format
server -id <value> delete [-cifsDomUser <value> -cifsDomPwd <value>]
Object qualifier
Qualifier
-id
Description
Type the ID of the Shared Folder Server to delete.
Action qualifiers
Qualifier
-cifsDomUser
Description
Specifies the domain user. Note: specify to unjoin the CIFS server from the domain before deleting it.
-cifsDomPwd
Specifies the domain user password. Note: specify to unjoin the CIFS server from the domain before deleting it.
Example
The following command deletes Shared Folder Server SFS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/nas/server id SFS_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/net/iscsi/reversechap show
Example
The following command shows the current reverse CHAP setting: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/iscsi/reversechap show 1: Configured = yes
Format
/net/iscsi/reversechap set -secret <value>
Action qualifier
Qualifier Description
-secret Type the reverse CHAP secret authentication password. Default value is an ASCII string of 1216 characters.
86
Example
The following command sets the reverse CHAP secret to xyz0123456789: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/iscsi/reversechap set secret xyz0123456789 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/net/iscsi/reversechap reset
Example
The following command resets the reverse CHAP secret password: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/iscsi/reversechap reset Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
ID Server
Description
ID of the iSNS server record. Name or IP address of an iSNS server.
Format
/net/isns create -server <value>
Action qualifier
Qualifier
-server
Description
Type the name or IP address of the iSNS server.
Example
The following command creates an iSNS server record for server IP address 10.5.2.128. The server record receives the ID iSNS_10.5.2.128: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/isns create server 10.5.2.128 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = iSNS_10.5.2.128 Operation completed successfully.
Format
/net/isns show
88
Example
The following command shows details for the iSNS server record: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/isns show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID = iSNS_10.5.2.128 Server = 10.5.2.128
Format
/net/isns -id <value> delete
Object qualifiers
Qualifier
-id
Description
Type the ID of the iSNS server record to delete.
Example
The following command deletes the iSNS server record iSNS_10.5.2.128: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/isns delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
CHAP required
Description
Specifies whether CHAP authentication is required in order to access iSCSI storage. Valid values are: yes no
Format
/net/iscsi/config show The following command shows details for the iSCSI configuration: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/iscsi/config show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: Mutual CHAP required = yes
Format
/net/iscsi/config set -chapRequired {yes | no}
Action qualifiers
Qualifier
-chapRequired
Description
Specify whether CHAP authentication is required. Valid values are: yes no NOTE: Values are case-insensitive.
Example
The following command denies host access without CHAP authentication: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/iscsi/config set -chapRequired yes Storage system address:10.0.0.1
90
Attribute
ID Alias IQN
Description
ID of the iSCSI node. Name of the iSCSI node. iSCSI qualified name (IQN) for the node. The iSCSI protocol outlines a specific address syntax for iSCSI devices that communicate on a network. The iSCSI addresses are called IQNs. Each IQN includes a Type field, Date field, Naming Authority field, and String field. For example: iqn.1992-07.com.emc:apm000650039080000-3 Primary SP on which the node runs. Value is SPA or SPB. Health state of the iSCSI node. The health state code appears in parentheses. Value is one of the following: Unknown (0) Status is unknown. OK (5) Working correctly. Degraded/Warning (10) Working and performing all functions, but the performance may not be optimum. Critical failure (25) Failed and recovery may not be possible. This condition has resulted in data loss and should be remedied immediately. ID of each network interface assigned to the iSCSI node. The interface defines the IP address for the node and allows it to communicate with the network and hosts. Manage network interfaces on page 99 explains how to configure network interfaces on the system.
SP Health state
Interfaces
92
Format
/net/iscsi/node create -alias <value> -if <value>
Action qualifiers
Qualifier Description
-alias Type a name for the iSCSI node. The name cannot contain: \, /, :, ;, ,, =, *, +, |, [, ], ?, <, >, spaces, tabs, new lines, or ASCII control symbols. Note: Storage Server names can contain alphanumeric characters, a single dash, and a single underscore. Server names cannot contain spaces or begin or end with a dash. You can create Storage Server names in four parts that are separated by periods (example: aa.bb.cc.dd). Names can contain up to 255 characters, but the first part of the name (the part before the first period) is limited to 15 characters. -if Type the ID for each network interface to assign to the iSCSI node. Separate the IDs with a comma. You can assign up to two interfaces to an iSCSI node. Manage network interfaces on page 99 explains how to configure network interfaces on the system.
Example
The following command creates an iSCSI node with these settings:
Alias (name) is MyISCSINode1. Network interfaces if_1 and if_2 are assigned.
The iSCSI node receives ID iSCSI_node_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/iscsi/node create alias MyISCSINode1 -if if_1,if_2 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = ISCSIN_1 Operation completed successfully.
Format
/net/iscsi/node [id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of an iSCSI node.
Example
The following command lists all iSCSI nodes on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/iscsi/node show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Alias IQN Health state SP Interfaces ID Name IQN Health state SP Interfaces = = = = = = = = = = = = ISCSIN_1 MyISCSIserver1 iqn.1992-05.com.emc:fcnch0821001340000-1 OK (5) SPA IF_1,IF_2 ISCSIN_2 MyISCSIserver2 iqn.1992-05.com.emc:fcnch0821001340001-1 OK (5) SPA IF_1
2:
Format
/net/iscsi/node id <value> set [-if <value>]
Object qualifier
Qualifier
-id
Description
Type the ID of the iSCSI node to change.
Action qualifiers
Qualifier
-alias -if
Description
User-friendly name that identifies the iSCSI node. Type the ID for each network interface to assign to the iSCSI node. Separate the IDs with a comma. You can assign up to two interfaces to an iSCSI node. Manage network interfaces on page 99 explains how to configure network interfaces on the system.
Example
The following command assigns interface IF_1 to iSCSI node ISCSIN_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/iscsi/node -id ISCSIN_1 set if IF_1 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
94
Prerequisite
Before you can delete a Shared Folder Server, you must first delete all storage resources associated with it.
CAUTION
Deleting an iSCSI node removes all iSCSI storage resources and associated snapshots from the system. After the node is deleted, the files and folders inside it cannot be restored from snapshots. Back up the data from the node before deleting it from system.
Format
/net/iscsi/node id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the iSCSI node to delete.
Example
The following command deletes iSCSI node ISCSIN_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/iscsi/node id ISCSIN_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
ID Role
Description
ID of the port. Indicates whether the port is operating as a front-end or back-end port. Valid values are: frontend backend Name of the SP on which the port resides. Value is SPA or SPB. Types of network interfaces the port supports. The supported interfaces are dependent on the port type. Value is one of the following: mgmt Management interface. net Network interface for Windows (CIFS) and Linux/UNIX (NFS) storage. iscsi iSCSI interface for iSCSI storage. Manage network interfaces on page 99 explains how to configure network interfaces on the system. Maximum transmission unit (MTU) packet size (in bytes) that the port can transmit. Default is 1500 bytes per packet. Current link speed of the port. Health state of the port. The health state code appears in parentheses. Value is one of the following: Unknown (0) Status is unknown. OK (5) Port is operating normally. OK BUT (7) Lost communication, but the port is not in use. Minor failure (15) Lost communication. Check the network connection and connected cables. Major failure (20) Port has failed. Replace the SP that contains the port. Operational status of the port. The operational status codes appear in parentheses. If the port is in a link aggregation, the ID of the link aggregation appears. Manage link aggregations on page 107 explains how to configure link aggregations on the SP ports.
SP Supported types
Format
/net/port [-id <value> | -role {backend | frontend}] show
Object qualifier
Qualifier
-id -role
Description
Type the ID of the port. Identify whether the port is operating as a front-end or back-end port.
96
Example
The following command shows the port settings for a system with a single SP: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/port show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID SP Supported types MTU size Speed Status Aggregated port ID ID SP Supported types MTU size Speed Status Aggregated port ID ID SP Supported types MTU size Speed Status Aggregated port ID ID SP Supported types MTU Size Speed Status Aggregated port ID = = = = = = = = = = = = = = = = = = = = = = = = = = = = mgmt_SPA SPA mgmt 1500 100 mbps/full duplex OK None eth0_SPA SPA net, iscsi 1500 10 gbps OK la0_SPA eth1_SPA SPA net, iscsi 9000 1 gbps OK la0_SPA eth2_SPA SPA net, iscsi 9000 1 gbps OK None
2:
3:
4:
Format
/net/port -id <value> set -mtuSize <value>
Object qualifier
Qualifier
-id
Description
Type the ID of the frontend port.
Action qualifier
Qualifier
-mtuSize
Description
Type the maximum transmission unit packet size (in bytes) for the port. Default is 1500 bytes per packet.
Example
The following command sets the MTU size for Ethernet port 0 (eth0) on SP A to 9000 bytes: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/port id eth0_spa set mtuSize 9000 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = eth0_SPA Operation completed successfully.
98
Network interface for controlling access to Windows (CIFS) and UNIX/Linux (NFS) file storage. You assign the interface to a Shared Folder Server. iSCSI interfaces for controlling access to iSCSI storage. You assign the interface to an iSCSI node.
The system configures each interface on an SP port. You have the option of indicating which SP the interface will use, either a physical port or a link aggregation port. You also have the option of specifying a virtual LAN (VLAN) ID, for communicating with VLAN networks. View details about existing interfaces, including the management interface that was configured on the system through the Connection Utility. Each interface is identified by an ID. Table 24 on page 99 lists the interface attributes with a description of each.
Table 24 Interface attributes
Attribute
ID Type
Description
ID of the interface. Interface type. Value is one of the following: net Interface for file-based storage, such as shared folders. iscsI Interface for iSCSI storage. ID of the physical port or link aggregation on an SP on which the interface is running. The ID includes the port name and SP name. Virtual local area network (VLAN) ID for the interface. The interface uses the ID to accept packets that have VLAN tags. The value range is 04096. If the VLAN ID is 0, which is the default, packets do not have VLAN tags. The Unisphere online help provides more details about VLANs. MAC address of the interface. IP version 4 mode for the interface. The value is static, to indicate that a user must specify the IPv4 attributes for the interface. IP (version 4) address. IP (version 4) subnet mask. IP (version 4) gateway address. SP that uses the interface. Value is SPA or SPB.
Port VLAN ID
MAC address IPv4 mode IPv4 address IPv4 netmask IPv4 gateway SP
Create interfaces
Create an interface.
Format
/net/if create type {net|iscsi} -port <value> [-vlanId <value>] -ipv4 static -addr <value> -netmask <value> [-gateway <value>]
Action qualifiers
Qualifier
-type
Description
Type the interface type. Value is one of the following: net Interface for file-based storage, such as shared folders. iscsi Interface for iSCSI storage. Type the ID of the SP port or link aggregation that will use the interface. Use the following format: <port>_<sp> where: port Name of the port, such as eth0. sp Name of the SP that owns the port, such as SPA or SPB. View port settings on page 96 explains how to view the port IDs. Type the virtual LAN (VLAN) ID for the interface. The interface uses the ID to accept packets that have VLAN tags. The value range is 04096. If the VLAN ID is 0, which is the default, packets do not have VLAN tags. The Unisphere online help provides more details about VLANs. Specify to type the (IPv4) configuration information for the interface. Type the value static, to specify that you will manually type the configuration information. Note: If you include this qualifier, you must include the qualifiers -addr and -netmask to specify the IPv4 configuration information.
-port
-vlanId
-ipv4
Type the IP address for the interface. Type the subnet mask for the interface. Type the gateway for the interface. Note: This qualifier configures the default gateway for the specified SP.
Example
The following command creates a network interface for port eth0, that uses VLAN ID 1, on SP A. The interface receives the ID IF_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/if create type net port eth0_SPA vlanId 1 ipv4 static addr 192.168.1.1 -netmask 255.255.255.0 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = IF_1 Operation completed successfully.
View interfaces
View a list of interfaces on the system or a remote system used for replication. You can filter on the interface ID. Note: The show action command on page 21 explains how to change the output format.
Format
/net/if [{-id <value>|-remSys <value>}] show
Object qualifier
Qualifier
-id -remRes
Description
Type the ID of an interface. To view the interfaces on a remote storage resource in a replication session, type the ID of the remote storage resource.
Example
The following command displays all interfaces on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/if show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Port VLAN IPv4 IPv4 IPv4 SP ID Port VLAN IPv4 IPv4 IPv4 SP = = ID = address = subnet mask = gateway = = = = ID = address = subnet mask = gateway = = IF_1 eth0_spa 192.168.1.1 255.255.255.0 N/A SPA IF_2 eth1_spb 1 192.168.1.2 255.255.255.0 192.168.1.254 SPB
2:
Format
/net/if id <value> set [-vlanId <value>] [-ipv4 static [-addr <value>][-netmask <value>][-gateway <value>]]
Object qualifier
Qualifier
-id
Description
Type the ID of the interface to change.
Action qualifiers
Qualifier
-vlanId
Description
Type the virtual LAN (VLAN) ID for the interface. The interface uses the ID to accept packets that have VLAN tags. The value range is 04096. If the VLAN ID is 0 (default) packets do not have VLAN tags. The Unisphere online help provides more details on VLANs. Note: You cannot change the VLAN ID for the management interface.
-ipv4
Specify to type the (IPv4) configuration information for the interface. Type the value static, which specifies that you will manually type the configuration information. Note: If you include this qualifier, you must include the qualifiers -addr and -netmask to specify the IPv4 configuration information.
Type the IP address for the interface. Type the subnet mask for the interface. Type the gateway for the interface.
Example
The following command changes the IP address for interface IF_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/if id IF_1 set -ipv4 static -addr 192.168.1.1 -netmask 255.255.255.0 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = IF_1 Operation completed successfully.
Delete interfaces
Delete an interface. Note: You cannot delete the management interface. See the Unisphere online help for instructions on resetting the management interface.
CAUTION
Deleting an interface can break the connection between systems that use it, such as configured hosts.
Format
/net/if id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the interface to delete.
Example
The following command deletes interface IF_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/if id IF_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
ID Interface ID
Description
ID of the route. ID of the interface the route uses to reach the gateway. The interface is associated with a SP. View interfaces on page 101 explains how to view the network interface IDs. Type of route. Values are: default Default gateway the system uses when it cannot find a route to a connected node. host Static route to a specific host. net Static route to a subnet IP address. IP address of the target network node based on the specified route type. Value is one of the following: For default, there is no value, as the system will use the specified gateway IP address. For host, the value is the IP address of the host. For net, the value is a subnet IP address. For a subnet route, the IP address of the subnet mask. IP address of the gateway.
Route type
Target
Netmask Gateway
Create IP routes
Create an IP route. Note: To change a route, delete it and re-create it with the new settings.
Format
/net/route create if <value> type {default|host -target <value>|net -target <value> -netmask <value>} -gateway <value>
Object qualifiers
Qualifier
-if
Description
Type the ID of the interface that the route will use to reach the gateway. View interfaces on page 101 explains how to view the network interface IDs. Note: The system may not use the interface you type for the route. The system determines the best interface for the route automatically.
-type
Type the type of route. Value is one of the following: default System uses the default gateway when it cannot find a route to a connected node. host Create a route to a host. net Create a route to a subnet. Type the IP address for the target network node based on the value of -type. Value is one of the following: For default, the system will use the IP address specified for -gateway. For host, type the IP address of a target host. For net, type the IP address of a target subnet. Include the -netmask qualifier to specify the IP address of the subnet mask. For a route to a subnet, type the IP address of the subnet mask. Type the gateway IP address for the route.
-target
-netmask -gateway
Example
The following command creates a subnet route on interface IF_1 to target IP address 10.64.74.10: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/route create if IF_1 type net target 10.64.74.10 netmask 255.255.255.0 gateway 10.64.74.1 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = RT_1 Operation completed successfully.
View IP routes
View details about IP routes. You can filter on the route ID. Note: The show action command on page 21 explains how to change the output format.
Format
/net/route [-id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of a route.
Example
The following command displays details of the IP routes RT_1 and RT_2: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/route show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Type Target Netmask Gateway Interface ID Type Target Netmask Gateway Interface = = = = = = = = = = = = RT_1 net 10.64.74.10 255.255.255.0 10.0.0.1 IF_1 RT_2 default N/A 10.64.74.2 IF_2
2:
Delete IP routes
Delete an IP route.
Format
/net/route id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the route to delete.
Example
The following command deletes route RT_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/route id RT_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Increases overall throughput since two physical ports are linked into one logical port. Provides basic load balancing across linked ports since the network traffic is distributed across multiple physical ports. Provides redundant ports so that if one port in a linked pair fails, the system does not lose connectivity.
Note: With link aggregation, both linked ports must be connected to the same switch and the switch must be configured to use link aggregation that uses the Link Aggregation Control Protocol (LACP). The documentation that came with your switch should provide more information on using LACP. The Unisphere online help provides more details on cabling the SPs to the disk-array enclosures (DAEs). Table 26 on page 107 describes the attributes for link aggregation.
Table 26 Link aggregation attributes
Attribute
ID Ports SP MTU size Health state
Description
ID of the link aggregation. The ID is a combination of the link ID and the SP that contains the linked ports. IDs of the linked physical ports. The port names include the name of the SP that contains the ports. Name of the SP on which the ports are linked. Value is SPA or SPB. Maximum transmission unit (MTU) packet size (in bytes) for the linked ports. Default is 1500 bytes per packet. Health state of the link aggregation. The health state code appears in parentheses. Value is one of the following: Unknown (0) Status is unknown. OK (5) Working correctly. OK BUT (7) Lost connection, but the link aggregation is not in use. Degraded/Warning (10) Working and performing all functions, but the performance may not be optimum. Minor failure (15) Working and performing all functions, but overall performance is degraded. This condition has a minor impact on the system and should be remedied at some point, but does not need to be fixed immediately. Major failure (20) Failing and some or all functions may be degraded or not working. This condition has a significant impact on the system and should be remedied immediately. Critical failure (25) Failed and recovery may not be possible. This condition has resulted in data loss and should be remedied immediately. Non-recoverable error (30) Completely failed and cannot be recovered. Operational status of the link aggregation. The operational status code appears in parentheses.
Operational status
Format
/net/la create ports <value> [-mtuSize <value>]
Action qualifiers
Qualifier
-ports -mtuSize
Description
Type the IDs of the physical ports to link on the SP. Separate the IDs with a comma. For example, to link ports 0 and 1 on SPA, type: eth0_SPA,eth1_SPA. Type the MTU size (in bytes) for the linked ports. Default value is 1500. Note: If you want to support jumbo frames, type 9000.
Example
The following command links port 0 and port 1 on SPA with the default MTU size. The system has two SPs, so port 0 and port 1 on SPB are also linked, which results in two link aggregation IDs: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/la -create -ports eth0_SPA,eth1_SPA Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = la0_SPA ID = la0_SPB Operation completed successfully.
Note: The show action command on page 21 explains how to change the output format.
Format
/net/la [-id <value>] show
Object qualifier
Qualifier Description
-id Type the ID of the link aggregation.
Example
The following command shows the link aggregations on the system, in this case, for both SPA and SPB: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/la show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID SP Ports Health state ID SP Ports Health state = = = = = = = = la0_SPA SPA eth0_SPA,eth1_SPA OK (5) la0_SPB SPB eth0_SPB,eth1_SPB OK (5)
2:
Format
/net/la -id <value> set [-ports <value>] [-mtuSize <value>]
Object qualifier
Qualifier Description
-id Type the ID of the link aggregation to change.
Action qualifiers
Qualifier
-ports -mtuSize
Description
Type the IDs of the physical ports to link on the SP. Separate the IDs with a comma. For example, to link ports 0 and 1 on SPA, type: eth0_SPA,eth1_SPA Type the MTU size (in bytes) for the linked ports. Default is 1500 bytes per packet. Note: If you want to support jumbo frames, type 9000.
Example
The following command changes the MTU size for link aggregation la0_SPA to 9000 bytes. The system has two SPs, so MTU size is updated for both link aggregation IDs: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/la id la0_SPA set mtuSize 9000 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = la0_SPA ID = la0_SPB Operation completed successfully.
Format
/net/la [-id <value>] delete
Object qualifier
Qualifier
-id
Description
Type the ID of the link aggregation to delete.
Example
The following command deletes link aggregation la0_SPA. The system has two SPs, so link aggregation la0_SPB is also deleted: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/la id la0_SPA delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = la0_SPA ID = la0_SPB Operation completed successfully.
You must configure at least one valid DNS server entry in the domain for the system. Deleting the last DNS entry can disrupt network communication to the device, and potentially interrupt communication between the system and the hosts that use its storage resources. Table 27 on page 111 lists the attributes for DNS domains.
Table 27 DNS domain attributes
Attribute
ID Name Name servers
Description
ID of the DNS domain. Name of the DNS domain. List of IP addresses that correspond to the name servers in the domain.
Format
/net/dns/domain create -name <value> nameServer <value>
Action qualifiers
Qualifier
-name -nameServer
Description
Type the domain name for the DNS server. Type a list of IP addresses for each DNS server to include in the domain. Separate the addresses with a comma. Type the addresses in the order that the system should use them. Note: The domain can contain a maximum of three IP addresses.
Example
The following command adds two DNS servers to the domain domain.one.com. The servers are grouped by domain under the ID DNS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/dns/domain create name domain.one.com nameServer 10.64.74.34, 10.64.74.35 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = DNS_1 Operation completed successfully.
Format
/net/dns/domain [-id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of a DNS server domain.
Example
The following command lists all DNS server domains: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/dns/domain show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Name Servers = DNS_1 = domain.one.com = 10.64.74.1,10.64.74.201
Format
/net/dns/domain -id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID the DNS server domain to delete.
Example
The following command deletes the DNS domain domain.two.com: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/dns/domain delete id domain.two.com Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/net/dns/config set {-nameServer <value> | -noNameServer}
Action qualifier
Qualifier
-nameServer -noNameServer
Description
Type a list of DNS server addresses to designate as default addresses. Separate the addresses with a comma. The system uses the addresses in the order in which you type them. Clear the list of IP addresses.
Example
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/dns/config set -nameServer 128.222.132.29,128.222.132.32 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/net/dns/config show
Example
The following command displays the DNS server addresses: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/dns/config show 1. Name Servers = 128.222.132.29, 128.222.132.32
Minimizes the chance that synchronization issues will arise between the system and connected hosts. Reduces the difficulty of reconciling timestamps used for log information in the different systems.
Note: When using a Shared Folder Server for CIFS network shares, the system cannot access an Active Directory domain unless the system is synchronized within five minutes of the Active Directory controller for the domain where the network shares reside. You can configure a total of three NTP server addresses for the system. All NTP server addresses are grouped into a single NTP server record. You must configure at least 1 NTP server record on the system. Table 28 on page 115 lists the attributes for the NTP server record.
Table 28 NTP server record attributes
Attribute
ID Server
Description
ID of the NTP server record. Name or IP address of an NTP server.
Format
/net/ntp/server create server <value> [-force {noReboot | allowReboot | allowDU}]
Action qualifier
Qualifier
-server -force
Description
Type the name or IP address of an NTP server. Accept or decline the system reboot, which may be needed to complete the time change. If the qualifier isn't specified, you will be asked to confirm reboot if it's needed. Valid values are: noReboot, allowReboot allowDU. Note: allowDU is used if the system is in a degraded state or has one SP (data will be unavailable during its reboot). Otherwise allowReboot is used. In silent mode, system will be rebooted it needed.
Example
The following creates an NTP server record that contains NTP server address 0.north-america.pool.ntp.org: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/ntp/server create server 0.north-america.pool.ntp.org Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = NTP_0.north-america.pool.ntp.org Operation completed successfully.
Format
/net/ntp/server show
Example
The following command displays the NTP server record, which contains two NTP server addresses: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/ntp/server show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection
1.
2.
Format
/net/ntp/server id <value> delete
Action qualifier
Qualifier
-id
Description
Type the ID of the NTP server setting to delete.
Example
The following command deletes NTP server setting NTP_10.5.1.207: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/ntp/server id NTP_10.5.1.207 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
ID Domain IP addresses
Description
ID of the NIS server domain. Name of the NIS server domain. List of IP addresses of the NIS servers in the domain.
Format
/net/nis/domain create domain <value> ip <value>
Action qualifiers
Qualifier
-domain -ip
Description
Type a name for the NIS server domain. Type the IP addresses of the NIS servers to include in the domain. Separate the addresses with a comma.
Example
The following command creates NIS server domain nis.one.com with two NIS server addresses: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/nis/domain create domain nis.one.com ip 10.64.75.0,10.64.74.1 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = nis.one.com Operation completed successfully.
Format
/net/nis/domain [-id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of the NIS server domain.
Example
The following command displays details about the NIS server domain: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/nis/domain show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID = NIS_1 Domain = nis.one.com Servers = nisserver1.one.com,10.64.74.1
Format
/net/nis/domain id <value> set -ip <value>
Object qualifier
Qualifier
-id
Description
Type the ID of the NIS server domain to change.
Action qualifier
Qualifier
-ip
Description
Type the IP addresses of the NIS servers to include in the domain. Separate the addresses with a comma.
Example
The following command adds a new IP address to NIS server domain nis.two.com: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/nis id nis.two.com set ip 10.64.74.200 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = nis.two.com Operation completed successfully.
Format
/net/nis/domain id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the NIS server domain.
Example
The following command deletes the nis.one.com server domain: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/nis/domain id nis.one.com delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
E-mail alerts The system sends e-mail alerts of system events to the specified IP address when it encounters alert or error conditions. The system uses the first IP address you specify. ConnectEMC The system sends e-mail alerts of system events or errors to EMC support using ConnectEMC. After specifying the SMTP server IP address, enter the IP address for ConnectEMC.
Configure alert settings on page 287 explains how to specify the alert severity of which to e-mail alerts. All IP addresses are grouped under a single SMTP server setting. Table 30 on page 121 lists the attributes for SMTP server settings.
Table 30 SMTP server attributes
Attribute
ID Address
Description
ID of the SMTP server. IP address of the SMTP server.
Format
/net/smtp [-id <value>] show
Object qualifier
Qualifier Description
-id Type the ID of an SMTP server.
Example
The following command lists the IP addresses of the two SMTP servers in the setting: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/smtp show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID = default Address = 192.168.0.15 ID = connectEMC Address = 10.64.74.15
2:
Format
/net/smtp -id <value> set -addr <value>
Object qualifier
Qualifier Description
-id Type the ID of an SMTP server for which to specify an IP address.
Action qualifier
Qualifier Description
-addr Type the IP address for the SMTP server.
Example
The following command sets the IP address for the default SMTP server that the system will use: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/smtp -id default set -addr 10.64.74.16 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
Enabled Password
Description
Indication of whether NDP is enabled. Value is yes or no. Password for accessing the NDMP server.
Format
/net/ndmp show
Example
The following command displays the NDMP settings, which show that NDMP is enabled: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/ndmp show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: Enabled = yes
Format
/net/ndmp set -enabled yes {yes -passwd <value>|no}
Action qualifiers
Qualifier
-enabled -passwd
Description
Enable NDMP. Value is yes or no. For yes, type the NDMP server password. Type the password for the NDMP server. You must specify the password when enabling NDMP.
Example
The following command enables NDMP: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/ndmp set enabled passwd Password0123 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
ID Name Domain name Port Protocol
Description
ID of the LDAP server. Name of the LDAP server. Domain name for the LDAP server. Port number used by the directory server for LDAP communications. By default, LDAP uses port 389, and LDAP over an SSL uses port 636. Indication of whether the LDAP protocol uses SSL for secure network communication. SSL provides encryption and authentication capabilities. SSL encrypts data over the network and provides message and server authentication. Value is one of the following: ldap LDAP without SSL. ldaps LDAP with SSL, which is the default. Port number used by the directory server for LDAP communications. By default, LDAP uses port 389 and LDAP over SSL uses port 636. Base distinguished name (DN) of the root of the LDAP directory tree. The system uses the DN to bind to the LDAP service and determine where in the LDAP directory tree to begin a search for information. The base DN can be expressed as a fully qualified domain name or in X.509 format by using the attribute dc=. For example, if the fully qualified domain name is mycompany.com, the base DN is expressed as dc=mycompany,dc=com. Path to search for users on the directory server. For example: ou=People,dc=lss,dc=emc,dc=com On an Active Directory server, a default search path is used. Path to search for groups on the directory server. For example: uid=<name>,ou=people,dc=<domaincomponent>,or dc=<domain component>. On an Active Directory server, a default search path is used. Name of the LDAP attribute whose value indicates the user ID. Default value is uid. Name of the LDAP attribute whose value indicates the username. Default value is cn. Name of the LDAP attribute whose value indicates the group name. Default value is cn. LDAP object class for users. Default is user. In Active Directory, groups and users are stored in the same hierarchical directory path and the class is called group.
User ID attribute User name attribute Group name attribute User object class
Attribute
Group object class
Description
LDAP object class for groups. Default value is group. In Active Directory, groups and users are stored in the same directory path and the class is called group. Name of the LDAP attribute whose value contains names of group members within a group. Default value is member. Path to the trusted certificate file used for one-way LDAP server authentication. Timeout for the LDAP server in milliseconds. If the system does not receive a reply from the LDAP server after the specified timeout, it stops sending requests. Default value is 30,000 milliseconds, or 30 seconds.
Format
/net/ldap create -name <value> domain <value> [-port <value>] [-protocol {ldap|ldaps -certFilePath <value>}] -bindDn <value> -bindPasswd <value> -userSearchPath <value> [-groupSearchPath <value>] [-userIdAttr <value>] [-groupNameAttr <value>] [-userObjectClass <value>] [-groupObjectClass <value>] [-groupMemberAttr <value>] [-timeout <value>]
Action qualifiers
Qualifier
-name
Description
Type the IP address or hostname of the primary directory server to use for authentication. The value you type depends on the format of the subject field entry in the directory server's certificate. Typically, this requires a hostname. Type the domain name for the LDAP server. Specify whether the LDAP protocol uses SSL for secure network communication. SSL provides encryption and authentication capabilities. SSL encrypts data over the network and provides message and server authentication. Value is one of the following: ldap LDAP without SSL. ldaps LDAP with SSL, which is the default. Type the path to the trusted certificate file used for one-way server authentication. Note: If the value of -protocol is ldaps, this qualifier is required.
-domain -protocol
-certFilePath
-port -bindDn
Type the port number used by the directory server for LDAP communications. By default, LDAP uses port 389, and LDAP over an SSL uses port 636. Type the base distinguished name (DN) of the root of the LDAP directory tree. The system uses the DN to bind to the LDAP service and determine where in the LDAP directory tree to begin a search for information. The base DN can be expressed as a fully-qualified domain name or in X.509 format by using the attribute dc=. For example, if the fully-qualified domain name is mycompany.com, the base DN is expressed as dc=mycompany,dc=com. If you include the -bindDn qualifier, type the password to be used for binding to the LDAP server. Type the path to search for users on the directory server. For example: ou=People,dc=lss,dc=emc,dc=com On an Active Directory server, a default search path is used. Type the path to search for groups on the directory server. For example: ag.uid=<name>,ou=people,dc=<domaincomponent>,or dc=<domain component>. On an Active Directory server, a default search path is used. Type the name of the LDAP attribute whose value indicates the user ID. Default value is uid. Type the name of the LDAP attribute whose value indicates the group name. Default value is cn. Type the LDAP object class for users. Default value is user. In Active Directory, groups and users are stored in the same hierarchical directory path and the class is called group. Type the LDAP object class for groups. Default value is group. In Active Directory, groups and users are stored in the same directory path and the class is called group.
-bindPasswd -userSearchPath
-groupSearchPath
-groupObjectClass
-groupMemberAttr Type the name of the LDAP attribute whose value contains names of group members within a group. Default value is member. -timeout Type the timeout for the LDAP server in milliseconds. If the system does not receive a reply from the LDAP server after the specified timeout, it stops sending requests. Default is 30,000 milliseconds, or 30 seconds.
Example
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/ldap create name lpso242.lss.emc.com domain local port 389 protocol ldap bindDn cn=Directory Manager bindPasswd Password0123 userSearchPath ou=People,dc=lss,dc=emc,dc=com groupSearchPath ou=Groups,dc=lss,dc=emc,dc=com userIdAttr uid groupNameAttr cn userObjectClass interOrgPerson groupObjectClass groupOfUniqueNames groupMemberAttr uniqueMember timeout 40000 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = LDAP_1 Operation completed successfully.
Format
/net/ldap [-id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of the LDAP setting.
Example
The following command displays the LDAP settings: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/ldap show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Server name Domain Protocol Port = = = = = LDAP_1 lpso242.lss.emc.com local ldap 389
Format
/net/ldap id <value> set -name <value> [domain <value>] [-port <value>] [-protocol {ldap|ldaps -certFilePath <value>}] -bindDn <value> -bindPasswd <value> -userSearchPath <value> [-groupSearchPath <value>] [-userIdAttr <value>] [-groupNameAttr <value>] [-userObjectClass <value>] [-groupObjectClass <value>] [-groupMemberAttr <value>] [-timeout <value>]
Object qualifier
Qualifier
-id
Description
Type the ID of the LDAP setting to change.
Action qualifiers
Qualifier
-name -domain -port -protocol
Description
Type the name for the LDAP server. Type the domain name for the LDAP server. Type the port number used by the directory server for LDAP communications. By default, LDAP uses port 389, and LDAP over an SSL uses port 636. Type whether the LDAP protocol uses SSL for secure network communication. SSL provides encryption and authentication capabilities. SSL encrypts data over the network and provides message and server authentication. Value is one of the following: ldap LDAP without SSL. ldaps LDAP with SSL, which is the default. Type the path to the trusted certificate file used for one-way server authentication. Note: If the value of -protocol is ldaps, this qualifier is required.
-certFilePath
-bindDn
Type the base distinguished name (DN) of the root of the LDAP directory tree. The system uses the DN to bind to the LDAP service and determine where in the LDAP directory tree to begin a search for information. The base DN can be expressed as a fully qualified domain name or in X.509 format using the attribute dc=. For example, if the fully qualified domain name is mycompany.com, the base DN is expressed as dc=mycompany,dc=com. Type the password to be used for binding to the LDAP server. This qualifier is required when the -bindDn qualifier is included. Type the path to search for users on the directory server. For example: ou=People,dc=lss,dc=emc,dc=com. On an Active Directory server, a default search path is used. Type the path to search for groups on the directory server. For example: uid=<name>,ou=people,dc=<domaincomponent>,or dc=<domain component>. On an Active Directory server, a default search path is used. Type the name of the LDAP attribute whose value indicates the user ID. Default value is uid. Type the name of the LDAP attribute whose value indicates the group name. Default value is cn.
-bindPasswd -userSearchPath
-groupSearchPath
-userIdAttr -groupNameAttr
Qualifier
-userObjectClass
Description
Type the LDAP object class for users. Default value is user. In Active Directory, groups and users are stored in the same hierarchical directory path and the class is called group. Type the LDAP object class for groups. Default value is group. In Active Directory, groups and users are stored in the same directory path and the class is called group. Name of the LDAP attribute whose value contains names of group members within a group. Default value is member. Type the timeout for the LDAP server in milliseconds. If the system does not receive a reply from the LDAP server after the specified timeout, it stops sending requests. Default is 30000 milliseconds, or 30 seconds.
-groupObjectClass
-groupMemberAttr -timeout
Example
The following command updates the configured LDAP settings: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/ldap create auth lpaso242 protocol ldap server lpso242.lss.emc.com port 389 bindDn cn=Directory Manager bindPasswd Password0123 userSearchPath ou=People,dc=lss,dc=emc,dc=com groupSearchPath ou=Groups,dc=lss,dc=emc,dc=com userIdAttr uid userNameAttr cn groupNameAttr cn userObjectClass interOrgPerson groupObjectClass groupOfUniqueNames groupMemberAttr uniqueMember timeout 40000 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = LDAP_1 Operation completed successfully.
Format
ldap -id <value> verify
Object qualifiers
Qualifier
-id
Description
Identifies the LDAP server.
Example
The following command verifies the connection to the LDAP server: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/ldap id LDAP_1 verify Storage system address: 10.64.75.201 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/net/ldap id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the LDAP setting to delete.
Example
The following command deletes the LDAP_1 setting: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/ldap id LDAP_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
State
Description
The state of the Advanced storage access service. Possible values include: Disabled EnabledPerHost EnabledForAll Note: Values are case-insensitive.
Password
Format
net/sys/support/asa show Note: This setting is only effective if ASA is set to "EnablePerHost.
Example
The following command displays the Advanced storage access settings: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! net/sys/support/asa show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: State = disabled
Format
/net/asa set [-state {Disabled | EnabledPerHost | EnabledForAll}] [-passwd <value>]
Action Qualifiers
Qualifier
-state
Description
Specify whether the Advanced storage access service is enabled. Possible values include: Disabled - Advanced storage access service is disabled. EnabledPerHost - Only hosts with oermitted addresses have access permission. EnabledForAll - Any host has access permission. Specify the Advanced storage access user password. Note: This attribute is mandatory if the current state is being changed from Disabled to EnabledPerHost or EnabledForAll.
-passwd
Example
The following command changes the Advanced storage access password: uemcli /net/asa set -state EnabledPerHost -passwd newpassword Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
5
This chapter addresses the following topics:
Manage host configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Manage iSCSI initiators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Manage iSCSI CHAP accounts for one-way CHAP authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Manage remote storage systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Individual host configurations Enable you to define and control access to storage resources on a host-by-host basis. Subnet and netgroup configurations Enable you to define and control access to storage resources for multiple hosts or network segments.
For hosts that will access iSCSI storage, create an iSCSI port to specify the iSCSI initiator settings and assign it to a host configuration. Manage iSCSI initiators on page 143 explains how to configure iSCSI initiators for host configurations. Each host configuration is identified by an ID. Table 24 on page 136 lists the attributes for host configurations.
Table 24 Host configuration attributes
Attribute
ID Name Description Address
Description
ID of the host configuration. Name of the host configuration. Brief description of the host configuration. Hostname or IP address associated with the host, IP address of the subnet, or network address of the netgroup. Note: This information is required when connecting hosts to network shares on the system.
Netmask
Attribute
Type
Description
Type of host configuration. Value is one of the following: host Define and control access to storage resources on a host-by-host basis. subnet A subnet is a logical grouping of connected network devices. Devices on a subnet share contiguous ranges of IP addresses. A subnet mask, or network mask, defines the boundaries of an IP subnet. You can associate a host configuration with a subnet mask to define and control storage access for hosts on a particular network segment. netgroup A netgroup is a named sets of hosts, users, or domains on a network. A netgroup can provide a way to reference sets of Linux/UNIX hosts collectively for accessing storage over NFS. You can create a host configuration for a netgroup to define and control storage access for multiple Linux/UNIX hosts or users through a single configuration. Note: Typically, netgroups are accessible only through NIS. If NIS is not running, netgroups are not defined. Manage NIS server domains on page 118 explains how to configure NIS server communication.
OS type
Type of operating system (OS) that runs on the host or netgroup. Value is one of the following: undefined OS is not specified (default). other OS is unknown. win2003srv Windows Server 2003. winxp Windows XP. win2008srv Windows Server 2008. winvista Windows Vista. esx VMware ESX. redhat Red Hat Linux Enterprise. sles Suse Linux Enterprise. Indicates whether the host has access to Advanced storage access service. Valid values are: yes no Note: Values are case-insensitive.
ASA enabled
Note: This attribute is used if the host type is host or subnet. Note: This setting is only effective if ASA is set to "EnablePerHost.
Format
/remote/host create name <value> [-descr <value>] type {host -addr <value> [-osType {undefined|other|win2003srv|winxp|win2008srv|winvista|esx|redhat|sles}]|sub net -addr <value> -netmask <value>|netgroup -addr <value>}
Action qualifiers
Qualifier
-name -desc -addr
Description
Type a name for the host configuration. Type a brief description of the host configuration. Type the hostnames or IP addresses associated with the host, IP addresses of the subnet, or the network addresses of the netgroup. Separate each value with a comma. Note: This information is required when connecting hosts to network shares on the system.
-type
Specify the type of host configuration. Value is one of the following: host A host defines and controls access to storage resources on a host-by-host basis. subnet A subnet is a logical grouping of connected network devices. Devices on a subnet share contiguous ranges of IP addresses. A subnet mask, or network mask, defines the boundaries of an IP subnet. You can associate a host configuration with a subnet mask to define and control storage access for hosts on a particular network segment. netgroup A netgroup is a named sets of hosts, users, or domains on a network. A netgroup can provide a way to reference sets of Linux/UNIX hosts collectively for accessing storage over NFS. You can create a host configuration for a netgroup to define and control storage access for multiple Linux/UNIX hosts or users through a single configuration. Note: Typically, netgroups are only accessible through NIS. If NIS is not running, netgroups are not defined. Manage NIS server domains on page 118 explains how to configure NIS server communication.
-netmask -osType
Type the subnet mask IP address for the host configuration. Specify the type of operating system (OS) running on the host or netgroup. Value is one of the following: undefined OS is not specified (default). other OS is unknown. win2003srv Windows Server 2003. winxp Windows XP. win2008srv Windows Server 2008. winvista Windows Vista. esx VMware ESX. redhat Red Hat Linux Enterprise. sles SUSE Linux Enterprise.
-asaEnabled Specify whether the host has access to Advanced storage access service. Valid values are: yes no (default) Note: Values are case-insensitive.
Example 1
The following command creates a host configuration for a host with these settings:
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/host create name MyHost descr accounting -type host addr 10.64.74.10 -osType winxp Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = 1014 Operation completed successfully.
Example 2
The following command creates a host configuration for a subnet with these settings:
The host configuration receives ID 1015: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/host create name MySubnet descr subnet1 addr 192.168.10.0 netmask 255.255.255.0 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = 1015 Operation completed successfully.
Format
/remote/host [{-id <value>|-type {host|subnet|netgroup}}] show
Object qualifier
Qualifier
-id -type -asaEnabled
Description
Type the ID of a host configuration. Specify the host type. Value is one of the following: host, subnet, or netgroup. Show only hosts with DHSM access enabled.
Example
The following command lists all host configurations on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/host show Storage system address: 10.0.0.1 Storage system port: 443
HTTPS connection 1: ID Name Description Type Address Netmask OS type ID Name Description Type Address Netmask OS type = = = = = = = = = = = = = = 1014 Host1 Accounting host 10.64.74.10 winxp 1015 Subnet1 Testing subnet 192.168.10.0 255.255.255.0
2:
Format
/remote/host id <value> set [name <value>] [-descr <value>] [-addr <value>] [{-netmask <value>|-osType {undefined|other|win2003srv|winxp|win2008srv|winvista|esx|redhat|sles}}]
Object qualifier
Qualifier
-id
Description
Type the ID of the host configuration to change.
Action qualifiers
Qualifier
-name -desc -addr
Description
Type a name for the host configuration. Type a brief description of the host configuration. Type the hostnames or IP addresses associated with the host, IP addresses of the subnet, or the network addresses of the netgroup. Separate each value with a comma. Note: This information is required when connecting hosts to network shares on the system.
-netmask -osType
Type the subnet mask IP address for the host configuration. Specify the type of operating system (OS) running on the host or netgroup. Value is one of the following: undefined OS is not specified (default). other OS is unknown. win2003srv Windows Server 2003. winxp Windows XP. win2008srv Windows Server 2008. winvista Windows Vista. esx VMware ESX. redhat Red Hat Linux Enterprise. sles SUSE Linux Enterprise. Specify whether the host has access to Advanced storage access service. Valid values are: yes no (default). NOTE: This attribute is used if the host type is host or subnet.
-asaEnabled
Example
The following command updates the description of host configuration 1014 to indicate that it now holds the payroll database: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/host id 1014 set -descr Accounting osType winxp Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = 1014 Operation completed successfully.
Deleting a host configuration breaks the iSCSI-based storage connections associated with the configuration. Hosts that use the configuration for NFS-based storage connections, such as NFS shares, revert to the default access privileges for any storage resources that they can access.
Format
/remote/host id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the host configuration to delete.
Example
The following command deletes host configuration 1014: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/host id 1014 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
ID Host IQN CHAP users
Description
ID of the iSCSI port. ID of the host configuration iSCSI initiator is assigned. Manage host configurations on page 136 explains how to configure host configurations for each host connected to the system. iSCSI address (initiator IQN) of the iSCSI host, which represents the address of the iSCSI initiator. ID of the CHAP account configured for the iSCSI initiator that matches the initiator IQN address.
Format
/remote/iscsi/initiator create host <value> -iqn <value>
Action qualifiers
Qualifier
-host
Description
Type the ID of the host configuration to which to assign the iSCSI initiator. View host configurations on page 139 explains how to view the IDs of host configurations on the system. Type the iSCSI address (initiator IQN) of the iSCSI host, which represents the address of the iSCSI initiator. Note: Once you specify a CHAP secret for a host configuration, you can change it but not disable it.
-iqn
Example
The following command creates an iSCSI initiator for host configuration 1014. The iSCSI initiator receives ID ISCSII_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/iscsi/initiator create host 1014 -iqn "iqn.com.emc:14" Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection
Format
/remote/iscsi/initiator [{-id <value>|host <value>}] show
Object qualifiers
Qualifier
-id -host
Description
Type the ID of an iSCSI initiator. Type the ID of a host configuration to view the iSCSI initiators assigned to the host configuration.
Example
The following command lists all iSCSI initiators on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/iscsi/initiator show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID = HP_1 Host= 1014 IQN = iqn.com.emc:14
Deleting an iSCSI initiator breaks the associated iSCSI-based storage connections. To avoid data loss, ensure that all hosts using the iSCSI initiator have completed all operations before deleting the initiator.
Format
/remote/iscsi/initiator id <value> delete
Object qualifier
Qualifier Description
-id Type the ID of the iSCSI initiator to delete.
Example
The following command deletes iSCSI initiator ISCSII_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/iscsi/initiator -id ISCSII_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
One-way, where only the target authenticates the initiator. To set one-way CHAP authentication, create a CHAP account for a host configuration that access iSCSI storage. Reverse (also called mutual or two-way), where the target and initiator authenticate each other. Compared to one-way CHAP, enabling reverse CHAP provides an extra level of security. To set reverse CHAP, specify a reverse secret password. Manage reverse CHAP for mutual CHAP authentication on page 86 explains how to configure reverse CHAP authentication.
Each CHAP account is identified by an ID. Table 26 on page 146 lists the attributes for CHAP accounts.
Table 26 CHAP Account Attributes
Attribute
ID IQN Username Secret
Description
ID of the CHAP account. IQN address of the host (initiator). Username that matches the IQN address. Default is the IQN address. CHAP secret password.
Format
/remote/iscsi/chap create -iqn <value> -secret <value>
Action qualifiers
Qualifier
-iqn -secret
Description
Type the IQN address of the host (initiator). Type the CHAP secret password.
Example
The following command creates an iSCSI CHAP account for a host. It receives the ID CHAP_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/iscsi/chap create iqn iqn.1991-05.com.microsoft:cpc7745 -secret opqrstuvwxyz Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = CHAP_1 Operation completed successfully.
Format
/remote/iscsi/chap [-id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of an iSCSI CHAP account.
Example
The following command displays all iSCSI CHAP accounts on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/iscsi/chap show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID = CHAP_1 IQN = iqn.1991-05.com.microsoft:cpc7745 Username = iqn.1991-05.com.microsoft:cpc7745
Format
/remote/iscsi/chap -id <value> set -secret <value>
Object qualifier
Qualifier
-id
Description
Type the ID of the iSCSI CHAP account to change.
Action qualifier
Qualifier
-secret
Description
Type the CHAP secret password.
Example
The following command updates the secret password for iSCSI CHAP account CHAP_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/iscsi/chap id CHAP_1 set -secret abcdef123456 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/remote/iscsi/chap -id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the CHAP account to delete.
Example
The following command deletes iSCSI CHAP account CHAP_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/iscsi/chap id CHAP_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
ID Name Type Management address Source user name Source user password Destination user name Destination user password Passphrase
Description
ID of the remote system. Name of the remote system. Type of remote system. Value is VNXe or Celerra. Network name or management IP address of the remote system. For VNXe systems that are the source in a replication session, the username that is used to access the system. For VNXe systems that are the source in a replication session, the user password that is used to access the system. For VNXe systems that are the destination in a replication session, the username that is used to access the system. For VNXe systems that are the destination in a replication session, the user password that is used to access the system. For Celerra systems, the passphrase that is used between the source and destination systems in the replication connection.
Format
/remote/sys create -type {VNXe -srcUsername <value> srcPassword <value> -dstUsername <value> -dstPassword <value>|Celerra -name <value> -passPhrase <value>} -addr <value>
Action qualifiers
Qualifier
-name -addr -type -srcUsername -srcPassword -srfIf
Description
For EMC Celerra systems, type the name of the Control Station. Type the network name or IP address of the remote system. Specify the remote system type. Value is VNXe or Celerra. For VNXe systems that are the source in a replication session, type the username that is used to access the system. For VNXe systems that are the source in a replication session, type the user password that is used to access the system. The list of source interface identifiers used to create the interconnect between two systems.
-dstUsername For VNXe systems that are the destination in a replication session, type the username that is used to access the system. -dstPassword -passPhrase For VNXe systems that are the destination in a replication session, type the user password that is used to access the system. Type the passphrase that is used between the source and destination systems in the replication connection.
Example
The following command creates a remote system configuration with these settings:
Name is Remote1. Type is VNXe. Network address is 10.64.75.10. Includes access credentials for when the system is the source or destination. IP address is 10.64.75.10.
The configure remote system receives the ID RS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/sys create name Remote1 type vnxe srcUsername admin1 -srcPassword Password456! dstUsername admin2 dstPassword Password986! addr 10.64.75.10 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = RS_1 Operation completed successfully.
Format
/remote/sys id <value> verify
Object qualifier
Qualifier
-id
Description
Type the ID of a remote system configuration to verify the settings.
Example
The following command verifies remote system configuration RS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/sys id RS_1 verify Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/remote/sys [-id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of a remote system configuration.
Example
The following command lists all configurations for remote storage systems: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/sys show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Address Type ID Name Address Type = = = = = = = = RS_1 Celerra1 10.64.74.1 Celerra RS_2 Celerra2 10.64.74.2 Celerra
2:
Format
/remote/sys id <value> set [name <value>] [-addr <value>] [-dstUsername <value> -dstPassword <value>] [-passPhrase <value>]
Object qualifier
Qualifier
-id
Description
Type the ID of the remote system configuration to change.
Action qualifiers
Qualifier
-name -addr -dstUsername -dstPassword -passPhrase
Description
For Celerra systems, type the name of the system. Type the network name or management IP address of the remote system. For VNXe systems that are the destination in a replication session, type the username that is used to access the system. For VNXe systems that are the destination in a replication session, type the user password that is used to access the system. Type the passphrase that is used between the source and destination systems in the replication connection.
Example
The following command changes the name, IP address, and access credentials for remote system configuration RS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/sys id RS_1 set name Remote2 addr 10.64.74.2 -dstUsername Local/joe -dstPassword Password456! Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = RS_1 Operation completed successfully.
Before deleting a remote system configuration, ensure that all I/O operations on the system, such as active replication sessions, have completed to avoid data loss.
Format
/remote/sys id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the remote system configuration to delete.
Example
The following command deletes remote system configuration RS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /remote/sys id RS_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
6
This chapter addresses the following topics:
Manage Environment
Manage Storage Processor (SP) environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 Manage disk environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 Manage battery environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 Manage power supply environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Manage link control card (LCC) environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Manage SSD environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Manage disk array enclosure (DAE) environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Manage disk processor enclosure (DPE) environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Manage memory module environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Manage IO module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Manage cache card environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Manage I/O modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Code
0 5 10
Health state
Unknown OK Degraded/Warning
Reason(s)
The health of the component cannot be determined. The SP is operating normally. The write cache is disabled on the SP. The SP is starting. The SP has faulted. The SP is missing. The SP is not responding.
20
Major failure
Table 29 on page 156 lists the health state values for the storage processor environment in Service/Rescue mode.
Table 29 Storage processor health state values (Service/Rescue mode)
Code
0 10 20
Health state
Unknown Degraded/Warning Major failure
Reason(s)
The health of the component cannot be determined. A user has placed the SP into the Service mode. The system software on this SP has encountered a problem. The CPU in the SP has faulted. IO module 0 in the SP has faulted. IO module 1 in the SP has faulted. The CPU and IO module 0 in the SP have faulted. The CPU and IO module 1 in the SP have faulted. Memory DIMM 0 in the SP has faulted. Memory DIMM 0 and 1in the SP have faulted. Memory DIMM 1 in the SP has faulted. Memory DIMM 2 in the SP has faulted. Memory DIMMs in the SP have faulted. The SP has faulted. The SSD in the SP has faulted. The entire blade in the SP has faulted. The fibre cable connection in the SP has faulted. The enclosure in the SP has faulted. An I/O module in the SP is configured incorrectly. An unexpected error has occurred in the SP. A cable is in the wrong SAS port on the SP. No SAS port was found on the SP. There is an invalid disk configuration on the SP There is no I/O between ab I/O module in the SP and a link control card on a disk array enclosure. A FLARE DB disk in the storage processor has faulted. One of the first four disks have mismatched types. One of the first four disks have an invalid block size. One of the first four disks have mismatched size. DPE resume is missing an EMC serial number.
Format
/env/sp [-id <value>] show
Object qualifier
Qualifier
-id
Description
ID of the Storage Processor.
Example
The following command displays the existing SPs: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/sp show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID DPE Slot Health state Memory size Write cache size Read cache size ID DPE Slot Health state Memory size Write cache size Read cache size = = = = = = = = = = = = = = SPA DPE_1 1 OK (5) 34359738368 (32GB) 104857600 (100MB) 104857600 (100MB) SPB DPE_1 2 OK (5) 34359738368 (32GB) 34359738368 (32GB) 104857600 (100MB)
2:
Code
0 5
Health state
Unknown OK
Reason(s)
The health of the component cannot be determined. The disk is operating normally. The disk slot is empty. The disk is resynchronizing with the system. The disk cannot be used because the system has exceeded the maximum number of allowable disks. The disk is inserted in the wrong slot. The disk is removed The disk is offline. The disk has faulted. The disk is unsupported.
10
Degraded/Warning
15
Minor failure
20
Major failure
Format
/env/disk [-id <value>] show
Object qualifier
Qualifier
-id
Description
ID of the disk.
Example
The following command displays the existing disks: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/disk show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Enclosure Slot Health state User capacity Pool ID Enclosure Slot Health state = = = = = = = = = = Disk_0 DAE_1 0 OK (5) 2199023255552 (2TB) Performance Disk_1 DAE_1 1 OK (5)
2:
Code
0 5 10 20
Health state
Unknown OK Degraded/Warning Major failure
Reason(s)
The health of the component cannot be determined. The battery is operating normally. The battery is charging. The battery has faulted. The battery is missing.
Format
/env/bat [-id <value>] show
Object qualifier
Qualifier
-id
Description
ID of the battery.
Example
The following command displays a list of system batteries: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/bat show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID SP Slot Health state ID SP Slot Health state = = = = = = = = Bat_0 SPA 0 OK (5) Bat_0 SPA 1 Degraded/Warning (10)
2:
Code
0 5 20
Health state
Unknown OK Major failure
Reason(s)
The health of the component cannot be determined. The power supply is operating normally. The power supply has faulted. The power supply is not receiving power. The power supply has been removed.
Format
/env/ps [-id <value>] show
Object qualifier
Qualifier
-id
Description
ID of the power supply.
Example
The following command displays a list of system power supplies: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/ps show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID SP Slot Health state ID SP Slot Health state = = = = = = = = Pow_0 SPA 0 OK (5) Pow_1 SPA 1 OK(5)
2:
Code
0 5 20
Health state
Unknown OK Major failure
Reason(s)
The health of the component cannot be determined. The LCC is operating normally. The LCC has faulted. The LCC has been removed.
Format
/env/lcc [-id <value>] show
Object qualifier
Qualifier
-id
Description
ID of the LCC.
Example
The following command displays a list of system LCCs: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/lcc show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Slot Health state ID Slot Health state = LCC_0 = 0 = OK (5) = LCC_1 = 1 = OK(5)
2:
Code
0 5 10 20
Health state
Unknown OK Degraded/Warning Major failure
Reason(s)
The health of the component cannot be determined. The SSD is operating normally. The SSD is failing. The SSD has failed. The SSD has been removed.
Format
/env/ssd [-id <value>] show
Object qualifier
Qualifier
-id
Description
ID of the SSD.
Example
The following command displays a list of system SSDs: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/ssd show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID SP Health state ID SP Health state = SSD_0 = SPA = OK (5) = SSD_1 = SPA = OK(5)
2:
Code
0 5 7 10 20
Health state
Unknown OK OK_BUT Degraded/Warning Major failure
Reason(s)
The health of the component cannot be determined. The DAE is operating normally. The DAE is adjusting the communication speed. The DAE performance is degraded. The DAE has a disk drive- type mismatch. The DAE has taken a communication fault. The DAE has faulted. The DAE has a faulted LCC The DAE has been misconfigured. The DAE has been miscabled. The DAE has been removed. The DAE had taken a power fault. The DAE is connected to a faulted I/O module.
Format
/env/dae [-id <value>] show
Object qualifier
Qualifier
-id
Description
ID of the DAE.
Example
The following command displays a list of system DAEs: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/dae show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Slot Health state ID Slot Health state = DAE_0 = 0 = OK (5) = DAE_1 = 1 = OK(5)
2:
Code
0 5 7 10 20
Health state
Unknown OK OK But Degraded/Warning Major failure
Reason(s)
The health of the component cannot be determined. The DPE is operating normally. The DPE is adjusting the communication speed. The DPE performance is degraded. The DPE has a disk drive- type mismatch. The DPE has taken a communication fault. The DPE has faulted. The DPE has a faulted LCC The DPE has been misconfigured. The DPE has been miscabled. The DPE has been removed. The DPE had taken a power fault. The DPE is connected to a faulted I/O module. The DPE has taken an inter-processor control fault and needs to be recovered. The DPE has taken an inter-processor communication fault and needs to be recovered.
Format
env/dpe [-id <value>] show
Object qualifier
Qualifier
-id
Description
ID of the DPE.
Example
The following command displays a list of system DPEs: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/dpe show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Slot Health state ID Slot Health state = DPE_0 = 0 = OK (5) = DPE_1 = 1 = OK(5)
2:
Code
0 5 20
Health state
Unknown OK Major failure
Reason(s)
The health of the component cannot be determined. The memory module is operating normally. The memory module has faulted. The memory module has been removed.
Format
/env/mm [-id <value>] show
Object qualifier
Qualifier
-id
Description
ID of the memory module.
Example
The following command displays a list of system memory modules: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/mm show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID SP Slot Health state ID SP Slot Health state = MM_SPA_0 = SPA = 0 = OK (5) = MM_SPA_1 = SPA = 1 = OK (5)
2:
Manage IO module
Note: Install Service Pack 3 (SP3) or higher of the system management software to use this functionality. I/O modules provide connectivity between the SPs and the disk-array enclosure. You can view details about each I/O module installed in the system, such as the health state. Commit a newly added I/O module to configure it for use by the system. Each I/O module record and alert is identified by an ID.
Format
iomodule commit
Example
The following commits all uncommitted IO modules: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/iomodule commit Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Code
0 5 20
Health state
Unknown OK Major failure
Reason(s)
The health of the component cannot be determined. The memory module is operating normally. The cache protection module has faulted. The cache protection module has been removed.
Format
iomodule [-id <value>] show
Object qualifier
Qualifier
-id
Description
ID of the IO module.
Example
The following command displays a list of system IO modules: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/iomodule show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID SP Slot Health state ID SP Slot Health state = IO_SPA_0 = SPA = 0 = OK (5) = IO_SPA_1 = SPA = 1 = Degraded/Warning (10)
2:
Code
0 5 10 20
Health state
Unknown OK Degraded/Warning Major failure
Reason(s)
The health of the component cannot be determined. The cache protection module is operating normally. the cache protection module is degraded. The cache protection module has been removed. The cache protection module has faulted.
Format
/env/ccard [-id <value>] show
Object qualifier
Qualifier
-id
Description
ID of the cache card.
Example
The following command displays a list of system cache cards: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/ccard show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Slot Health state = EHM_0 = 0 = OK (5)
Attribute
ID SP Slot Name Health state
Description
ID of the I/O module. ID of the SP to which the I/O module is connected. Disk-processor enclosure (DPE) slot in which the I/O module is installed. Name of the I/O module. Health state of the I/O module. The health state code appears in parentheses. Value is one of the following: Unknown (0) Unable to determine the health of the I/O module. OK (5) I/O module is operating normally. Degraded/Warning (10) I/O module has not been committed (configured). Commit I/O modules on page 170 explains how to commit an I/O module. Minor failure (15) One or both of the following may have occurred: - I/O module has not been committed (configured) after a rebooting the SP. - I/O module is installed in the wrong slot. Major failure (20) One or both of the following may have occurred: - I/O module has been removed. Re-install the I/O module. - I/O module has faulted and needs to be replaced. The Unisphere online help explains how to order a replacement I/O module. - I/O module is misconfigured. Commit the I/O module to re-configure it. EMC Part Number on the I/O module. EMC Serial Number on the I/O module. Model of the I/O module.
Format
/env/iomodule commit
Example
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/iomodule commit Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection
Format
/env/iomodule [id <value>] show
Object qualifier
Qualifier
-id
Description
Enter the ID of an I/O module.
Example
The following command displays details about the two I/O modules in the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /env/iomodule show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID SP Slot Health state ID SP Slot Health state = = = = = = = = IO_SPA_0 SPA 0 OK (5) IO_SPA_1 SPA 1 Degraded/Warning (10)
2:
7
This chapter addresses the following topics:
Manage Storage
Configure storage pools automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Configure custom storage pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 View storage profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Manage disk groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 View local storage pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 View supported storage resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Manage shared folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Manage CIFS settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 Manage NFS network shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Manage CIFS network shares. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Manage generic iSCSI storage resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 Manage iSCSI virtual disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 Manage VMware NFS datastores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Manage VMware VMFS datastores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 MS Exchange 2007 resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 MS Exchange 2010 resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 MS Exchange 2007 storage group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 MS Exchange 2010 storage group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 MS Exchange 2007 virtual disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 MS Exchange 2010 virtual disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Hyper-V resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Manage data deduplication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Attribute
Target
Description
Type of disk configuration. Value is one of the following: pool Disks configured in a pool. spares Disks assigned to storage pools as spares. The number of spares assigned to a pool is dependent on the disk type and pool type: - For Capacity pools, no spare disks are assigned. - For Performance pools, a spare disk is assigned for the first 030 disks, and then another spare disk is assigned for every group of thirty disks after that. - For Flash pools, a spare disk is assigned for the first 030 disks, and then another spare disk is assigned for every group of thirty disks after that. Name of the pool. The system allocates disks to one or more of the following pools based on the types and characteristics of the disks on the system: Capacity Storage allocated from near-line (NL) serial attached SCSI (SAS) disks. Provides high-capacity storage, but with lower overall performance to regular SAS and Enterprise Flash Drive (EFD) disks. Use NL SAS disks to provide extremely economical storage for operations, such as data backup, that do not require high I/O performance. Performance Storage allocated from serial attached SCSI (SAS) disks. Provides medium performance and medium capacity storage for applications that require balance of performance and capacity. Flash Storage allocated from EFD disks. Extremely high level performance, but at a relatively high cost per GB of storage. EFDs are most applicable to applications that require high I/O performance and energy efficiency. Depending on the pool type, the system configures the disks into different RAID groups and assigns disks to pools as spares. The Unisphere online help provides more details about storage pools and spares. List of disks currently in the pool. List of disks to be added to the pool.
Name
Format
/stor/config/auto set
Example
The following command initiates automatic storage pool configuration: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/config/auto set Storage system address: 10.0.0.1
Format
/stor/config/auto show
Example
The following command shows how storage pools and spares will be configured automatically on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/config/auto show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: Target = Name = Drives (current) = Drives (new) = Target = Name = Drives (current) = Drives (new) = Target = Name = Drives (current) = Drives (new) = Pool Performance 6 x 600GB SAS; 6 x 300GB SAS 3 x 600GB SAS Pool Capacity 10 x 1TB FAT-SAS 2 x 1TB FAT-SAS Pool Flash 10 x 100GB EFD 10 x 100GB EFD
2:
3:
4:
Target = Spares Drives (current) = 1 x 600GB SAS; 1 x 300GB SAS; 1 x 1TB FAT-SAS Drives (new) = 1 x 100GB EFD
Type of disk used to provide the storage. RAID level implemented for the storage.
Note: Before you create storage resources, you must configure at least one storage pool. Configure storage pools automatically on page 174 explains how to have the system configure storage pools automatically. Table 42 on page 176 lists the attributes for storage pools.
Table 42 Custom storage pool attributes
Attribute
ID Name Description Total space Current allocation Remaining space Subscription
Description
ID of the storage pool. Name of the storage pool. Brief description of the storage pool. Total storage capacity of the storage pool. Amount of storage in the storage pool allocated to storage resources. Amount of storage in the storage pool not allocated to storage resources. For thin provisioning, the total storage space subscribed to the storage pool. All storage pools support both standard and thin provisioned storage resources. For standard storage resources, the entire requested size is allocated from the pool when the resource is created, for thin provisioned storage resources only incremental portions of the size are allocated based on usage. Because thin provisioned storage resources can subscribe to more storage than is actually allocated to them, storage pools can be over provisioned to support more storage capacity than they actually possess. The system automatically generates an alert when the total pool usage reaches 85% of the pool's physical capacity. -alertThreshold specifies the alert threshold value. For thin provisioning, the percentage of the total space in the storage pool that is subscription storage space. Threshold for the system to send an alert when hosts have consumed a specific percentage of the subscription space. Value range is 50 to 85. List of the types of disks on the system, including the number of disks of each type, in the storage pool. Total number of disks in the storage pool. Number of disks in the storage pool that are not being used. RAID level of the disks in the storage pool. Number of disks the data is striped across.
Subscription percent Alert threshold Drives Number of drives Number of unused drives RAID level Stripe length
Attribute
System defined pool Health state
Description
Indication of whether the system configured the pool automatically. Value is yes or no. Health state of the storage pool. The health state code appears in parentheses. Value is one of the following: Unknown (0) Health is unknown. OK (5) Operating normally. Degraded/Warning (10) Pool is operating, but degraded due to one or more of the following: - Pool has exceeded the user-specified threshold. - Pool is nearing capacity. - Pool is almost full. - Pool performance has degraded. Major failure (20) Dirty cache has made the pool unavailable. Critical failure (25) Pool is full. To avoid data loss, add more storage to the pool, or create more pools. Non-recoverable error (30) Two or more disks in the pool have failed, possibly resulting in data loss. Recommended storage resource type and storage usage type for the pool.
Recommended resource
Format
/stor/config/pool create name <value> [-descr <value>] storProfile <value> -diskGroup <value> -drivesNumber <value> [-alertThreshold <value>] [resType {exchange|sf|vmware|iscsi|hyperv} usage {general|database|backup|datastore|exchange07|exchange10}]
Action qualifiers
Qualifier
-name -descr -storProfile
Description
Type a name for the storage pool. Type a brief description of the storage pool. Type the ID of the storage profile to apply to the storage pool, based on the type of storage resource that will use the pool and the intended usage of the pool. View storage profiles on page 182 explains how to view the IDs of available storage profiles on the system. Type the ID of the disk group to use in the storage pool. View disk groups on page 185 explains how to view the IDs of the disk groups on the system. Specify the number of disks from the selected disk group to use in the storage pool. For thin provisioning, specify the threshold, as a percentage, when the system will alert on the amount of subscription space used. When hosts consume the specified percentage of subscription space, the system sends an alert. Value range is 50% to 85%. Specify the type of storage resource that will use the storage pool. Value is one of the following: exchange Microsoft Exchange storage. sf Shared folder storage. vmware VMware datastore storage. iscsi Generic iSCSI storage. hyperv Microsoft Hyper-V storage. Specify how the storage resource, specified for -resType, will use the storage pool. Value is one of the following: general General use. Supported storage resource types are generic iSCSI and shared folder. database Store a database. Supported storage resource types are generic iSCSI and shared folder. backup Back up data. Supported storage resource types are generic iSCSI and shared folder. datastore Store virtual machines. Supported storage resource types are VMware and Hyper-V. exchange07 Store data for Microsoft Exchange 2007. exchange10 Store data for Microsoft Exchange 2010.
-diskGroup
-drivesNumber -alertThreshold
-resType
-usage
Example
The following command creates a storage pool that uses storage profile SP_1 and seven disks from disk group DG_1. The configured storage pool receives ID SPL_4: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/config/pool create -name GlobalPool1 descr Oracle databases storProfile SP_1 diskGroup DG_1 drivesNumber 7 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = SPL_4 Operation completed successfully.
Format
/stor/config/pool [id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of a storage pool.
Example
The following command shows details about all storage pools on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/config/pool show -detail Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Description Total space Current allocation Remaining space Subscription Subscription percent Alert threshold Drives Number of drives Unused drives RAID level System defined pool Health state Recommended resource ID Name Description Total space Current allocation Remaining space Subscription Subscription percent Alert threshold Drives Number of drives Unused drives RAID level System defined pool Health state Recommended resource = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = SPL_1 Performance 4947802324992 (4.5TB) 3298534883328 (3TB) 4947802324992 (1.5TB) 10995116277760 (10TB) 222% 70% 6 x 600GB SAS; 6 x 300GB SAS 12 3 5 yes OK (5) VMware General SPL_2 Capacity 4947802324992 (4.5TB) 3298534883328 (3TB) 4947802324992 (1.5TB) 10995116277760 (10TB) 222% 70% 12 x 2TB FAT-SAS 12 7 6 yes OK (5) VMware - Database
2:
Format
/stor/config/pool -id <value> set -alertThreshold <value>
Object qualifier
Qualifier Description
-id Type the ID of the storage pool to change.
Action qualifier
Qualifier
-alertThreshold
Description
For thin provisioning, specify the threshold, as a percentage, when the system will alert on the amount of subscription space used. When hosts consume the specified percentage of subscription space, the system sends an alert. Value range is 50% to 85%.
Example
The following command sets the subscription alert threshold for storage pool SPL_1 to 70%: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/config/pool -id SPL_1 -alertThreshold 70 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/stor/config/pool id <value> extend -diskGroup <value> -drivesNumber <value>
Object qualifier
Qualifier
-id
Description
Type the ID of the storage pool to extend.
Action qualifiers
Qualifier
-diskGroup -drivesNumber
Description
Type the ID of the disk group to add to the storage pool. Type the number of disks from the specified disk group to add to the storage pool.
Example
The following command extends storage pool SPL_1 with seven disks from disk group DG_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/config/pool id SPL_1 extend diskGroup DG_1 drivesNumber 7
Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/stor/config/pool [id <value>] recycle
Object qualifier
Qualifier
-id
Description
Type the ID of the storage pool from which to remove unused disks. Note: If you do not include this qualifier to specify a storage pool, the system will remove unused disks from all storage pools.
Example
The following command removes unused disks from storage pool SPL_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/config/pool id SPL_1 recycle Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Types of storage resources that will use the pools. Intended usage of the pool.
For example, create a storage pool for shared folder storage resources intended for general use. When configuring a storage pool, specify the ID of the storage profile to apply to the pool. Note: Storage profiles are not restrictive with regard to storage provisioning. For example, you can provision shared folders from a generic iSCSI database storage pool. However, the characteristics of the storage will be best suited to the indicated storage resource type and use. Each storage profile is identified by an ID. Table 43 on page 182 lists the attributes for storage profiles.
Table 43 Storage profile attributes
Attribute
ID Description Drive type RAID level
Description
ID of the storage profile. Brief description of the storage profile. Types of disks for the storage profile. RAID level number for the storage profile. Value is one of the following: 1 RAID level 1. 5 RAID level 5. 6 RAID level 6. 10 RAID level 1+0. Maximum storage capacity for the storage profile. Number of disks the data is striped across.
Note: The show action command on page 21 explains how to change the output format.
Format
/stor/config/profile [id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of a storage profile.
Example
The following command shows details for all storage profiles on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/config/profile show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Description Drive type RAID level Maximum capacity Stripe length ID Description Drive type RAID level Maximum capacity Stripe length ID Name Drive type RAID level Maximum capacity Stripe length = = = = = = = = = = = = = = = = = = SP_1 Best Performance SAS 5 1099511627776 (1TB) 6 SP_2 High Capacity FAT-SAS 6 21990232555520 (20TB) 6 SP_3 Performance SAS 5 5937362789990 (5.4TB) 5
2:
3:
Format
/stor/config/profile recom resType {exchange|sf|vmware|iscsi|hyperv} usage {general|database|backup|datastore|exchange07|exchange10}
Action qualifiers
Qualifier
-resType
Description
Specify the type of storage resource that will use the storage pool. Value is one of the following: exchange Microsoft Exchange storage. sf Shared folder storage. vmware VMware datastore storage. iscsi Generic iSCSI storage. hyperv Microsoft Hyper-V storage. Specify how the storage resource, specified for -reType, will use the storage pool. Value is one of the following: general General use. Supported storage resource types are generic iSCSI and shared folder. database Store a database. Supported storage resource types are generic iSCSI and shared folder. backup Back up data. Supported storage resource types are generic iSCSI and shared folder. datastore Store virtual machines. Supported storage resource types are VMware and Hyper-V. exchange07Store data for Microsoft Exchange 2007. exchange10Store data for Microsoft Exchange 2010.
-usage
Example
The following command shows the recommended storage profiles to apply to a storage pool that will be used for general purposes to store generic iSCSI data: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/config/profile recom resType generic usage general Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Ranking Description Drive type RAID level Maximum capacity Stripe length ID Ranking Description Drive type RAID level Maximum capacity Stripe length ID Ranking Description Drive type RAID level Maximum capacity Stripe length = = = = = = = = = = = = = = = = = = = = = SP_1 3 Best Performance SAS 5 4398046511104 (4TB) 6 SP_2 2 High Capacity FAT-SAS 6 13194139533312 (12TB) 6 SP_3 1 Performance EFD 5 107374182400 (100GB) 5
2:
3:
Attribute
ID Drive type Drive size Rotational speed Number of drives Unconfigured drives Capacity Number of spares Recommended number of spares Allowed number of spares
Description
ID of the disk group. Type of disks in the disk group. Capacity of one disk in the disk group. Rotational speed of the drives in the group. Total number of disks in the disk group. Total number of disks in the disk group that are not in a storage pool. Total capacity of all disks in the disk group. Total number of disks in the disk group reserved as spares. Number of spares recommended for the disk group. Range of the number of spares allowed for the disk group.
Format
/stor/config/dg [id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of a disk group.
Example
The following command shows details about all disk groups: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/config/dg show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Drive type Drive size Rotational speed Number of drives Unconfigured drives Capacity Number of spares Recommended number of spares Allowed number of spares ID Drive type Drive size Rotational speed Number of drives Unconfigured drives Capacity Number of spares Recommended number of spares Allowed number of spares ID Drive type Drive size Rotational speed Number of drives Unconfigured drives Capacity Number of spares Recommended number of spares Allowed number of spares = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = DG_1 FAT-SAS 536870912000 (500GB) 10000 rpm 21 7 11544872091648 (10.5TB) 0 1 0-7 DG_2 FAT-SAS 1099511627776 (1TB) 7200 rpm 14 0 15393162788864 (14TB) 1 1 0-1 DG_3 SAS 107374182400 (100GB) 1000 rpm 10 3 1099511627776 (1TB) 0 1 0-3
2:
3:
Format
/stor/config/dg id <value> set spares <value>
Object qualifier
Qualifier
-id
Description
Type the ID of the disk group to change.
Action qualifier
Qualifier
-spares
Description
Type the number of disks in the disk group to reserve as spares.
Example
The following command reserves two spares in disk group DG_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/config/dg id DG_1 set spares 2 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/stor/config/dg recom {profile <value>|-pool <value>}
Action qualifiers
Qualifier Description
-profile -pool Type the ID of a storage profile. The output will include the list of disk groups recommended for the specified storage profile. Type the ID of a storage pool. The output will include the list of disk groups recommended for the specified storage pool.
Example
The following command shows the recommended disk groups for storage profile SPL_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/config/dg recom -pool SPL_1 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID = Drive type = Drive size = Number of drives = Allowed numbers of drives = Capacity = ID = Drive type = Drive size = Number of drives = Allowed numbers of drives = Capacity = DG_1 SAS 536870912000 (500GB) 8 4,8 4398046511104 (4TB) DG_2 SAS 268435456000 (250GB) 4 4 1099511627776 (1TB)
2:
Reserved from a storage pool for a storage resource, such as a shared folder or generic iSCSI storage. Provisioned to an SP.
You can see the relationship between the local storage pool and the SP that it is using, including the capacity size of the pool. Table 45 on page 189 lists the attributes for local storage pools.
Table 45 Local storage pool attributes
Attribute
Name SP Size
Description
Name of the pool. Name of the SP on which the pool is configured. Value is SPA or SPB. Capacity size of the pool.
Note: The show action command on page 21 explains how to change the output format.
Format
/stor/prov/pool [sp {a|b}] show
Object qualifier
Qualifier
-sp
Description
Type the name of an SP. Value is a or b.
Example
The following command displays the list of pools on different storage processors with the size available: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/pool show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: Name = Performance SP = SPA Size = 1319413953331 (1.2TB) Name = Performance SP = SPB Size = 1099511627776 (1TB) Name = Capacity SP = SPA Size = 5937362789990 (5.4TB) Name = Capacity SP = SPB Size = 3518437208883 (3.2TB)
2:
3:
4:
5:
Attribute
ID Name
Description
ID of the storage resource. Name of the storage resource. Value is one of the following: Shared Folders Shared folder storage. iSCSI Generic iSCSI storage. Name of the vendor associated with the storage resource. Version of the storage resource. Feature license associated with the storage resource.
Note: The show action command on page 21 explains how to change the output format.
Format
/stor/prov/sr show
Example
The following command lists all storage resources supported on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/sr show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Vendor Version License ID Name Vendor Version License = = = = = = = = = = sf Files & Shared Folders EMC v1.0 FFFF-FFFF-FFFF-AAAA iscsi Generic Storage EMC 10.1.0.5 FFFF-FFFF-FFFF-BBBB
2:
Common Internet File System (CIFS) shares, which provide storage access to Windows hosts. Network file system (NFS) shares, which provide storage access to Linux/UNIX hosts.
Each shared folder is identified by an ID. Table 47 on page 192 lists the attributes for shared folders.
Table 47 Shared folder attributes
Attribute
ID Name Description Health state
Description
ID of the shared folder. Name of the shared folder. Description of the shared folder. Health state of the shared folder. The health state code appears in parentheses. Value is one of the following: OK (5) Shared folder is operating normally. Degraded/Warning (10) Working, but one or more of the following may have occurred: - One or more of its storage pools are degraded. - Its replication session is degraded. - Its replication session has faulted. - It has almost reached full capacity. Increase the primary storage size, or create additional shared folders to store your data, to avoid data loss. Change shared folder settings on page 198 explains how to change the primary storage size. Minor failure (15) One or both of the following may have occurred: - One or more of its storage pools have failed - The associated Shared Folder Server has failed. Major failure (20) One or both of the following may have occurred: - One or more of its storage pools have failed. - Shared folder is unavailable. Critical failure (25) One or more of the following may have occurred: - One or more of its storage pools are unavailable. - Shared folder is unavailable. - Shared folder has reached full capacity. Increase the primary storage size, or create additional shared folders to store your data, to avoid data loss. Change shared folder settings on page 198 explains how to change the primary storage size. Non-recoverable error (30) One or both of the following may have occurred: - One or more of its storage pools are unavailable. - Shared folder is unavailable. Name of the primary Shared Folder Server that the shared folder uses. Name of the storage pool that the shared folder uses. Protocol used to enable network shares from the shared folder. Values is one of the following: nfs Protocol for Linux/UNIX hosts. cifs Protocol for Windows hosts.
Attribute
Size Size used Maximum size Thin provisioning enabled
Description
Quantity of storage reserved for primary data. Quantity of storage currently used for primary data. Maximum size to which you can increase the primary storage capacity. Indication of whether thin provisioning is enabled. Value is yes or no. Default is no. All storage pools support both standard and thin provisioned storage resources. For standard storage resources, the entire requested size is allocated from the pool when the resource is created, for thin provisioned storage resources only incremental portions of the size are allocated based on usage. Because thin provisioned storage resources can subscribe to more storage than is actually allocated to them, storage pools can be over provisioned to support more storage capacity than they actually possess. The Unisphere online help provides more details on thin provisioning. If enabled, the quantity of primary storage currently allocated through thin provisioning. Quantity of storage reserved for protection data. Quantity of storage currently used for protection data. If thin provisioning is enabled, the quantity of protection storage currently allocated through thin provisioning. Maximum size to which you can increase protection storage capacity. Indication of whether auto-adjust protection is enabled. Value is yes or no. This feature automatically adjusts the size of the protection storage in proportion with changes to the size of the primary storage. ID of an applied protection schedule. View protection schedules on page 71 explains how to view the IDs of schedules on the system. Indication of whether an applied protection schedule is currently paused. Value is yes or no. Indication of whether file-level retention (FLR) is enabled. Value is yes or no. FLR provides a way to set file-based permissions to limit write access to the files for a specific period of time. In this way, file-level retention can ensure the integrity of data during that period by creating an unalterable set of files and directories. Note: File-level retention prevents files from being modified or deleted by NAS clients and users. Once you enable FLR for a Windows shared folder, you cannot disable it. Leave FLR disabled unless you intend to implement self-regulated archiving and you intend the administrator to be the only trusted user of the shared folder on which FLR is enabled. The Unisphere online help and the host documentation provide more details on FLR.
Current allocation Protection size Protection size used Protection current allocation Maximum protection size Auto-adjust protection size
Protection schedule
Attribute
CIFS synchronous write
Description
Indication of whether CIFS synchronous writes option is enabled. Value is yes or no. The CIFS synchronous writes option provides enhanced support for applications that store and access database files on Windows network shares. On most CIFS filesystems read operations are synchronous and write operations are asynchronous. When you enable the CIFS synchronous writes option for a Windows (CIFS) shared folder, the system performs immediate synchronous writes for storage operations, regardless of how the CIFS protocol performs write operations. Enabling synchronous write operations allows you to store and access database files (for example, MySQL) on CIFS network shares. This option guarantees that any write to the share is done synchronously and reduces the chances of data loss or file corruption in various failure scenarios, for example, loss of power. Note: Do not enable CIFS synchronous writes unless you intend to use the Windows shared folders to provide storage for database applications. The Unisphere online help provides more details on CIFS synchronous write.
CIFS oplocks
Indication of whether opportunistic file locks (oplocks) for CIFS network shares are enabled. Value is yes or no. Oplocks allow CIFS clients to buffer file data locally before sending it to a server. CIFS clients can then work with files locally and periodically communicate changes to the system, rather than having to communicate every operation to the system over the network. This feature is enabled by default for Windows (CIFS) shared folders. Unless your application handles critical data or has specific requirements that make this mode or operation unfeasible, leave oplocks enabled. The Unisphere online help provides more details on CIFS oplocks. Indication of whether write notifications for CIFS network shares are enabled. Value is yes or no. When enabled, Windows applications receive notifications each time a user writes or changes a file on the CIFS share. Note: If this option is enabled, the value for CIFS directory depth indicates the lowest directory level to which the notification setting applies.
Indication of whether file access notifications for CIFS shares are enabled. Value is yes or no. When enabled, Windows applications receive notifications each time a user accesses a file on the CIFS share. Note: If this option is enabled, the value for CIFS directory depth indicates the lowest directory level to which the notification setting applies.
For write and access notifications on CIFS network shares, the subdirectory depth permitted for file notifications. Value range is 1512. Default is 512. Indication of whether the shared folder is a destination for a replication session (local or remote). Value is yes or no. Manage replication sessions on page 269 explains how to configure replication sessions on the system. Indication of whether deduplication is enabled on the shared folder. Value is yes or no. Date and time when the shared folder was created. Date and time when the shared folder settings were last changed.
Prerequisites
Configure at least one storage pool for the shared folder to use and allocate at least one storage disk to the pool. Configure storage pools automatically on page 174 explains how to create pools on the system automatically and Configure custom storage pools on page 176 explains how to create custom pools. Configure at least one Shared Folder Server to which to associate the shared folder. Create Shared Folder Servers on page 81 explains how to configure Shared Folder Servers.
Format
/stor/prov/sf/res create -name <value> [-replDest {yes|no}] [-desc <value>] -server <value> pool <value> -size <value> [-thin {yes|no}] -type {cifs [cifsSyncWrites {yes|no}] [-cifsOpLocks {yes|no}] [-cifsNotifyOnWrite {yes|no}] [-cifsNotifyOnAccess {yes|no}] [-cifsNotifyDirDepth <value>]|nfs} [-fileLevelRet {yes|no}] [-protSize <value>] [-autoProtAdjust {yes|no}] [-sched <value> [-schedPaused {yes|no}]]
Action qualifiers
Qualifier
-name -replDest -descr -server
Description
Type a name for the shared folder. Specify to make the shared folder the destination of a replication session (local or remote). Value is yes or no. Type a brief description of the shared folder. Type the ID of the Shared Folder Server that will be the primary storage server for the shared folder. View Shared Folder Servers on page 83 explains how to view the IDs of the Shared Folder Servers on the system. Type the name of the storage pool that the shared folder will use. Note: Value is case-insensitive. View storage pools on page 178 explains how to view the names of the storage pools on the system.
-pool
-size
Type the amount of storage in the pool to reserve for the shared folder. Storage resource size limitations on page 300 explains the limitations on storage size. Enable thin provisioning on the shared folder. Value is yes or no. Default is no. Specify the type of network shares to export from the shared folder. Value is one of the following: nfs Network shares for Linux/UNIX hosts. cifs Network shares for Windows hosts. Note: Values are case-insensitive.
-thin -type
Enable synchronous write operations for CIFS network shares. Value is yes or no. Default is no. Enable opportunistic file locks (oplocks) for CIFS network shares. Value is yes or no. Default is yes. Enable to receive notifications when users write to a CIFS share. Value is yes or no. Default is no. Enable to receive notifications when users access a CIFS share. Value is yes or no. Default is no. If the value for -cifsNotifyOnWrite or -cifsNotifyOnAccess is yes (enabled), specify the subdirectory depth to which the notifications will apply. Value range is within range 1512. Default is 512. Enable file-level retention on the shared folder. Values is yes or no. Default is no. Type the amount of protection storage to allocate for the shared folder. Type the ID of the schedule to apply to the shared folder. View protection schedules on page 71 explains how to view the IDs of the schedules on the system. Pause the schedule specified for the -sched qualifier. Value is yes or no. Default is no. Specify whether the protection size, entered for the -protSize qualifier, is automatically adjusted in proportion with changes to the size of the primary storage. Value is yes or no.
-schedPaused -autoProtAdjust
Example
The following command creates a shared folder with these settings:
Named SharedFolder01. Description is NFS shares. Uses the capacity storage pool.
Uses Shared Folder Server SFS_1 as the primary storage server. Primary storage size is 100 MB. Supports NFS network shares. Protection size is 200 MB.
The shared folder rec i eves the ID SF_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/sf/res create name SharedFolder01 -descr NFS shares pool capacity server SFS_1 size 100MB type nfs -protSize 200MB Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = SF_1 Operation completed successfully.
Format
/stor/prov/sf/res [-id <value>|-remSys <value>] show
Object qualifiers
Qualifiers
-id -remSys
Description
Type the ID of a shared folder. Type the ID of a remote system to view the shared folders that use it.
Example
The following command lists details about all shared folders on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/sf/res show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Description Health state Server Storage pool Protocol Size Size used Protection size Protection size used Deduplication enabled = = = = = = = = = = = = SF_1 MySF my shared folder resource OK (5) SFS_1 Performance nfs 1099511627776 (1TB) 128849018880 (120GB) 2199023255552 (2TB) 1099511627776 (1TB) no
Format
/stor/prov/sf/res id <value> set [name <value>] [-descr <value>] [-size <value>] [-thin {yes|no}] [cifsSyncWrites {yes|no}] [cifsOpLocks {yes|no}] [cifsNotifyOnWrite {yes|no}] [cifsNotifyOnAccess {yes|no}] [-cifsNotifyDirDepth {yes|no}] [protSize <value>] [-autoProtAdjust {yes|no}] [-sched <value>] [-schedPaused {yes|no}]
Object qualifier
Qualifier Description
-id Type the ID of the shared folder to change.
Action qualifiers
Qualifier
-name -descr -size
Description
Type a name for the shared folder. Type a brief description of the shared folder. Type the amount of storage in the pool to reserve for the shared folder. Storage resource size limitations on page 300 explains the limitations on storage size. Enable thin provisioning on the shared folder. Value is yes or no. Default is no. If thin provisioning is enabled for the shared folder, specify the amount of storage to allocate for primary data. This value is the lowest value to which you can set the primary storage size. You cannot decrease the current allocation value, but you can increase it up to the current size value. Enable synchronous write operations for CIFS network shares. Value is yes or no. Default is no. Enable opportunistic file locks (oplocks) for CIFS network shares. Value is yes or no. Default is yes. Enable to receive notifications when users write to a CIFS share. Value is yes or no. Default is no. Enable to receive notifications when users access a CIFS share. Value is yes or no. Default is no. If the value for -cifsNotifyOnWrite or -cifsNotifyOnAccess is yes (enabled), specify the subdirectory depth to which the notifications will apply. Value range is 1512. Default is 512. Type the amount of protection storage to allocate for the shared folder. Type the ID of the schedule to apply to the shared folder. View protection schedules on page 71 explains how to view the IDs of the schedules on the system. Pause the schedule specified for the -sched qualifier. Value is yes or no (default). Specify whether the protection size, entered for the -protSize qualifier, is automatically adjusted in proportion with changes to the size of the primary storage. Value is yes or no.
-thin -currentAlloc
-schedPaused -autoProtAdjust
Example
The following command enables thin provisioning on shared folder SF_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/sf/res id SF_1 set -vpEnabled yes Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = SF_1 Operation completed successfully.
Deleting a shared folder removes all network shares and snapshots associated with the shared folder from the system. After the shared folder is deleted, the files and folders inside it cannot be restored from snapshots. Back up the data from a shared folder before deleting it from the system.
Format
/stor/prov/sf/res [-id <value>] delete
Object qualifier
Qualifier Description
-id Type the ID of the shared folder to delete.
Example
The following command deletes shared folder SF_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/sf/res -id SF_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
Administrative shares hidden
Description
Specifies whether administrative shares (C$) are hidden from users. Valid values are: yes no Note: Values are case-insensitive.
Format
/net/nas/cifs show
Example
The following command displays CFS settings: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /net/nas/cifs/ show
Format
/net/nas/cifs set -adminSharesHidden {yes | no}
Action qualifier
Qualifier
-adminSharesHidden
Description
Specifies whether administrative shares (C$) are hidden from users. Valid values are; yes no Note: Values are case-insensitive.
Example
The following command changes CIFS settings: uemcli /net/nas/cifs set -adminSharesHidden yes Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully
Attribute
ID Name Description Local path Export path
Description
ID of the share. Name of the share. Brief description of the share. Name of the directory on the system where the share resides. Export path, used by hosts to connect to the share. The export path is a combination of the name of the associated Shared Folder Server and the name of the share. ID of the shared folder associated with the share. View NFS share settings on page 204 explains how to view the IDs of the NFS network shares on the system. Default share access settings for host configurations and for unconfigured hosts that can reach the share. Value is one of the following: ro Read-only access to primary storage and snapshots associated with the share. rw Read/write access to primary storage and snapshots associated with the share. root Read/write root access to primary storage and snapshots associated with the share. This includes the ability to set access controls that restrict the permissions for other login accounts. na No access to the share or its snapshots. ID of each host that has read-only permission to the share and its snapshots. ID of each host that has read/write permissions to the share and its snapshots. ID of each host that has root permission to the share and its snapshots. ID of host that has no access to the share or its snapshots.
Example 3: If the default access setting for a share is Read-Write, setting the access permission for a particular host configuration to Read-Only will result in an effective host access of Read/Write.
Prerequisite
Configure a shared folder to which to associate the NFS network shares. Create shared folders on page 195 explains how to create shared folders on the system.
Format
/stor/prov/sf/nfs create name <value> [-descr <value>] res <value> -path <value> [-defAccess {ro|rw|root|na}] [-roHosts <value>] [-rwHosts <value>] [-rootHosts <value>] [-naHosts <value>]
Action qualifiers
Qualifier
-name
Description
Type a name for the share. Note: This value, along with the name of the Shared Folder Server, constitutes the export path by which hosts access the share.
Type a brief description of the share. Type the ID of the NFS shared folder to associate with the share. View shared folders on page 197 explains how to view the IDs of the shared folders on the system. Type a name for the directory on the system where the share will reside. This path must correspond to an existing directory/folder name within the share that was created from the host-side. Each share must have a unique local path. The system automatically creates this path for the initial share created when you create the shared folder. Before you can create additional network shares within an NFS shared folder, you must create network shares within it from a Linux/UNIX host that is connected to the shared folder. After a share has been created from a mounted host, you can create a corresponding share on the system and set access permissions accordingly. Specify the default share access settings for host configurations and for unconfigured hosts that can reach the share. Value is one of the following: ro Read-only access to primary storage and snapshots associated with the share. rw Read/write access to primary storage and snapshots associated with the share. root Read/write root access to primary storage and snapshots associated with the share. This includes the ability to set access controls that restrict the permissions for other login accounts. na No access to the share or its snapshots. Type the ID of each host configuration you want to grant read-only permission to the share and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses can access the share and its snapshots. To allow access to only specific IPs, type those specific IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration.
-defAccess
-roHosts
Qualifier
-rwHosts
Description
Type the ID of each host configuration you want to grant read-write permission to the share and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses can access the share and its snapshots. To allow access to only specific IPs, type those specific IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration. Type the ID of each host configuration you want to grant root permission to the share and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses can access the share and its snapshots. To allow access to only specific IPs, type those specific IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration. Type the ID of each host configuration you want to block access to the share and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses cannot access the share and its snapshots. To limit access for specific IPs, type the IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration.
-rootHosts
-naHosts
Example
The following command creates an NFS share with these settings:
Name is NFSshare. Description is My share. Associated to shared folder SF_1. Local path on the system is directory nfsshare. Host HOST_1 has read-only permissions to the share and its snapshots. Hosts HOST_2 and HOST_3 have read and write access to the share and its snapshots.
The share receives ID NFS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/sf/nfs create name NFSshare -descr My share res SF_1 -path nfsshare -roHosts HOST_1 -rwHosts HOST_2,HOST_3 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = NFS_1 Operation completed successfully.
Format
/stor/prov/sf/nfs [{-id <value>|-res <value>}] show
Object qualifiers
Qualifier
-id -res
Description
Type the ID of an NFS share. Type the ID of an NFS shared folder to view the associated NFS network shares.
Example
The following command lists details for all NFS network shares on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/sf/nfs show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Description Resource Local path = = = = = NFS_1 MyNFSshare1 My nfs share SF_1 nfsshare1
Format
/stor/prov/sf/nfs id <value> set [-descr <value>] [-defAccess {ro|rw|root|na}] [-roHosts <value>] [-rwHosts <value>] [-rootHosts <value>] [-naHosts <value>]
Object qualifier
Qualifier
-id
Description
Type the ID of an NFS share to change. View NFS share settings on page 204 explains how to view the IDs of the NFS network shares on the system.
Action qualifiers
Qualifier
-descr -defAccess
Description
Type a brief description of the share. Specify the default share access settings for host configurations and for unconfigured hosts who can reach the share. Value is one of the following: ro Read-only access to primary storage and snapshots associated with the share. rw Read/write access to primary storage and snapshots associated with the share. root Read/write root access to primary storage and snapshots associated with the share. This includes the ability to set access controls that restrict the permissions for other login accounts. na No access to the share or its snapshots. Type the ID of each host configuration you want to grant read-only permission to the share and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses can access the share and its snapshots. To allow access to only specific IPs, type those specific IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration. Type the ID of each host configuration you want to grant read-write permission to the share and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses can access the share and its snapshots. To allow access to only specific IPs, type those specific IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration. Type the ID of each host configuration you want to grant root permission to the share and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses can access the share and its snapshots. To allow access to only specific IPs, type those specific IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration. Type the ID of each host configuration you want to block access to the share and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses cannot access the share and its snapshots. To limit access for specific IPs, type the IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration.
-roHosts
-rwHosts
-rootHosts
-naHosts
Example
The following command changes NFS share NFS_1 to block access to the share and its snapshots for host HOST_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/sf/nfs id NFS_1 set -descr My share -naHosts HOST_1 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = NFS_1 Operation completed successfully.
Deleting a share removes any files and folders associated with the share from the system. You cannot use snapshots to restore the contents of a share. Back up the data from a share before deleting it from the system.
Format
/stor/prov/sf/nfs id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of an NFS share to change. View NFS share settings on page 204 explains how to view the IDs of the NFS network shares on the system.
Example
The following command deletes NFS share NFS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/sf/nfs id NFS_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
ID Name Description Local path Export path
Description
ID of the share. Name of the share. Brief description of the share. Name of the directory on the system where the share resides. Export path, used by hosts to connect to the share. The export path is a combination of the name of the associated Shared Folder Server and the name of the share. ID of the shared folder associated with the CIFS share. View shared folders on page 197 explains how to view the IDs of the shared folders on the system.
Resource
Prerequisite
Configure a shared folder to which to associate the CIFS network shares. Create shared folders on page 195 explains how to configure shared folders on the system.
Format
/stor/prov/sf/cifs create name <value> [-descr <value>] res <value> -path <value>
Action qualifiers
Qualifier
-name
Description
Type a name for the share. Note: This value, along with the Shared Folder Server name, constitutes the export path by which hosts access the share.
-descr -res
Type a brief description of the share. Type the ID of the shared folder to associate with the CIFS share. View shared folders on page 197 explains how to view the IDs of the shared folders on the system. Type a name for the directory on the system where the share will reside. CIFS shared folders allow you to create multiple network shares with the same local path. You can specify different host-side access controls for different users, but the network shares within the shared folder will all access common content. If you want the CIFS network shares within the same shared folder to access different content, you must first create the network shares within the shared folder from a Windows host that is mapped to the shared folder. After the additional network shares are created from a Windows host, you can create corresponding network shares in Unisphere CLI.
-path
Example
The following command creates a CIFS share with these settings:
Name is CIFSshare. Description is My share. Associated to shared folder SF_1. Local path on the system is directory cifsshare.
The CIFS share receives ID CIFS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/sf/cifs create name CIFSshare -descr My share res SF_1 path cifsshare Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = CIFS_1 Operation completed successfully.
Format
/stor/prov/sf/cifs [{-id <value>|-res <value>}] show
Object qualifiers
Qualifier
-id -res
Description
Type the ID of a CIFS share. Type the ID of a CIFS shared folder to view the associated CIFS network shares.
Example
The following command lists all CIFS network shares on the system: uemcli /stor/prov/sf/cifs show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection /stor/prov/sf/cifs show 1: ID Name Description Resource Local path Export path ID Name Description Resource Local path Export path = = = = = = = = = = = = CIFS_1 MyCIFSshare1 my CIFS share SF_1 cifshare1 \\10.64.75.10\MyCIFSshare1 CIFS_2 MyCIFSshare2 Read-only share SFS_1 cifshare2 \\10.64.75.10\MyCIFSshare2
2:
Format
/stor/prov/sf/cifs -id <value> set -descr <value>
Object qualifier
Qualifier
-id
Description
Type the ID of the CIFS share to change.
Action qualifier
Qualifier
-descr
Description
Type a brief description of the share.
Example
The following command changes the description of CIFS share CIFS_1:
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/sf/cifs id CIFS_1 set -descr My new description Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = CIFS_1 Operation completed successfully.
Deleting a share removes any files andfolders associated with the share from the system. You cannot use snapshots to restore the contents of a share. Back up the data from a share before deleting it from the system.
Format
/stor/prov/sf/cifs id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the CIFS share to delete.
Example
The following command deletes CIFS share CIFS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! uemcli /stor/prov/sf/cifs id CIFS_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
iSCSI storage resource A container for iSCSI storage associated with a particular host. Virtual disk An individual instance of generic iSCSI storage associated with a specific quantity and pool of storage, and referenced by a particular logical unit identifier (LUN).
Generic iSCSI storage resources can contain one or more virtual disks. When you configure host access to a generic iSCSI storage resource, the specified access extends to all virtual disks within the storage resource. Table 51 on page 212 lists the attributes for iSCSI storage resources.
Table 51 Generic iSCSI storage attributes
Attribute
ID Name Description Health state
Description
ID of the storage resource. Name of the storage resource. Brief description of the storage resource. Health state of the storage resource. The health state code appears in parentheses. Value is one of the following: OK (5) Resource is operating normally. Degraded/Warning (10) Working, but one or more of the following may have occurred: - One or more of its storage pools are degraded. - Its replication session is degraded. - Its replication session has faulted. - It has almost reached full capacity. Increase the primary storage size, or create additional resources to store your data, to avoid data loss. Change iSCSI storage resources on page 215 explains how to increase the primary storage size. Minor failure (15) One or both of the following may have occurred: - One or more of its storage pools have failed. - The associated iSCSI node has failed. Major (20) One or both of the following may have occurred: - Resource is unavailable. - One or more of the associated storage pools have failed. Critical failure (25) One or more of the following may have occurred: - One or more of its storage pools are unavailable. - Resource is unavailable. - Resource has reached full capacity. Increase the primary storage size, or create additional resources to store your data, to avoid data loss. Change iSCSI storage resources on page 215 explains how to increase the primary storage size. Non-recoverable error (30) One or both of the following may have occurred: - Resource is unavailable. - One or more of the associated storage pools are unavailable. Name of the iSCSI node to which the storage resource is associated. iSCSI address (IQN) of the associated iSCSI node. Total primary capacity allocated to the storage resource.
Attribute
Total current allocation Total protection size Total protection size used Auto-adjust protection size
Description
Total storage currently allocated to all virtual disks. Total protection capacity allocated to the storage resource. Total protection capacity allocated to the storage resource that is currently used by protection data, such as snapshots. Indication of whether the auto-adjust protection storage feature is enabled. Value is yes or no. The auto-adjust protection feature automatically adjusts the protection storage size in proportion to changes to the primary storage size. ID of a protection schedule applied to the storage resource. View protection schedules on page 71 explains how to view the IDs of the schedules on the system. Indication of whether an applied protection schedule is currently paused. List of hosts with access permissions to the virtual disks. Each host displays the host identifier followed by a comma-separated list of host IQNs enclosed in square brackets. List of hosts with access permissions to the snapshots. Each host displays the host identifier followed by a comma-separated list of host IQNs enclosed in square brackets. Indication of whether the storage resource is a destination in a replication session. Value is yes or no.
Protection schedule
Protection schedule paused Virtual disk access hosts iSCSI initiators Snapshots access host iSCSI initiators Replication destination
Prerequisites
Configure at least one storage pool for the generic iSCSI storage resource to use and allocate at least one storage disk to the pool. Configure storage pools automatically on page 174 explains how to create storage pools automatically on the system and Configure custom storage pools on page 176 explains how to create a custom storage pool on the system. Configure at least one iSCSI node to which to associate the generic iSCSI storage resource. Create iSCSI nodes on page 93 explains how to create iSCSI nodes on the system.
Format
/stor/prov/iscsi/res create -name <value> [-descr <value>] -node <value> [-replDest {yes|no}] [-autoProtAdjust {yes|no}] [-sched <value> [-schedPaused {yes|no}]] [vdiskHosts <value>] [-snapHosts <value>]
Action qualifiers
Qualifier
-name
Description
Type a name for the storage resource. Note: Use a name that reflects the type and version of the application that will use it, which can facilitate how the storage resource is managed and monitored through Unisphere.
-descr -node
Type a brief description of the storage resource. Type the ID of the iSCSI node to which to associate the storage resource. View iSCSI nodes on page 93 to view the IDs of the iSCSI nodes on the system. Specify whether the storage resource is a destination in a replication session. Value is yes or no.
-replDest
-autoProtAdjust Specify whether the auto-adjust protection storage feature is enabled. Value is yes or no. The auto-adjust protection feature automatically adjusts the protection storage size in proportion to changes to the primary storage size. -sched Type the ID of a protection schedule to apply to the storage resource. View protection schedules on page 71 explains how to view the IDs of the schedules on the system. Specify whether to pause the protection schedule specified for -sched. Value is yes or no. Type the ID of each host configuration to give access to the virtual disks associated with the storage resource. Separate each ID with a comma. By default, all iSCSI initiators on the host can access all virtual disks. To allow access for specific initiators, type the IQN of each initiator in square brackets after the host ID. For example: ID[IQN,IQN], where 'ID' is a host configuration ID and 'IQN' is an initiator IQN. View host configurations on page 139 explains how to view the ID of each host configuration. Type the ID of each host configuration to give access to snapshots of the storage resource. Separate each ID with a comma. By default, all iSCSI initiators on the host can access all virtual disk snapshots. To allow access for specific initiators, type the IQN of each initiator in square brackets after the host ID. For example: ID[IQN,IQN], where 'ID' is a host configuration ID and 'IQN' is an initiator IQN. View host configurations on page 139 explains how to view the ID of each host configuration.
-schedPaused -vdiskHosts
-snapHosts
Example
The following command creates a generic iSCSI storage resource with these settings:
Name is Accounting. Description is Accounting apps. Associated to iSCSI node ISCSIN_1. Uses protection schedule SCHD_1.
The storage resource receives the ID ISCSI_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/iscsi/res create -name Accounting descr Accounting apps -node ISCSIN_1 sched SCHD_1 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = ISCSI_1 Operation completed successfully.
Format
/stor/prov/iscsi/res [-id <value>] show
Object qualifier
Qualifier
-id -remSys
Description
Type the ID of an iSCSI storage resource. Identify the remote system to display generic iSCSI resources belonging to this system.
Example
The following command displays details about the iSCSI storage resource on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/iscsi/res show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Description Health state Node iSCSI target Total capacity Total protection size Total protection size used = = = = = = = = = ISCSI_1 MyISCSI My iSCSI resource OK (5) ISCSIN_1 iqn.1992-05.com.emc:bb0050568134220000-1 107374182400 (100GB) 225485783040 (210GB) 107374182400 (100GB)
Format
/stor/prov/iscsi/res id <value> set [-name <value>] [-descr <value>] [-autoProtAdjust {yes|no}] [-sched <value>] [-schedPaused {yes|no}] [vdiskHosts <value>] [-snapHosts <value>]
Object qualifier
Qualifier
-id
Description
Type the ID of iSCSI storage resource to change.
Action qualifiers
Qualifier
-name
Description
Type a name for the storage resource. Note: Use a name that reflects the type and version of the application that will use it, which can facilitate how the storage resource is managed and monitored through Unisphere.
-descr
-autoProtAdjust Specify whether the auto-adjust protection storage feature is enabled. Value is yes or no. The auto-adjust protection feature automatically adjusts the protection storage size in proportion to changes to the primary storage size. -sched Type the ID of a protection schedule to apply to the storage resource. View protection schedules on page 71 explains how to view the IDs of the schedules on the system. Specify whether to pause the protection schedule specified for -sched. Value is yes or no. Type the ID of each host configuration to give access to the virtual disks associated with the storage resource. Separate each ID with a comma. By default, all iSCSI initiators on the host can access all virtual disks. To allow access for specific initiators, type the IQN of each initiator in square brackets after the host ID. For example: ID[IQN,IQN], where 'ID' is a host configuration ID and 'IQN' is an initiator IQN. View iSCSI initiators on page 144 explains how to view the IDs of the iSCSI initiators configured for each host configuration on the system. Type the ID of each host configuration to give access to snapshots of the storage resource. Separate each ID with a comma. By default, all iSCSI initiators on the host can access all virtual disk snapshots. To allow access for specific initiators, type the IQN of each initiator in square brackets after the host ID. For example: ID[IQN,IQN], where 'ID' is a host configuration ID and 'IQN' is an initiator IQN. View iSCSI initiators on page 144 explains how to view the IDs of the iSCSI initiators configured for each host configuration on the system.
-schedPaused -vdiskHosts
-snapHosts
Example
The following command updates iSCSI storage resource ISCSI_1 with these settings:
Name is Sales. Description is Sales records. Uses protection schedule SCHD_2. The selected schedule is currently paused:
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/iscsi/res id ISCSI_1 set name Sales descr Sales records sched SCHD_2 schedPaused yes Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = ISCSI_1 Operation completed successfully.
Deleting an iSCSI storage resource removes all virtual disks and data associated with the storage resource from the system. After an iSCSI storage resource is deleted, you cannot restore the data from snapshots. Back up the data from the storage resource before deleting the storage resource.
Format
/stor/prov/iscsi/res id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the iSCSI storage resource to delete.
Example
The following command deletes iSCSI storage resource ISCSI_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/iscsi/res id ISCSI_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
ID LUN ID Name Description Resource Storage pool Size Maximum size Thin provisioning enabled
Description
ID of the virtual disk. Logical unit number (LUN) ID of the virtual disk. Name of the virtual disk. Brief description of the virtual disk. ID of the generic iSCSI storage resource to which the virtual disk is associated. Name of the storage pool the virtual disk is using. Quantity of storage reserved for primary data. Maximum size to which you can increase the primary storage capacity. Indication of whether thin provisioning is enabled. Value is yes or no. Default is no. All storage pools support both standard and thin provisioned storage resources. For standard storage resources, the entire requested size is allocated from the pool when the resource is created, for thin provisioned storage resources only incremental portions of the size are allocated based on usage. Because thin provisioned storage resources can subscribe to more storage than is actually allocated to them, storage pools can be over provisioned to support more storage capacity than they actually possess. The Unisphere online help provides more details on thin provisioning. If thin provisioning is enabled, the quantity of primary storage currently allocated through thin provisioning. Quantity of storage reserved for protection data, such as snapshots. Quantity of storage currently used for protection data. Maximum size to which you can increase the protection storage size.
Current allocation Protection size Protection size used Maximum protection size
Prerequisite
Configure an iSCSI storage resource to which to associate the virtual disks. Create iSCSI storage resources on page 213 explains how to configure iSCSI storage resources.
Format
/stor/prov/iscsi/vdisk create -name <value> [-descr <value>] res <value> -pool <value> -size <value> [-thin {yes|no}] [-protSize <value>]
Action qualifiers
Qualifier
-name -descr -res
Description
Type the name of the virtual disk. Type a brief description of the virtual disk. Type the ID of the iSCSI storage resource to which to associate the virtual disk. View iSCSI storage resources on page 215 to view the IDs of the iSCSI storage resources on the system. Type the name of the storage pool that the virtual disk will use. Note: Value is case-insensitive. View storage pools on page 178 explains how to view the names of the storage pools on the system.
-pool
-size
Type the quantity of storage to allocate for the virtual disk. Storage resource size limitations on page 300 explains the limitations on storage size. Enable thin provisioning on the virtual disk. Value is yes or no. Default is no. Type the quantity of storage to reserve for protection data, such as snapshots.
-thin -proSize
Example
The following command creates a virtual disk with these settings:
Name is MyISCSIdisk. Description is My ISCSI virtual disk. Associated with iSCSI storage resource ISCSI_1. Uses the Capacity storage pool. Primary storage size is 100 MB. Protection storage size is 200 MB.
The virtual disk receives the ID ISCIVD_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/iscsi/vdisk create name MyISCSIdisk descr My ISCSI virtual disk res ISCSI_1 -pool capacity size 100MB -protSize 200MB Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = ISCSIVD_1 Operation completed successfully.
Format
/stor/prov/iscsi/vdisk [{-id <value>|-res <value>}] show
Object qualifiers
Qualifier
-id -res
Description
Type the ID of a virtual disk. Type the ID of a generic iSCSI storage resource to view only the virtual disks associated with that storage resource.
Example
The following command displays details about all virtual disks on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/iscsi/vdisk show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Description Resource Storage pool Size Protection size Protection size used ID Name Description Resource Storage pool Size Protection size Protection size used = = = = = = = = = = = = = = = = ISCSI_1 MyISCSIdisk My ISCSI virtual disk ISCSI_1 Capacity 2199023255552 (2TB) 4617948836659 (4.2TB) 2199023255552 (2TB) ISCSI_2 MyISCSIdisk2 My second ISCSI virtual disk ISCSI_1 Performance 104857600 (100MB) 4617948836659 (4.2TB) 2199023255552 (2TB)
2:
Format
/stor/prov/iscsi/vdisk id <value> set [-name <value>] [-descr <value>] [-size <value>] [-protSize <value>]
Object qualifier
Qualifier
-id
Description
Type the ID of the virtual disk to change.
Action qualifiers
Qualifier
-name -descr -size
Description
Type a name for the virtual disk. Type a brief description for the virtual disk. Type the quantity of storage to allocate for the virtual disk. Storage resource size limitations on page 300 explains the limitations on storage size. Type the quantity of storage to reserve for protection data, such as snapshots.
-protSize
Example
The following command updates virtual disk ISCSIVD_1 with these settings:
Name is Accounting2. Description is New disk for accounting apps. Primary storage size is 150 MB. Protection storage size is 300 MB.
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/iscsi/vdisk id ISCSIVD_1 set name Accounting2 descr New disk for accounting apps size 150MB protSize 300MB Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = ISCSIVD_1 Operation completed successfully.
Deleting a virtual disk removes all associated data from the system. After a virtual disk is deleted, you cannot restore the data inside it from snapshots. Back up the data from a virtual disk to another host before deleting it from the system.
Format
/stor/prov/iscsi/vdisk id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the virtual disk to delete.
Example
The following command deletes virtual disk ISCSIVD_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/iscsi/vdisk id ISCSIVD_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
ID Name Description Health state
Description
ID of the NFS datastore. Name of the NFS datastore. Description of the NFS datastore. Health state of the NFS datastore. The health state code appears in parentheses. Value is one of the following: OK (5) NFS datastore is operating normally. Degraded/Warning (10) Working, but one or more of the following may have occurred: - One or more of its storage pools are degraded. - Its replication session is degraded. - Its replication session has faulted. - It has almost reached full capacity. Increase the primary storage size, or create additional NFS datastores to store your data, to avoid data loss. Change NFS datastore settings on page 228 explains how to change the primary storage size. Minor failure (15) One or both of the following may have occurred: - One or more of its storage pools have failed - The associated Shared Folder Server has failed. Major failure (20) One or both of the following may have occurred: - One or more of its storage pools have failed. - NFS datastore is unavailable. Critical failure (25) One or more of the following may have occurred: - One or more of its storage pools are unavailable. - NFS datastore is unavailable. - NFS datastore has reached full capacity. Increase the primary storage size, or create additional NFS datastore to store your data, to avoid data loss. Change NFS datastore settings on page 228 explains how to change the primary storage size. Non-recoverable error (30) One or both of the following may have occurred: - One or more of its storage pools are unavailable. - NFS datastore is unavailable. Name of the primary Shared Folder Server that the NFS datastore uses. Name of the storage pool that the NFS datastore uses. Quantity of storage reserved for primary data. Quantity of storage currently used for primary data. Maximum size to which you can increase the primary storage capacity.
Attribute
Thin provisioning enabled
Description
Indication of whether thin provisioning is enabled. Value is yes or no. Default is no. All storage pools support both standard and thin provisioned storage resources. For standard storage resources, the entire requested size is allocated from the pool when the resource is created, for thin provisioned storage resources only incremental portions of the size are allocated based on usage. Because thin provisioned storage resources can subscribe to more storage than is actually allocated to them, storage pools can be over provisioned to support more storage capacity than they actually possess. The Unisphere online help provides more details on thin provisioning. If enabled, the quantity of primary storage currently allocated through thin provisioning. Quantity of storage reserved for protection data. Quantity of storage currently used for protection data. Maximum size to which you can increase protection storage capacity. Indication of whether auto-adjust protection is enabled. Value is yes or no. This feature automatically adjusts the size of the protection storage in proportion with changes to the size of the primary storage. ID of an applied protection schedule. View protection schedules on page 71 explains how to view the IDs of schedules on the system. Indication of whether an applied protection schedule is currently paused. Value is yes or no. Default access settings for host configurations and for unconfigured hosts that can reach the NFS datastore. Value is one of the following: ro Read-only access to primary storage and snapshots associated with the NFS datastore. rw Read/write access to primary storage and snapshots associated with the NFS datastore. root Read/write root access to primary storage and snapshots associated with the NFS datastore. This includes the ability to set access controls that restrict the permissions for other login accounts. na No access to the NFS datastore or its snapshots. ID of each host that has read-only permission to the NFS datastore and its snapshots. ID of each host that has read/write permissions to the NFS datastore and its snapshots. ID of each host that has root permission to the NFS datastore and its snapshots. ID of each host that has no access to the NFS datastore or its snapshots. Indication of whether the NFS datastore is a destination for a replication session (local or remote). Value is yes or no. Manage replication sessions on page 269 explains how to configure replication sessions on the system. Indication of whether deduplication is enabled on the NFS datastore. Value is yes or no.
Current allocation Protection size Protection size used Maximum protection size Auto-adjust protection size
Protection schedule
Read-only hosts Read/write hosts Root hosts No access hosts Replication destination
Deduplication enabled
Prerequisite
Configure at least one storage pool for the NFS datastore to use and allocate at least one storage disk to the pool. Configure storage pools automatically on page 174 explains how to create pools on the system automatically and Configure custom storage pools on page 176 explains how to create custom pools. Configure at least one Shared Folder Server to which to associate the NFS datastore. Create Shared Folder Servers on page 81 explains how to configure Shared Folder Servers.
Note: Share access permissions set for specific hosts take effect only if the host-specific setting is less restrictive than the default access setting for the share. Additionally, setting access for a specific host to No Access always takes effect over the default access setting. Example 1: If the default access setting for a share is Read-Only, setting the access for a specific host configuration to Read/Write will result in an effective host access of Read/Write. Example 2: If the default access setting for the share is Read-Only, setting the access permission for a particular host configuration to No Access will take effect and prevent that host from accessing to the share. Example 3: If the default access setting for a share is Read-Write, setting the access permission for a particular host configuration to Read-Only will result in an effective host access of Read/Write.
Format
/stor/prov/vmware/nfs create name <value> [-replDest {yes|no}] [-descr <value>] -server <value> -pool <value> -size <value> [-thin {yes|no}] [-protSize <value>] [-autoProtAdjust {yes|no}] [-sched <value> [-schedPaused {yes|no}]] [-defAccess {ro|rw|root|na}] [roHosts <value>] [-rwHosts <value>] [-rootHosts <value>] [-naHosts <value>]
Action qualifiers
Qualifier
-name -replDest -descr -server
Description
Type a name for the NFS datastore. Specify to make the NFS datastore the destination of a replication session (local or remote). Value is yes or no. Type a brief description of the NFS datastore. Type the ID of the Shared Folder Server that will be the primary storage server for the NFS datastore. View Shared Folder Servers on page 83 explains how to view the IDs of the Shared Folder Servers on the system. Type the name of the storage pool that the NFS datastore will use. Note: Value is case-insensitive. View storage pools on page 178 explains how to view the IDs of the storage pools on the system.
-pool
-size
Type the amount of storage in the pool to reserve for the NFS datastore. Storage resource size limitations on page 300 explains the limitations on storage size. Enable thin provisioning on the NFS datastore. Value is yes or no. Default is no. Type the amount of protection storage to allocate for the NFS datastore. Specify whether the protection size, entered for the -protSize qualifier, is automatically adjusted in proportion with changes to the size of the primary storage. Value is yes or no. Type the ID of the schedule to apply to the NFS datastore. View protection schedules on page 71 explains how to view the IDs of the schedules on the system. Pause the schedule specified for the -sched qualifier. Value is yes or no. Default is no. Specify the default share access settings for host configurations and for unconfigured hosts that can reach the NFS datastore. Value is one of the following: ro Read-only access to primary storage and snapshots associated with the NFS datastore. rw Read/write access to primary storage and snapshots associated with the NFS datastore. root Read/write root access to primary storage and snapshots associated with the NFS datastore. This includes the ability to set access controls that restrict the permissions for other login accounts. na No access to the NFS datastore or its snapshots. Note: Values are case-insensitive.
-schedPaused -defAccess
-roHosts
Type the ID of each host configuration you want to grant read-only permission to the NFS datastore and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses can access the NFS datastore and its snapshots. To allow access to only specific IPs, type those specific IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration.
Qualifier
-rwHosts
Description
Type the ID of each host configuration you want to grant read-write permission to the NFS datastore and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses can access the NFS datastore and its snapshots. To allow access to only specific IPs, type those specific IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration. Type the ID of each host configuration you want to grant root permission to the NFS datastore and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses can access the NFS datastore and its snapshots. To allow access to only specific IPs, type those specific IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration. Type the ID of each host configuration you want to block access to the NFS datastore and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses cannot access the NFS datastore and its snapshots. To limit access for specific IPs, type the IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration.
-rootHosts
-naHosts
Example
The following command creates an NFS datastore with these settings:
Named Accounting. Description is Accounting VMs. Uses Shared Folder Server SFServer00 as the primary storage server. Uses the capacity storage pool. Primary storage size is 100 GB No protection schedule.
The shared folder receives the ID NFSDS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/vmware/nfs create name Accounting descr Accounting VMs server SFServer00 pool capacity size 100G Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = NFSDS_1 Operation completed successfully.
Format
/stor/prov/vmware/nfs [-id <value>|-remSys <value> ] show
Object qualifier
Qualifiers
-remSys
Description
Type the ID of an NFS datastore.
Example
The following command lists details about all NFS datastores on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/vmware/nfs show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID = Name = Description = Health state = Server = Storage pool = Size = Size used = Protection size = Protection size used = Export path = NFSDS_1 Accounting2 Accounting VMs OK (5) SFServer00 capacity 536870912000 (500GB) 128849018880 (120GB) 536870912000 (500GB) 0 10.64.75.10/Accounting2
Format
/stor/prov/vmware/nfs id <value> set [name <value>] [-descr <value>] [-size <value>] [-thin {yes|no}] [-protSize <value>] [-autoProtAdjust {yes|no}] [-sched <value>] [-schedPaused {yes|no}] [-defAccess <value>] [roHosts <value>] [-rwHosts <value>] [-rootHosts <value>] [-naHosts <value>]
Object qualifier
Qualifier Description
-id Type the ID of the NFS datastore to change.
Action qualifiers
Qualifier
-name -descr -size
Description
Type a name for the NFS datastore. Type a brief description of the NFS datastore. Type the amount of storage in the pool to reserve for the NFS datastore. Storage resource size limitations on page 300 explains the limitations on storage size. Enable thin provisioning on the NFS datastore. Value is yes or no. Default is no. Type the amount of protection storage to allocate for the NFS datastore. Specify whether the protection size, entered for the -protSize qualifier, is automatically adjusted in proportion with changes to the size of the primary storage. Value is yes or no. Type the ID of the schedule to apply to the NFS datastore. View protection schedules on page 71 explains how to view the IDs of the schedules on the system. Pause the schedule specified for the -sched qualifier. Value is yes or no. Default is no. Specify the default share access settings for host configurations and for unconfigured hosts that can reach the NFS datastore. Value is one of the following: ro Read-only access to primary storage and snapshots associated with the NFS datastore. rw Read/write access to primary storage and snapshots associated with the NFS datastore. root Read/write root access to primary storage and snapshots associated with the NFS datastore. This includes the ability to set access controls that restrict the permissions for other login accounts. na No access to the NFS datastore or its snapshots. Note: Values are case-insensitive.
-schedPaused -defAccess
-roHosts
Type the ID of each host configuration you want to grant read-only permission to the NFS datastore and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses can access the NFS datastore and its snapshots. To allow access to only specific IPs, type those specific IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration.
Qualifier
-rwHosts
Description
Type the ID of each host configuration you want to grant read-write permission to the NFS datastore and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses can access the NFS datastore and its snapshots. To allow access to only specific IPs, type those specific IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration. Type the ID of each host configuration you want to grant root permission to the NFS datastore and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses can access the NFS datastore and its snapshots. To allow access to only specific IPs, type those specific IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration. Type the ID of each host configuration you want to block access to the NFS datastore and its snapshots. Separate each ID with a comma. For host configurations of type 'host,' by default, all of the host's IP addresses cannot access the NFS datastore and its snapshots. To limit access for specific IPs, type the IPs in square brackets after the host ID. For example: ID[IP,IP], where 'ID' is a host configuration ID and 'IP' is an IP address. View host configurations on page 139 explains how to view the ID of each host configuration.
-rootHosts
-naHosts
Example
The following command changes NFS datastore NFSDS_1 to provide read-only access permissions to host configurations HOST_1 and HOST_2 and blocks access for HOST_3: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/vmware/nfs id NFSDS_1 set roHosts HOST_1,HOST_2 -naHosts HOST_3 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = NFSDS_1 Operation completed successfully.
Deleting an NFS datastore removes any files andfolders associated with it from the system. You cannot use snapshots to restore the contents of the datastore. Back up the data from the datastore before deleting it from the system.
Format
/stor/prov/vmware/nfs [-id <value>] delete
Object qualifier
Qualifier Description
-id Type the ID of the NFS datastore to delete.
Example
The following command deletes NFS datastore NFSDS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/vmware/nfs -id NFSDS_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
ID LUN ID Name Description Health state
Description
ID of the VMFS datastore. Logical unit number (LUN) ID of the VMFS datastore. Name of the VMFS datastore. Brief description of the VMFS datastore. Health state of the VMFS datastore. The health state code appears in parentheses. Value is one of the following: OK (5) Datastore is operating normally. Degraded/Warning (10) Working, but one or more of the following may have occurred: - One or more of its storage pools are degraded. - Its replication session is degraded. - Its replication session has faulted. - It has almost reached full capacity. Increase the primary storage size, or create additional datastores to store your data, to avoid data loss. Change VMware VMFS datastore settings on page 236 explains how to increase the primary storage size. Minor failure (15) One or both of the following may have occurred: - One or more of its storage pools have failed. - The associated iSCSI node has failed. Major (20) One or both of the following may have occurred: - Datastore is unavailable. - One or more of the associated storage pools have failed. Critical failure (25) One or more of the following may have occurred: - One or more of its storage pools are unavailable. - Datastore is unavailable. - Datastore has reached full capacity. Increase the primary storage size, or create additional datastores to store your data, to avoid data loss. Change VMware VMFS datastore settings on page 236 explains how to increase the primary storage size. Non-recoverable error (30) One or both of the following may have occurred: - Datastore is unavailable. - One or more of the associated storage pools are unavailable. Name of the iSCSI node to which the VMFS datastore is associated. iSCSI address (IQN) of the associated iSCSI node. Name of the storage pool the virtual disk is using. Quantity of storage reserved for primary data. Maximum size to which you can increase the primary storage capacity.
Attribute
Thin provisioning enabled
Description
Indication of whether thin provisioning is enabled. Value is yes or no. Default is no. All storage pools support both standard and thin provisioned storage resources. For standard storage resources, the entire requested size is allocated from the pool when the resource is created, for thin provisioned storage resources only incremental portions of the size are allocated based on usage. Because thin provisioned storage resources can subscribe to more storage than is actually allocated to them, storage pools can be over provisioned to support more storage capacity than they actually possess. The Unisphere online help provides more details on thin provisioning. If thin provisioning is enabled, the quantity of primary storage currently allocated through thin provisioning. Quantity of storage reserved for protection data, such as snapshots. Quantity of storage currently used for protection data. Maximum size to which you can increase the protection storage size. Indication of whether the auto-adjust protection storage feature is enabled. Value is yes or no. The auto-adjust protection feature automatically adjusts the protection storage size in proportion to changes to the primary storage size. ID of a protection schedule applied to the VMFS datastore. View protection schedules on page 71 explains how to view the IDs of the schedules on the system. Indication of whether an applied protection schedule is currently paused. List of hosts with access permissions to the VMFS datastore, presented to the hosts as a virtual disk. Each host displays the host identifier followed by a comma-separated list of host IQNs enclosed in square brackets. List of hosts with access permissions to the VMFS datastore snapshots. Each host displays the host identifier followed by a comma-separated list of host IQNs enclosed in square brackets. World Wide Name of the VMware resource.
Current allocation Protection size Protection size used Maximum protection size Auto-adjust protection size
Protection schedule
Protection schedule paused Virtual disk access hosts Snapshots access hosts WWN
Prerequisite
Configure at least one storage pool for the VMFS datastore to use and allocate at least one storage disk to the pool. Configure storage pools automatically on page 174 explains how to create storage pools automatically on the system and Configure custom storage pools on page 176 explains how to create a custom storage pool on the system. Configure at least one iSCSI node to which to associate the VMFS datastore. Create iSCSI nodes on page 93 explains how to create iSCSI nodes on the system.
Format
/stor/prov/vmware/vmfs create name <value> [-descr <value>] node <value> -pool <value> -size <value> [-thin {yes|no}] [-protSize <value>] [-autoProtAdjust {yes|no}] [-sched <value> [-schedPaused {yes|no}]] [vdiskHosts <value>] [-snapHosts <value>]
Action qualifiers
Qualifier
-name
Description
Type a name for the VMFS datastore. Note: Use a name that reflects the type and version of the application that will use it, which can facilitate how the VMFS datastore is managed and monitored through Unisphere.
-descr -node
Type a brief description of the VMFS datastore. Type the ID of the iSCSI node to which to associate the VMFS datastore. View iSCSI nodes on page 93 to view the IDs of the iSCSI nodes on the system. Type the name of the storage pool that the VMFS datastore will use. Note: Value is case-insensitive. View storage pools on page 178 explains how to view the IDs of the storage pools on the system.
-pool
-size
Type the quantity of storage to allocate for the VMFS datastore. Storage resource size limitations on page 300 explains the limitations on storage size. Enable thin provisioning on the VMFS datastore. Value is yes or no. Default is no. Type the quantity of storage to reserve for protection data, such as snapshots.
-thin -proSize
-autoProtAdjust Specify whether the auto-adjust protection storage feature is enabled. Value is yes or no. The auto-adjust protection feature automatically adjusts the protection storage size in proportion to changes to the primary storage size. -sched Type the ID of a protection schedule to apply to the VMFS datastore. View protection schedules on page 71 explains how to view the IDs of the schedules on the system. Specify whether to pause the protection schedule specified for -sched. Value is yes or no. Type the ID of each host configuration to give access to the VMFS datastore. Separate each ID with a comma. By default, all iSCSI initiators on the host can access the VMFS datastore. To allow access for specific initiators, type the IQN of each initiator in square brackets after the host ID. For example: ID[IQN,IQN], where 'ID' is a host configuration ID and 'IQN' is an initiator IQN. View host configurations on page 139 explains how to view the ID of each host configuration. Type the ID of each host configuration to give access to snapshots of the VMFS datastore. Separate each ID with a comma. By default, all iSCSI initiators on the host can access all VMFS datastore snapshots. To allow access for specific initiators, type the IQN of each initiator in square brackets after the host ID. For example: ID[IQN,IQN], where 'ID' is a host configuration ID and 'IQN' is an initiator IQN. View host configurations on page 139 explains how to view the ID of each host configuration.
-schedPaused -vdiskHosts
-snapHosts
Example
The following command creates a VMFS datastore with these settings:
Name is Accounting3. Description is Accounting Group 3. Associated to iSCSI node ISCSIN_1. Uses the capacity storage pool. Provides host access permissions to the VMFS datastore (presented as a virtual disk) to two of the IQNs for host configuration 1014 and for host configuration 1014.
No protection schedule.
The VMFS datastore receives the ID VMFS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/vmware/vmfs create name Accounting3 descr Accounting Group 3 node ISCSIN_1 pool capacity -size 100G thin yes vdiskHosts 1014[iqn.2001-04.com.lab:storage,iqn.2001-04.com.example:storage2],1015 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = VMFS_1 Operation completed successfully.
Format
/stor/prov/vmware/vmfs [{-id <value> | -remSys <value>}] show
Object qualifier
Qualifier
-id -remSys
Description
Type the ID of a VMFS datastore. Identify the remote system to display VMware resources belonging to this system.
Example
The following command displays details about the VMFS datastore on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/vmware/vmfs show 1: ID LUN ID Name Description Health state Node iSCSI target Storage pool Size Protection size Protection size used = = = = = = = = = = = VMFS_1 1 Accounting3 Accounting Group 3 OK (5) ISCSIN_1 iqn.1992-05.com.emc:bb0050568134220000-1 capacity 107374182400 (100GB) 107374182400 (100GB) 0
Format
/stor/prov/vmware/vmfs id <value> set [name <value>] [-descr <value>] [-size <value>] [protSize <value>] [-autoProtAdjust {yes|no}] [-sched <value>] [-schedPaused {yes|no}] [-vdiskHosts <value>] [-snapHosts <value>]
Object qualifier
Qualifier
-id
Description
Type the ID of the VMFS datastore to change.
Action qualifiers
Qualifier
-name
Description
Type a name for the VMFS datastore. Note: Use a name that reflects the type and version of the application that will use it, which can facilitate how the VMFS datastore is managed and monitored through Unisphere.
-descr -size
Type a brief description of the VMFS datastore. Type the quantity of storage to allocate for the VMFS datastore. Storage resource size limitations on page 300 explains the limitations on storage size. Type the quantity of storage to reserve for protection data, such as snapshots.
-protSize
-autoProtAdjust Specify whether the auto-adjust protection storage feature is enabled. Value is yes or no. The auto-adjust protection feature automatically adjusts the protection storage size in proportion to changes to the primary storage size. -sched Type the ID of a protection schedule to apply to the VMFS datastore. View protection schedules on page 71 explains how to view the IDs of the schedules on the system. Specify whether to pause the protection schedule specified for -sched. Value is yes or no. Type the ID of each host configuration to give access to the VMFS datastore. Separate each ID with a comma. By default, all iSCSI initiators on the host can access the VMFS datastore. To allow access for specific initiators, type the IQN of each initiator in square brackets after the host ID. For example: ID[IQN,IQN], where 'ID' is a host configuration ID and 'IQN' is an initiator IQN. View host configurations on page 139 explains how to view the ID of each host configuration. Type the ID of each host configuration to give access to snapshots of the VMFS datastore. Separate each ID with a comma. By default, all iSCSI initiators on the host can access all VMFS datastore snapshots. To allow access for specific initiators, type the IQN of each initiator in square brackets after the host ID. For example: ID[IQN,IQN], where 'ID' is a host configuration ID and 'IQN' is an initiator IQN. View host configurations on page 139 explains how to view the ID of each host configuration.
-schedPaused -vdiskHosts
-snapHosts
Example
The following command updates VMFS datastore VMFS_1 with these settings:
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/vmware/vmfs id VMFS_1 set name Accounting4 descr Accounting Group 4 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = VMFS_1 Operation completed successfully.
Deleting a VMFS datastore removes all data and snapshots of it from the system. After the VMFS datastore is deleted, you cannot restore the data from snapshots. Back up all data from the VMFS datastore before deleting it.
Format
/stor/prov/vmware/vmfs id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the VMFS datastore to delete.
Example
The following command deletes VMFS datastore VMFS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/vmware/vmfs id VMFS_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
ID Name Description Node Storage pool Health state
Description
ID of the Exchange resource. Name of the Exchange resource. Brief description of the Exchange resource. Name of the iSCSI node with which the Exchange resource is associated. Name of the storage pool the Exchange resource is using. Health state of the Exchange resource. The health state code appears in parentheses. Value is one of the following: OK (5) The Resource is operating normally. Degraded/Warning (10) Working, but one or more of the following may have occurred: - One or more of its storage pools are degraded. - Resource is degraded. - Resource is running out of space and needs to be increased. Minor failure (15) One or both of the following may have occurred: - One or more of its storage pools have failed. - Resource is unavailable. Major (20) One or both of the following may have occurred: - One or more of the associated storage pools have failed. - Datastore is unavailable. Critical failure (25) One or more of the following may have occurred: - One or more of its storage pools are unavailable. - Resource is unavailable. - Resource has run out of space and needs to be increased. Non-recoverable error (30) One or both of the following may have occurred: - One or more of the associated storage pools are unavailable. - Resource is unavailable. Number of user mailboxes. Average size of the user mailboxes. Size reserved for primary data. Amount of storage used for primary data. The percentage of the primary size allocated as the protection size. Amount of storage reserved for protection data. Amount of storage used for protection data. Indication of whether thin provisioning is enabled. Value is yes or no.
User mailboxes User average mailbox size Total capacity Total current allocation Protection ratio Total protection size Total protection size used Thin provisioning enabled
Attribute
Current allocation Virtual disk access hosts Storage groups
Description
If thin provisioning is enabled, the quantity of primary storage currently allocated through thin provisioning. List of hosts with access to the Exchange storage resource. Each host displays the host identifier followed by a comma-separated list of host IQNs enclosed in square brackets. List of associated storage groups.
Format
/stor/prov/exchange/2007/res [-id <value>] show
Object qualifiers
Qualifier
-id
Description
Identify the Exchange 2007 storage resource.
Example
The following command displays the Exchange 2007 resource information: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/exchange/2007/res show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Description Node Pool Health state Total capacity Protection ratio Total Protection size Total Protection size used = = = = = = = = = = EXCH_1 MyExchange1 My Exchange resource ISCSIN_1 capacity OK (5) 1073741824 (1GB) 100% 1073741824 (1GB) 0
Attribute
ID Name Description Node Pool Health state
Description
ID of the Exchange storage resource. Name of the Exchange storage resource. Brief description of the Exchange storage resource. Name of the iSCSI node with which the Exchange storage resource is associated. Name of the storage pool the Exchange storage resource is using. Health state of the Exchange resource. The health state code appears in parentheses. Value is one of the following: OK (5) The Resource is operating normally. Degraded/Warning (10) Working, but one or more of the following may have occurred: - One or more of its storage pools are degraded. - Resource is degraded. - Resource is running out of space and needs to be increased. Minor failure (15) One or both of the following may have occurred: - One or more of its storage pools have failed. - Server failed. Major (20) One or both of the following may have occurred: - One or more of the associated storage pools have failed. - Resource is unavailable. Critical failure (25) One or more of the following may have occurred: - One or more of its storage pools are unavailable. - Resource is unavailable. - Resource has run out of space and needs to be increased. Non-recoverable error (30) One or both of the following may have occurred: - One or more of the associated storage pools are unavailable. - Resource is unavailable. Number of user mailboxes. Average size of the user mailboxes. Indicates whether the resource is a member of HADAG (High Availability Data Availabilty Group). Valid values are: yes no NOTE: Values are case-insensitive.
Total capacity Total current allocation Protection ratio Total protection size
Size reserved for primary data. Amount of storage used for primary data. The percentage of the primary size allocated as the protection size. Quantity of storage reserved for protection data.
Attribute
Total protection size used Thin provisioning enabled Current allocation Virtual disk access hosts Storage groups
Description
Quantity of storage used for protection data. Indication of whether thin provisioning is enabled. Value is yes or no. If thin provisioning is enabled, the quantity of primary storage currently allocated through thin provisioning. List of hosts with access to the Exchange storage resource. Each host displays the host identifier followed by a comma-separated list of host IQNs enclosed in square brackets. List of associated storage groups.
Format
/stor/prov/exchange/2007/res [-id <value>] show
Object qualifiers
Qualifier
-id
Description
Identify the Exchange 2010 resource.
Example
The following command displays the Exchange 2007 storage resource information: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/exchange/2010/res show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Description Node Pool Health state HADAG Total capacity Protection ratio Total Protection size Total Protection size used = = = = = = = = = = = EXCH_1 MyExchange1 My Exchange resource ISCSIN_1 capacity OK (5) yes 1073741824 (1GB) 100% 107374824 (1GB) 0
Attribute
ID Name Description Resource Pool Database virtual disk Database virtual disk size Log virtual disk Log virtual disk size Public folder virtual disk Public folder virtual disk size Total capacity Total current allocation Total protection size Total protection size used
Description
ID of the Exchange storage group. Name of the Exchange storage group. Brief description of the Exchange storage group. Parent Exchange 2007 resource. (See MS Exchange 2007 resource on page 238) Name of the storage pool that the Exchange resource is using. ID of the virtual disk used for the mailbox database data. Size of the virtual disk used for the mailbox database data. ID of the virtual disk used for log storage. Size of the virtual disk used for log storage. ID of the virtual disk used for the public folder data. Size of the virtual disk used for the public folder data. Amount of storage reserved for primary data. Amount of storage used for primary data. Amount of storage reserved for protection data. Amount of storage used for protection data.
Format
/stor/prov/exchange/2007/sg [-id <value>]|-res <value>]show
Object qualifiers
Qualifier
-id -res
Description
Identify the Exchange 2007 storage group. Identify the Exchange 2007 resource.
Example
The following command displays Exchange 2007 storage group information: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/exchange/2007/sg show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Description Resource Database virtual disk size Log virtual disk size Public Folder virtual disk size = = = = = = = EXCHSG_1 DB1 Database storage group EXCH_1 1048576000 (1GB) 104857600 (100MB) 0
Attribute
ID Name Description Resource Type
Description
ID of the Exchange storage group. Name of the Exchange storage group. Brief description of the Exchange storage group. Parent Exchange 2010 resource. (See MS Exchange 2010 resource on page 240) Storage group type. Valid values are: Mailbox Public Folder ID of the virtual disk used for the mailbox database data. Size of the virtual disk used for the mailbox database data. ID of the virtual disk used for log storage. Size of the virtual disk used for log storage. Amount of storage reserved for primary data. Amount of storage used for primary data. Amount of storage reserved for protection data. Amount of storage used for protection data.
Database virtual disk Database virtual disk size Log virtual disk Log virtual disk size Total capacity Total current allocation Total protection size Total protection size used
Format
/stor/prov/exchange/2007/sg [ { -id <value> | -res <value> } ] show
Object qualifiers
Qualifier
-id -res
Description
Identify the Exchange 2010 storage group. Identify the Exchange 2010 resource.
Example
The following command displays Exchange 2010 storage group information: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/exchange/2010/sg show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name Description Resource Type Database virtual disk size Log virtual disk size = = = = = = = EXCHSG_1 DB1 Database storage group EXCH_1 Mailbox 1048576000 (1GB) 104857600 (100MB)
Attribute
ID LUN ID Name Resource Storage group Type
Description
ID of the Exchange virtual disk. LUN ID. Name of the Exchange virtual disk. Parent Exchange 2007 resource. (See MS Exchange 2007 resource on page 238.) Parent storage group. (See MS Exchange 2007 storage group on page 242.) Virtual disk type. Valid values are: Mailbox Log PublicFolder Current size of the virtual disk. Maximum quantity of storage allowed for the primary data. Flag that indicates if the thin provisioning feature is enabled. Valid values are: yes no NOTE: Values are case-insensitive.
Current allocation Protection size Protection size used Maximum protection size Protection current allocation
Amount of primary storage currently allocated through thin provisioning. Amount of storage reserved for protection data. Amount of storage used for protection data. Maximum amount of storage allowed to be reserved for protection data. Amount of protection storage currently allocated through thin provisioning.
Format
/stor/prov/exchange/2007/vdisk [ { -id <value> | -res <value> | -sg <value> } ] show
Object qualifiers
Qualifier
-id -res -sg
Description
Identify the Exchange 2007 virtual disk. Identify the Exchange 2007 storage resource. Identify the Exchange 2007 storage group.
Example
The following command displays Exchange 2007 virtual disk information: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/exchange/2007/vdisk show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID LUN ID Name Resource Storage Group Type Size Protection size Protection size used = = = = = = = = = EXCHVD_1 1 Database EXCH_1 ESCHSG_1 Mailbox 1048576000 (1GB 1048576000 (1GB) 0
2:
ID LUN ID Name Resource Storage Group Type Size Protection size Protection size used
= = = = = = = = =
Attribute
ID LUN ID Name Resource Storage group Type
Description
ID of the Exchange virtual disk. LUN ID. Name of the Exchange virtual disk. Parent Exchange 2010 resource. (See MS Exchange 2010 resource on page 240.) Parent storage group (see MS Exchange 2010 storage group on page 244.) Virtual disk type. Valid values are: Mailbox Log Current size of the virtual disk. Maximum quantity of storage allowed for the primary data. Flag that indicates if the thin provisioning feature is enabled. Valid values are: yes no NOTE: Values are case-insensitive.
Current allocation Current allocation Protection size Protection size used Maximum protection size Protection current allocation
Amount of primary storage currently allocated through thin provisioning. Amount of storage used for primary data. Amount of storage reserved for protection data. Amount of storage used for protection data. Maximum amount of storage allowed to be reserved for protection data. Amount of protection storage currently allocated through thin provisioning.
Format
/stor/prov/exchange/2010/vdisk [ { -id <value> | -res <value> | -sg <value> } ] show
Object qualifiers
Qualifier
-id -res -sg
Description
Identify the Exchange 2010 virtual disk. Identify the Exchange 2010 storage resource. Identify the Exchange 2010 storage group
Example
The following command displays Exchange 2010 virtual disk information: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/exchange/2010/vdisk show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID LUN ID Name Resource Storage Group Type Size Protection size Protection size used = = = = = = = = = EXCHVD_1 1 Database EXCH_1 ESCHSG_1 Mailbox 1048576000 (1GB) 1048576000 (1GB) 0
2:
ID LUN ID Name Resource Storage Group Type Size Protection size Protection size used
= = = = = = = = =
Hyper-V resource
Table 61 on page 250 lists the attributes for Hyper-V data stores.
Table 61 Hyper-V resource attributes
Attribute
ID LUN ID Name Description Health state
Description
ID of the Hyper-V data store. iSCSI LUN ID. Name of the Hyper-V data store. Description of the Hyper-V data store. Health state of the Exchange resource. The health state code appears in parentheses. Value is one of the following: OK (5) The Resource is operating normally. Degraded/Warning (10) Working, but one or more of the following may have occurred: - One or more of its storage pools are degraded. - Resource is degraded. - Resource is running out of space and needs to be increased. Minor failure (15) One or both of the following may have occurred: - One or more of its storage pools have failed. - Resource is unavailable. Major (20) One or both of the following may have occurred: - One or more of the associated storage pools have failed. - Datastore is unavailable. Critical failure (25) One or more of the following may have occurred: - One or more of its storage pools are unavailable. - Resource is unavailable. - Resource has run out of space and needs to be increased. Non-recoverable error (30) One or both of the following may have occurred: - One or more of the associated storage pools are unavailable. - Resource is unavailable. Associated iSCSI node. Target IQN. Name of the storage pool used for the virtual disk. Current size of the virtual disk. Maximum quantity of storage allowed for the primary data. Flag that indicates if the thin provisioning feature is enabled. Valid values are: yes no NOTE: Values are case-insensitive.
Node iSCSI target Storage pool Size Maximum size Thin provisioning enabled
Current allocation Protection size Protection size used Maximum protection size
Amount of primary storage currently allocated through thin provisioning. Amount of storage reserved for protection data. Amount of storage used for protection data. Maximum amount of storage allowed to be reserved for protection data.
Attribute
Auto-adjust protection size
Description
Flag that indicates whether the Auto-adjust Protection feature is enabled. Valid values are: yes no ID of the applied protection schedule. Flag that indicates whether the protection schedule identified by the Protection schedule attribute is paused. Valid values are: yes no List of the hosts with access to the associated disks. Every host is described as the host identifier, optionally followed by a comma-separated list of host IQNs enclosed in square brackets. List of the hosts with access to the snapshots. Every host is described as the host identifier, optionally followed by a comma-separated list of host IQNs enclosed in square brackets.
Format
hyperv create -name <value> [-descr <value>] -node <value> pool <value> -size <value> [-thin {yes | no}] [-protSize <value>] [ autoProtAdjust {yes | no}] [-sched <value> [-schedPaused {yes | no}]] [-vdiskHosts <value>] [-snapHosts <value>]
Object qualifiers
Qualifier
-name -descr -node -pool -size -thin
Description
Specify the user name of the Hyper-V data store. Specify a description for the Hyper-V data store. ID of the iSCSI node to be used as a parent node. The value should be an iSCSI node identifier. Storage pool name to be used for the disk creation. Specify the size of the Hyper-V data store. Specify whether the file system has thin provisioning enabled. Valid values are: yes (default) no NOTE: Values are case-insensitive.
-protSize
Qualifier
Description
-autoProtAdjust Specify whether the protection storage size can be auto adjusted. Valid values are: yes (default) no NOTE: Values are case-insensitive. -sched -schedPaused ID of the protection schedule to be applied. If sched is defined, specify whether the protection schedule is currently effective. Valid values are: yes no (default) NOTE: Values are case-insensitive. Specify the comma-separated list of hosts with access to virtual disks. Optionally, it is allowable to select the host IQNs. They are defined as a comma-separated list of IQNs enclosed in square brackets and follow the host identifier. Specify the comma-separated list of hosts with access to snapshots. Optionally, it is allowable to select the host IQNs. They are defined as a comma-separated list of IQNs enclosed in square brackets and follow the host identifier.
-vdiskHosts
-snapHosts
Example
The following command creates a new Hyper-V datastore and virtual disk: uemcli /stor/prov/hyperv/res create -name MyHyperV -descr "My description" node ISCSIN_1 -pool capacity -size 100G -thin yes -vdiskHosts "1014[iqn.2001-04.com.example:storage,iqn.2001-04.com.example:storage2],101 5" Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = HYPERV_1 Operation completed successfully.
Format
/stor/prov/hyperv/res [-id <value>] show
Object qualifiers
Qualifier
-id
Description
Identify the Hyper-V resource.
Example
The following command displays Hyper-V datastore information: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/hyperv/res show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID LUN ID Name Description Health State Node iSCSI target Storage Pool Size Protection size Protection size used = = = = = = = = = = = HYPERV_1 1 MyHyperV MyHyperV resource OK (5) iSCSIN_1 iqn.1992-05.com.emc:bb0050568134220000-1 capacity 107374182400 (100GB) 107374182400 (100GB) 0
Format
/stor/prov/hyperv/res -id <value> set [-name <value>] [-descr <value>] [-size <value>] [-protSize <value>] [ autoProtAdjust {yes | no}] [-sched <value>] [ schedPaused {yes | no}] [ vdiskHosts <value>] [-snapHosts <value>]
Object qualifier
Qualifier Description
-id Identify the Hyper-V data store.
Action qualifiers
Qualifier
-name -descr -size -protSize -autoProtAdjust
Description
Specify the datastore name. Specify the data store description. Specify the datastore size Specify the new size of the protection storage. Specify whether the protection storage size can be auto-adjusted. Valid values are: yes no NOTE: Values are case-insensitive.
-sched -schedPaused
Identify the schedule to be applied to the resource. Specify whether the schedule is currently paused. Valid values are: yes no NOTE: Values are case-insensitive.
-vdiskHosts
Specify the comma-separated list of hosts with access to virtual disks. Optionally, it is allowable to select the host IQNs. They are defined as a comma-separated list of IQNs enclosed in square brackets and follow the host identifier. Specify the comma-separated list of hosts with access to snapshots. Optionally, it is allowable to select the host IQNs. They are defined as a comma-separated list of IQNs enclosed in square brackets and follow the host identifier.
-snapHosts
Example
The following command modifies the Hyper-V data store: uemcli /stor/prov/hyperv/res -id HYPERV_1 set -name MyNewName -descr "My new description" -autoProtAdjust yes -sched SCHD_1 -schedPaused no Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection
Format
/stor/prov/hyperv/res [-id <value>] delete
Object qualifiers
Qualifier
-id
Description
Identify the Hyper-V data store.
Example
The following command deletes a Hyper-V data store: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /stor/prov/hyperv/res -id HYPERV_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
ID Enabled State
Description
ID of the storage resource on which deduplication is enabled. Indication of whether deduplication is enabled. Value is yes or no. State of deduplication, which performs a scan once a week. Value is one of the following: paused System is not currently scanning the storage resource. running System is currently scanning the storage resource. This is the default value when deduplication is enabled. List of file extensions that specify the files that will not be deduplicated. Each file extension is separated by a colon. List of paths on the filesystem that contains files that will not be deduplicated. Each path is separated by a semi-colon. Date and time when the system last scanned the filesystem. Total capacity size of the storage resource on which deduplication is enabled. Amount of storage used by the storage resource before its files are deduplicated. Amount of storage used by the storage resource after its files are deduplicated.
Excluded file extensions Excluded paths Last scan Total size Original size used Current size used
Format
/eff/dedup [-id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of a storage resource on which deduplication is enabled.
Example
The following command displays the deduplication settings: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /eff/dedup show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Resource type State File exclude list Path exclude list = = = = = SFS_1 sf running jpg:gif /home/photo
Format
/eff/dedup -id <value> set [-enabled {yes|no}] [-state {running|paused}] [fileExcList <value>] [-pathExcList <value>]
Object qualifier
Qualifier Description
-id Type the ID of the storage resource on which to configure deduplication.
Action qualifiers.
Qualifier
-enabled
Description
Enable deduplication. Value is yes or no. Note: When you disable deduplication, all files on the storage resource will be re-deduplicated, which returns the storage usage to its original size before the files were deduplicated. Ensure the storage pool can accommodate the added storage use before disabling deduplication.
-state
Specify to pause or run deduplication scanning, which scans the target storage resource once a week. Value is one of the following: running System will scan the storage resource. This is the default value when -enabled is yes. paused System will not scan the storage resource. Note: To change this qualifier, deduplication must be enabled.
-fileExcList
Type a list of file extensions for files that will not be deduplicated. Use a semicolon to separate each file extension. Note: To change this qualifier, deduplication must be enabled and the value of -state must be paused.
-pathExcList
List of paths on the filesystem that contain files that will not be deduplicated. Use a colon to separate the paths. Note: To change this qualifier, deduplication must be enabled and -state must be paused.
Example
The following command pauses deduplication scanning for shared folder SFS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /eff/dedup id SFS_1 set state paused Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = SFS_1 Operation completed successfully.
Force a rescan
Rescan a target storage resource to deduplicate it immediately. By default, the system performs a scan once every week.
Format
/eff/dedup -id <value> rescan
Object qualifier
Qualifier
-id
Description
Type the ID of a storage resource on which deduplication is enabled.
Example
The following command forces deduplication scanning of shared folder SFS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /eff/dedup id SFS_1 rescan Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
8
This chapter addresses the following topics:
Protect Data
Manage snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 Manage replication sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 Manage Common Anti Virus Agent (CAVA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Manage snapshots
A snapshot is a virtual point-in-time image of the data within a storage resource that has changed since the last snapshot. Snapshots provide a record of the content in the targeted storage resource at a particular date and time, but are not mirror copies of the data. Periodically creating snapshots of filesystems and virtual disks provides an effective technique for meeting data protection and recovery requirements. Based on the importance and volatility of data within a storage resource, you can define recurring schedules that specify times and intervals for snapshot operations. Use snapshots to perform the following:
Restore a storage resource to a previous point-in-time. Access the contents of a snapshot to recover corrupted or accidentally deleted files and data.
To routinely take snapshots automatically, associate a snapshot with a schedule. Manage snapshot protection schedules on page 71 explains how to configure schedules on the system. Each snapshot is identified by an ID. Note: Snapshots do not provide a substitute for storage backup operations. Snapshots are not intended to provide resources for recovering from disasters or the loss of physical equipment.
Note: To ensure a host has the correct permissions to access snapshots, check the host access permissions for the appropriate storage resource. View shared folders on page 197 explains how to view host access permissions for shared folders. View iSCSI storage resources on page 215 explains how to view the host access permissions for iSCSI storage resources. Table 63 on page 262 lists the attributes for snapshots.
Table 63 Snapshot attributes
Attribute
ID Name State
Description
ID of the snapshot. Name of the snapshot. State of the snapshot. Value is one of the following: OK Snapshot is available to hosts. Expired Snapshot has expired. The system will delete it automatically. For snapshots of iSCSI storage resources, indication of whether the snapshot is currently promoted for host access. Value is yes or no. ID of the storage resource of which the system created the snapshot. Type of storage resource of which the system created the snapshot. Date and time when the snapshot was created. Date and time when the snapshot will expire and be deleted from the system. Default is 7 days.
Attribute
Created by
Description
Name of the user, protection schedule, or backup process that created the snapshot. Value is one of the following: For manual snapshots created by a user, the user account name. For scheduled snapshots, the name of the protection schedule. For snapshots created by host backup software: - NDMP Indicates a snapshot created by using the Network Data Management Protocol (NDMP). - VSS Indicates a snapshot created by using the Microsoft Volume Snapshot Service (VSS), also called Shadow Copy or Previous Version. Snapshot Restore Indicates a snapshot created automatically by the system when restoring a shared folder or VMware NFS datastore. You can use the snapshot to return the storage resource to the state it was in prior to the last restore. Replication Manager: Indicates an application consistent snapshot created by EMC Replication Manager. List of logical unit numbers (LUNs) attached to the snapshot. Export path/WWN for promoted snapshots.
Create snapshots
Create a snapshot of a storage resource. Note: Snapshots of iSCSI virtual disks are not intended for use as mirrors, disaster recovery, or high-availability tools. Because iSCSI snapshots are partially derived from real-time data on iSCSI virtual disks, snapshots can become inaccessible (not readable) if the primary virtual disk becomes inaccessible.
Prerequisite
Snapshots are stored in the protection capacity of the storage resource. Ensure that enough protection capacity exists to accommodate snapshots. View shared folders on page 197 explains how to view the current protection storage size for shared folders. View iSCSI storage resources on page 215 explains how to view the current protection size for iSCSI storage resources.
Format
/prot/snap create [-name <value>] res <value> [-keepFor <value>]
Action qualifiers
Qualifier Description
-name -res Type a name for the snapshot. Type the ID of the storage resource of which to take a snapshot. View shared folders on page 197 explains how to view the settings for shared folders. View iSCSI storage resources on page 215 explains how to view the settings for iSCSI storage resources. Type the number of days or hours to retain a snapshot before it expires. The system deletes expired snapshots automatically. Use the following format: <value><qualifier> where: value Type the number of hours or days: - For hours, the range is 1744. - For days, the range is 131. qualifier Type the value qualifier. Value is one of the following: - h Indicates hours. - d Indicates days. Default value is 7d (7 days). Note: For scheduled snapshots, which are associated with a schedule, include the -keepFor qualifier in the schedule rules to specify the retention period. Manage task rules on page 73 provides details about schedule rules.
-keepFor
Example
The following command takes a snapshot of a shared folder with these settings:
Name is accounting. Storage resource is shared folder SFS_1. Retention period is 1 day.
The snapshot receives ID SNAP_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/snap create name accounting res SFS_1 -keepFor 1d Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = SNAP_1 Operation completed successfully.
View snapshots
View details about snapshots on the system. You can filter on the snapshot ID or storage resource ID. Note: The show action command on page 21 explains how to change the output format.
Format
/prot/snap [{-id <value>|-res <value>}] show
Object qualifiers
Qualifier
-id -res
Description
Type the ID of a snapshot. Type the ID of a storage resource to view only the snapshots related to it.
Example
The following command displays details about all snapshots on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/snap show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Name State Promoted Resource Resource type Attached LUN(s) ID Name State Promoted Resource Resource type Attached LUN(s) = = = = = = = = = = = = = = SNAP_1 Snapshot1 OK no EXCH_1 exchange 1(Database),2(Log) SNAP_2 Snapshot2 OK no ISCSI_1 iscsi 1(My first disk),2(My second disk)
2:
Format
/prot/snap id <value> attach
Object qualifier
Qualifier
-id
Description
Type the ID of the snapshot to promote.
Example
The following command promotes snapshot SNAP_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/snap id SNAP_1 attach Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = SNAP_1 Operation completed successfully.
Demote snapshots
For snapshots of iSCSI storage resources, demote a promoted snapshot to block host access to the snapshot. Note: Before a host can access a promoted snapshot, it must have snapshot permissions to the appropriate iSCSI storage resource. Manage generic iSCSI storage resources on page 212 explains how to configure host access permissions for generic iSCSI storage.
Format
/prot/snap id <value> detach
Object qualifier
Qualifier
-id
Description
Type the ID of the snapshot to demote.
Example
The following command demotes snapshot SNAP_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/snap id SNAP_1 detach Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = SNAP_1 Operation completed successfully.
For generic iSCSI storage, any snapshots that were created after the snapshot to which you restore are destroyed and cannot be recovered. For Shared Folders, all snapshots remain on the system.
Prerequisites
To prevent data loss, ensure that all hosts have completed all read and write operations to the storage resource you want to restore. For generic iSCSI storage: If the snapshot is promoted you must first demote it or an error will appear when you attempt to restore to it. If a host is connected to the virtual disk (seen by the host as a disk) you want to restore, the restore will not complete. Perform one of the following to the virtual disk to disconnect it from the host: On Windows, disable the virtual disk in the Device Manager, which might require a host reboot. On Linux/UNIX, run the unmount command on the virtual. Once the virtual disk is disconnected, you can continue with the restore and then enable and mount the restored virtual disk on the host.
Format
/prot/snap id <value> restore
Object qualifier
Qualifier
-id
Description
Type the ID of the snapshot to which you want to restore the associated storage resource.
Example
The following command restores snapshot SNAP_1, which is a snapshot of generic iSCSI storage: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/snap id SNAP_1 restore Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Delete snapshots
Delete (destroy) a snapshot of a storage resource.
CAUTION
Once you delete a snapshot, you can no longer recover data from it or restore a storage resource to it.
Format
/prot/snap id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the snapshot to delete.
Example
The following command deletes snapshot SNAP_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/snap id SNAP_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Downtime associated cost of a system failure is minimized. Recovery process from a natural or human-caused disaster is facilitated.
Replication provides easy-to-use asynchronous replication tools for creating point-in-time copies of storage resources. A replication session establishes an end-to-end path for a replication operation between a source and destination. The replication source and destination may be remote or local. The session establishes the path that the data follows as it moves from source to destination. Each replication session is identified by an ID. The Unisphere online help provides more details about storage replication. Table 64 on page 269 lists the attributes for replication sessions.
Table 64 Replication session attributes
Attribute
ID Remote session ID Synchronization
Description
ID of the session. Identified session in case of replication with VNX system. Type of synchronization. Value is one of the following: manual Data is replicated when manually initiated in the CLI or Unisphere. auto Data is replicated automatically in order to maintain the appropriate Recovery Point Objective (RPO). As the RPO increases, the potential for data loss also increases, as well as the amount of required protection space. Lowering the RPO will reduce the amount of potential data loss, but will also increase network traffic and may negatively impact performance. The default RPO is one hour. Recovery Point Objective (RPO) interval for automatic synchronization. Storage type of the session. Value is one of the following: net File-based storage, such as shared folder storage. iscsi iSCSI storage. Type of storage resource to which the replication session is applied. Note that as of this writing, only file-based replication is supported. However, this parameter exists in output, so all sessions will have a net value.
Resource type
State
State of the session. Value is one of the following: idle Session is not currently synchronizing. manual syncing A user has started the synchronization of the source and the destination. auto syncing Session is automatically synchronizing the source and the destination.
Attribute
Health state
Description
Health state of the session. Value is one of the following: OK Session is operating normally. Degraded/Warning Session is currently paused. Minor failure An error has caused one or more of the following: - Session has stopped. You can try to resume a stopped replication session. - Session has failed over, likely due to the source storage resource becoming unavailable. The destination storage resource is now in a read/write state. Review the state of the source and check your network connections for any problems. Once the source is back online, you can fail back the session to return it to normal operation. Fail back replication sessions on page 278 explains how to fail back replication sessions that have failed over. - Communication with the replication host has been lost. It is likely that the system is either powered down or there is a network connectivity issue between the systems. A change in the network configuration on either side could also interrupt communication. CAUTION
If the replication session is in an error state, the session will not be recoverable. You will need to delete the session and create a new replication session.
Operational status Network status Operational status of the session. The operational status code appears in parentheses. Status of the network connection. Value is one of the following: Unknown Network status is currently unknown. If you continue to see this value, check the network connections. OK Network connection is operating normally. Lost Communication Communication with the replication host has been lost. It is likely that the system is either powered down or there is a network connectivity issue between the systems. A change in the network configuration on either side could also interrupt communication. Status of the source storage resource in the session. Value is one of the following: Unknown Source status is unknown. OK Source is operating normally. Paused Replication session for the source is currently paused. Fatal replication issue Source has experienced a critical error and the replication session has stopped. Delete the replication session and re-create it. Lost communication Communication with the replication host has been lost. It is likely that the system is either powered down or there is a network connectivity issue between the systems. A change in the network configuration on either side could also interrupt communication. Failed over The replication session has failed over to the destination site. In a failover state, the destination object is read/write. When communication is reestablished between the source and destination, the source becomes read-only. To resume operations on the source site, the replication session needs to be failed back. Fail back replication sessions on page 278 explains how to fail back replication sessions that have failed over. Switched over The replication session has been switched over. A switch over operation synchronizes the destination object with the source and stops replication session with no data loss. In a switch over state, the destination status is read/write and the source is read-only. The direction of the replication does not change.
Source status
Attribute
Destination status
Description
Status of the destination storage resource in the session. Value is one of the following: Unknown Status of the destination resource is unknown. OK Destination resource is operating normally. Paused Replication session for destination resource is currently paused. Fatal replication issue Destination has experienced a critical error and the replication session has stopped. Delete the replication session and re-create it. Lost communication Communication with the replication host has been lost. It is likely that the system is either powered down or there is a network connectivity issue between the systems. A change in the network configuration on either side could also interrupt communication. Failed over The replication session has failed over to the destination site. In a failover state, the destination object is read/write. When communication is reestablished between the source and destination, the source becomes read-only. To resume operations on the source site, the replication session needs to be failed back. Fail back replication sessions on page 278 explains how to fail back replication sessions that have failed over. Switched over The replication session has been switched over. A switch over operation synchronizes the destination object with the source and stops replication session with no data loss. In a switch over state, the destination status is read/write and the source is read-only. The direction of the replication does not change. The local system role. Value is one of the following: Unknown Status of the local system is unknown. Source Resourceon the local system is replicated to the remote system. Destination Resource on the local system is the replication destination of the resource on the remote system. Loopback Resources participating in the replication session are located on the same storage system. Local Resources participating in the replication session are located on the different storage processors of the local system. ID of the storage resource that is the source of the session. The source can be local or remote. ID of the interface associated with the source storage resource of the session. Type of destination used in the session. Value is one of the following: local Maintain a full copy of the storage resource on the local system. This has advantages over snapshots in that a full copy, not just a copy of changes, is retained. remote Maintain a full copy of the storage resource on a remote system by transferring the data over the network. Remote replication is often used to ensure that a copy is available at a remote site in case of catastrophic data loss, for example, due to natural disaster at the local site. For remote sessions, the ID of the remote system on which the data is replicated. ID of the storage resource on which the data is replicated. For remote sessions, the ID of the interface used on the remote system. Date and time of the last replication synchronization. Percentage of the replication synchronization that has completed and the amount of time remaining.
Local role
Destination system Destination resource Destination interface Time of last sync Sync status
Attribute
Sync transfer size remaining Sync transfer rate Paused
Description
Status of synchronization (percentage and time remaining). For multi-lun applications there is a comma-separated list of values. Data transfer rate during a replication synchronization. For multi-lun applications there is a comma-separated list of values. Indication of whether the session is currently paused. Value is yes or no.
Prerequisites
Before creating a replication session, complete the following configuration tasks:
Create the storage resource that provides the replication source. Create shared folders on page 195 explains how to configure shared folders and Create NFS datastores on page 225 explains how to create VMware NFS data stores. For local replication, create a replication destination on a local VNXe system. Create shared folders on page 195 explains how to configure shared folders and Create NFS datastores on page 225 explains how to create VMware NFS data stores. For remote replication, create a replication connection to a remote VNXe or Celerra/VNX, and create a replication destination on that remote system.
Format
/prot/rep/session create -srcRes <value> [-srcInterface <value>] dstType {local|remote dstSys <value>} -dstRes <value> [-dstInterface <value>] [-syncType {manual [autoInitiate {yes|no}]|auto rpo <value>]]
Action qualifiers
Qualifier
-srcRes -srcInterface
Description
Type the ID of the storage resource to use as the source. Type the ID of the interface used on the local system for replication. Note: If you do not type an interface ID the system will identify the interface automatically.
-dstType
Specify the type of destination. Value is one of the following: local Maintain a full copy of the storage resource on the local system. This has advantages over snapshots in that a full copy, not just a copy of changes, is retained. remote Maintain a full copy of the storage resource on a remote system by transferring the data over the network. Remote replication is often used to ensure that a copy is available at a remote site in case of catastrophic data loss, for example, due to natural disaster at the local site. For remote replication, type the ID of the destination system. View settings for remote storage systems on page 151 explains how to view the IDs of the remote system configuration on the local system. Type the ID of the destination storage resource. Type the ID of the interface used on the remote system for replication. Specify how the source and destination will synchronize. Value is one of the following: manual Data is replicated when manually initiated in the CLI or Unisphere. Manually synchronize replication sessions on page 275 explains how to manually synchronize replication sessions. auto Data is replicated automatically in order to maintain the appropriate Recovery Point Objective (RPO). As the RPO increases, the potential for data loss also increases, as well as the amount of required protection space. Lowering the RPO will reduce the amount of potential data loss, but will also increase network traffic and may negatively impact performance. The default RPO is one hour. Specify whether the system will perform the first replication synchronization automatically. Value is yes or no. For automatic synchronization, type the time interval for when the synchronization will run. Use the following format: <HH>[:MM] where: HH Type the number of hours. Value range is 5 minutes to 24 hours (1 day). MM Type the number of minutes, in 5 minute increments. Value range is 0555.
-autoInitiate -rpo
Example
The following command creates a replication session with these settings:
Source storage resource is shared folder SF_1. Destination system type is remote. Remote destination system is RS_1. Remote storage resource is shared folder SF_2. Synchronization type is automatic. Synchronization interval (RPO) is every 30 minutes.
The replication session receives ID REPS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/rep/session create -srcRes SF_1 dstType remote -dstSys RS_1 dstRes SF_2 syncType auto rpo 02h30
Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = REPS_1 Operation completed successfully.
Format
/prot/rep/session [{-id <value>|-res <value>}] show
Object qualifiers
Qualifier
-id -res
Description
Type the ID of a replication session. Type the ID of a local storage resource on the system to view the sessions associated with it.
Example
The following command displays all replication sessions on the system: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/rep/session show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Session type Synchronization type RPO Health state Operational status Time of last sync Sync status = = = = = = = = REPS_1 net Automatic 2h 30m OK (5) OK (0x2) 2010-01-16 23:01 Idle
Format
/prot/rep/session id <value> set [-paused {yes|no}] [-srcInterface <value>] [-dstInterface <value>] [-syncType {manual|auto rpo <value>]]
Object qualifier
Qualifier
-id
Description
Type the ID of the replication session to change.
Action qualifiers
Qualifier
-paused -srcInterface
Description
For automatic synchronization, specify to pause the session. Value is yes or no. Type the ID of the interface used on the local system for replication. Note: If you do not type an interface ID the system identifies the interface automatically.
-dstInterface -syncType
Type the ID of the interface used on the remote system for replication. Specify how the source and destination will synchronize. Value is one of the following: manual Data is replicated when manually initiated in the CLI or Unisphere. Manually synchronize replication sessions on page 275 explains how to manually sync replication sessions. auto Data is replicated automatically in order to maintain the desired Recovery Point Objective (RPO). As the RPO increases, the potential for data loss also increases, as well as the amount of required protection space. Lowering the RPO will reduce the amount of potential data loss, but will also increase network traffic and may negatively impact performance. The default RPO is one hour. For automatic synchronization, type the time interval for when the synchronization will run. Use the following format: <HH>[:MM] where: HH Type the number of hours. Range is 0024 hours (1 day). MM Type the number of minutes, in 5 minute increments. Range is 05 to 55.
-rpo
Example
The following command changes the source interface and destination interface for replication session REPS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/rep/session id REPS_1 set srcInterface RI_1 dstInterface RI_2 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = REPS_1 Operation completed successfully.
Format
/prot/rep/session id <value> sync
Object qualifier
Qualifier
-id
Description
Type the ID of the replication session to synchronize.
Example
The following command initiates a manual resynchronization of replication session REPS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/rep/session id REPS_1 sync Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Once you delete a replication session, data from the source storage resource will no longer be replicated on the destination, leaving the data unprotected.
Format
/prot/rep/session id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of the replication session to delete.
Example
The following command deletes replication session REPS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/rep/session id REPS_1 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Note: To perform a replication switch over, both the source and destination ends of the session must be available.
Format
/prot/rep/session id <value> switchover
Object qualifier
Qualifier
-id
Description
Type the ID of the replication session on which to perform a switch over.
Example
The following command performs a switch over on replication session REPS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/rep/session id REPS_1 switchover Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/prot/rep/session id <value> failover
Object qualifier
Qualifier
-id
Description
Type the ID of the replication session to fail over.
Example
The following command performs a fail over of replication session REPS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/rep/session id REPS_1 failover Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Synchronizes the destination and source storage resources. Makes the destination storage resource read-only. Makes the source storage resource read/write.
When the failback operation is complete, the replication session will resume and you may connect your hosts to the source storage resource.
CAUTION
Ensure that hosts do not write to the destination storage resource, which will become read-only.
Format
/prot/rep/session -id <value> failback
Object qualifier
Qualifier
-id
Description
Type the ID of the replication session to fail back.
Example
The following command performs a fail back on replication session REPS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/rep/session id REPS_1 failback Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Format
/prot/rep/session -id <value> update
Object qualifier
Qualifier
-id
Description
Type the ID of the replication session to update
Example
The following command performs an update on replication session REPS_1: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/rep/session id REPS_1 update Storage system address: 10.64.75.201 Storage system port: 443 HTTPS connection Operation completed successfully.
Attribute
Enabled
Description
Indicates if CAVA is enabled. Valid values are:. yes no NOTE: Values are case-insensitive
State
The state of CAVA. Valid values are: Running Running on SPA Running on SPB Stopped
Format
/prot/cava show
Example
The following command displays the CAVA settings: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/cava show Storage system address: 10.64.75.201 Storage system port: 443 HTTPS connection Operation completed successfully. 1: Enabled State = yes = Running
Format
/prot/cava set -enabled {yes | no}
Action qualifiers
Qualifier
-enabled
Description
Specify whether CAVA is enabled. Valid values are: yes no NOTE: Values are case-insensitive.
Example
The following command enables CAVA: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /prot/cava -enabled yes Storage system address: 10.64.75.201 Storage system port: 443 HTTPS connection Operation completed successfully.
9
This chapter addresses the following topics:
View event logs and alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 View alert history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 Configure alert settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 Configure SNMP destinations for alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Attribute
Message ID Description Severity
Description
ID of the event record. Brief description of the event. Severity of the event. Valid values are: critical An error has occurred that has a significant impact on the system and should be remedied immediately. error An error has occurred that has a minor impact on the system and should be remedied at some point but does not need to be fixed immediately. warning An error has occurred that you should be aware of but has not had a significant impact on the system. noticeAn important event has occurred that does not have an impact on the functioning of the system. info Some event has occurred that does not have an impact on the functioning of the system. NOTE: Values are case-insensitive.
Date and time when the event occurred, in Greenwich Mean Time (GMT). Name of the SP that generated the event. Value is SPA or SPB. ID of the system process that generated the event. Event category. Note: After a successful login to the system, when you run a command through the CLI, events that include the category attribute with the Authentication value will appear twice as there are separate events for successful login and authentication.
User account of the user that caused the event. N/A appears if a user did not cause the event or the account is unavailable. System component that caused the event. Intended for service personnel. System product that caused the event. Intended for service personnel.
Format
/event/log show [-fromTime <value>] [-toTime <value>] [-limit <value>] [-severity <value>]
Action qualifiers
Qualifier
-fromTime
Description
Type the beginning of the time interval for which to display event records. The format is YYYY-MM-DD HH:MM:SS. Note: If you omit this qualifier, the list of logs that appears will begin with the first log.
-toTime
Type the end of the time interval for which to display event records. The format is YYYY-MM-DD HH:MM:SS. Note: If you omit this qualifier, the value is the current system time.
-limit -severity
Type the maximum number of records to display. The value cannot exceed the default number 100. Type the minimum severity level of the events to display. For example, if you type critical, records for the alert and emergency severities will also appear.
Example
The following command lists all event logs generated on 11/09/2009 up to 23:59:59 GMT: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /event/log show -fromTime 2009-11-09 00:00:00.000 to 2009-11-09 23:59:59.999 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: Message ID Description Severity Time Node Account Component = Login success = User admin authenticated in authority LocalDirectory/Local = info = 2009-11-09 19:43:08.577 = spa = unix/spa/root = Server
Attribute
Time Message Severity
Description
Date and time (in GMT) when the alert occurred. Alert message. Alert severity. Value is one of the following: critical An error has occurred that has a significant impact on the system and should be remedied immediately. error An error has occurred that has a minor impact on the system and should be remedied at some point but does not need to be fixed immediately. warning An error has occurred that you should be aware of but has not had a significant impact on the system. notice An important event has occurred that does not have an impact on the functioning of the system. info Some event has occurred that does not have an impact on the functioning of the system. NOTE: Values are case-insensitive.
Note: The show action command on page 21 explains how to change the output format.
Format
/event/alert/hist show
Example
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /event/alert/hist show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: Time Message Severity Time Message Severity = 2009-11-09 19:43:08.577 = Message text = info = 2009-11-09 19:55:18.321 = Message text = info
2:
Attribute
Enable ConnectEMC
Description
Indication of whether ConnectEMC is enabled. Value is yes or no. ConnectEMC sends e-mail alerts to EMC service to help with resolving customer problems. This setting requires an SMTP server explained in Manage SMTP server settings on page 121. Defines which server to use for ConnectEMC - ESRS or SMTP. Valid values are: esrs smtp Language in which the system sends e-mail alerts. E-mail address the system uses as the FROM address. Comma-separated list of e-mail addresses to send alerts. Minimal severity of alerts the system will send as e-mail. Value is one of the following: critical An error has occurred that has a significant impact on the system and should be remedied immediately. error An error has occurred that has a minor impact on the system and should be remedied at some point but does not have to be fixed immediately. warning An error has occurred that you should be aware of but has not had a significant impact on the system. noticeAn important event has occurred that does not have an impact on the functioning of the system. info Some event has occurred that does not have an impact on the functioning of the system. NOTE: Values are case-insensitive.
ConnectEMC mode
Attribute
SNMP severity threshold
Description
Minimal severity of alerts the system will send as SNMP traps. Value is one of the following: critical An error has occurred that has a significant impact on the system and should be remedied immediately. error An error has occurred that has a minor impact on the system and should be remedied at some point but does not have to be fixed immediately. warning An error has occurred that you should be aware of but has not had a significant impact on the system. noticeAn important event has occurred that does not have an impact on the functioning of the system. info Some event has occurred that does not have an impact on the functioning of the system. NOTE: Values are case-insensitive.
Version of SNMP that the destination is running. SNMP engine ID for the SNMP destination.
Format
/event/alert/conf show
Example
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /event/alert/conf show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: Enable ConnectEMC Language E-mail from address E-mail to addresses E-mail severity threshold SNMP severity threshold SNMP version SNMP engine ID = = = = = = = = no english me@mail.com joe@mail.com,rick@mail.com Info Info 3.0
Format
/event/alert/conf set [-enableConnectEMC {yes|no}] [emailFromAddr <value>] [-emailToAddrs <value>] [-emailSeverity {critical|error|warning|notice |info}] [-snmpSeverity {critical|error|warning|notice|info}]
Action qualifiers
Qualifier
-enableConnectEMC -mode
Description
Enable the system to send e-mail alerts to EMC service. Value is yes or no. Specifies which server ConnectEMC will use. Valid values are: esrs smtp. Type the e-mail address the system will use as the FROM address. The addresses will appear in the FROM field of the recipients e-mail application. Type a comma-separated list of e-mail addresses the system will send alerts. Specify the minimal severity of alerts the system will send as e-mails. Value is critical, error, warning, or info. Specify the minimal severity of alerts the system will send as SNMP traps.
Example
The following command changes these alert settings:
Connect EMC is enabled. FROM address is admin@mail.com. TO addresses are jason@mail.com and pete@mail.com. Minimum alert severity for sending e-mail alerts is info. Minimum alert severity for sending alerts as SNMP traps is error.
uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /event/alert/conf set enableConnectEMC yes emailFromAddr me@mail.com -emailToAddrs jason@mail.com,pete@mail.com emailSeverity info -snmpSeverity error Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
Information Provide routine status information about system operation. Warnings Indicate that a problem has occurred or may occur. Errors Report system problems that occurred or are occurring.
You can configure the types of alert information the system reports (informational, error, or emergency indications). Each SNMP destination is identified by an ID. Table 69 on page 291 lists the attributes for SNMP destinations.
Table 69 SNMP destination attributes
Attribute
ID Host Port User name Auth protocol
Description
ID of the SNMP destination. Hostname or IP address of the SNMP destination. Host port on the SNMP destination that will receive the traps. Username that is used to access the SNMP destination. Protocol that is used to authenticate access to the SNMP destination. Value is one of the following: none No authentication md5 Message-Digest algorithm 5 sha Secure Hash Algorithm Authentication password for accessing the SNMP destination. Protocol that is used to enable privacy on the SNMP destination. The privacy protocol encrypts the SNMP packets. Value is one of the following: none No encryption aes Advanced Encryption Standard des Data Encryption Standard Privacy password for the privacy protocol.
Privacy password
Format
/event/alert/snmp create -host <value> -port <value> -userName <value> [-authProto {none|md5 -authPassword <value> [-privProto {none|aes -privPassword <value>|des privPassword <value>}] |sha -authPassword <value> [-privProto {none|aes -privPassword <value>|des -privPassword <value>}]}]
Action qualifiers
Qualifier
-host -port -userName -authProto
Description
Type a hostname or IP address of the SNMP destination. Type the host port on the SNMP destination that will receive the traps. Type the username that is used to access the SNMP destination. Specify the protocol that is used to authenticate access to the SNMP destination. Value is one of the following: none No authentication md5 Message-Digest algorithm 5 sha Secure Hash Algorithm Type the authentication password. Specify the protocol that is used to enable privacy on the SNMP destination. Value is one of the following: none No encryption aes Advanced Encryption Standard des Data Encryption Standard Type the privacy password.
-authPassword -privProto
-privPassword
Example
The following command creates an SNMP destination with these settings:
Host IP is 10.64.75.1. Host port is 333. Username is user1. Authorization protocol is md5. Authorization password is authpassword1234. Privacy protocol is des. Privacy password is privpassword321.
The SNMP destination receives ID Host1_333: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /event/alert/snmp create host 10.64.75.1 port 333 userName user1 authProto md5 -authPassword authpassword1234 privProto des privPassword privpassword321 Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = Host1_333 Operation completed successfully.
Format
/event/alert/snmp [-id <value>] show
Object qualifier
Qualifier
-id
Description
Type the ID of an SNMP destination.
Example
The following command lists all SNMP destinations: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /event/alert/snmp show Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection 1: ID Host Port User name Auth protocol Privacy protocol = = = = = = Host1_323 Host1 323 user1 md5 aes
Format
/event/alert/snmp id <value> set [-host <value>] [-port <value>] [-userName <value>] [-authProto {none|md5 -authPassword <value> [-privProto {none|aes -privPassword <value>|des -privPassword <value>}]|sha -authPassword <value> [-privProto {none|aes -privPassword <value>|des -privPassword <value>}]}]
Object qualifier
Qualifier
-id
Description
Type the ID of the SNMP destination to change.
Action qualifiers
Qualifier
-host -port -userName -authProto
Description
Type a hostname or IP address of the SNMP destination. Type the host port on the SNMP destination that will receive the traps. Type the username that is used to access the SNMP destination. Specify the protocol that is used to authenticate access to the SNMP destination. Value is one of the following: none No authentication md5 Message-Digest algorithm 5 sha Secure Hash Algorithm Type the authentication password. Specify the protocol that is used to enable privacy on the SNMP destination. Value is one of the following: none No encryption aes Advanced Encryption Standard des Data Encryption Standard Type the privacy password.
-authPassword -privProto
-privPassword
Example
The following command changes the authorization protocol, privacy protocol, authorization password, and privacy password for SNMP destination Host1_323: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /event/alert/snmp id Host1_323 set authProto md5 -authPassword newauthpassword privProto des privPassword newprivpassword Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection ID = Host1_323 Operation completed successfully.
Format
/event/alert/snmp -id <value> delete
Object qualifier
Qualifier
-id
Description
Type the ID of an SNMP destination to delete.
Example
The following command deletes SNMP destination Host1_323: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /event/alert/snmp -id Host1_323 delete Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
10
This chapter addresses the following topics:
Prerequisite
Both Storage Processors (SPs) must be present in the system and their boot mode must be Normal Mode. If you have removed an SP or an SP has failed, you must replace the SP before you can change the Service password.
Format
/service/user set passwd <value> [-oldpasswd <value> | -force
Action qualifiers
Qualifier
-passwd
Description
Type a new Service password. The following are the password requirements: Passwords must be 8 to 40 characters in length and cannot contain spaces. Passwords must include mixed case, a number, and a special character from this list: !,@#$%^*?_~ When changing a password, do not reuse any of the last 3 passwords. Type the old password to set the new password. Specify whether it is a password modification request or a password reset request. This is intended to be used by service user only.
-oldpasswd -force
Example
The following command changes the Service password. Note that this can only be executed in normal mode.: uemcli -d 10.0.0.1 -u Local/joe -p MyPassword456! /service/user set passwd NewPassword456! oldpasswd OldPassword456! Storage system address: 10.0.0.1 Storage system port: 443 HTTPS connection Operation completed successfully.
A
This appendix addresses the following topics:
Reference
Storage resource size limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Unisphere CLI encoding information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
Chapter A, Reference
Minimum size
Default size
Maximum size
Minimum Recommended Maximum protection size for protection size scheduled size protection
0% or 5% 0% or 105% 0% or 105% 0% or 105% 0% or 5% 0% or 5% 35% 135% 35% 135% 35% 35% 16 TB 14 TB 14 TB 14 TB 14 TB 16 TB
Shared folders Generic iSCSI storage Generic iSCSI storage (TPa) VMware VMFS datastores VMware VMFS datastores (TP) VMware NFS datastores
1 GB 1 GB 1 GB 10 GB 10 GB 10 GB
if (@ans && $ans[0] =~ m/\x00/) { my $s = decode('utf-16', join(encode('ucs-2', "\n"), @ans)); @ans = split(/\n/, $s); }
Index
A
accessing a system 30 action qualifiers 20 actions 2021 change objects 21 creating objects 2122 get help 26 viewing objects 21 aggregating ports 107 alert settings 287 configuring 289 viewing 289 alerts 283, 297 configuring SNMP destinations 291 viewing history 286 viewing settings 170, 284 authentication managing reverse CHAP 86 viewing reverse CHAP settings 86
command help 24 configured hosts 136 creating 213, 233 creating objects 22
D
datastores NFS 223 VMFS 232 deduplication 256 configuring settings 257 forcing a rescan 258 viewing settings 157158, 160167, 169, 256 disk groups 185 adding spares 187 viewing 185 viewing recommended configurations 187 disks adding to pools 180 managing disk groups 185 removing from pools 181 DNS server domains creating 111 deleting 112 designating default addresses 113 viewing 112 viewing default addresses 113 domain name servers 111
C
certificates 32 CHAP accounts changing 147 creating 146 deleting 148 viewing 147 CHAP authentication 146 CIFS network shares 208 changing 210 creating 208 deleting 211 viewing 209 client configuring 27 getting help on using 24 installing 17 launching 17 understanding the syntax 19
E
Ethernet ports changing settings 97 managing 96 viewing settings 96 EULA accept 56 agree to 56 events 283, 297 viewing 285 viewing settings 170, 284
VNXe Unisphere CLI User Guide 301
Index
F
failing back storage servers 37
G
generic iSCSI storage resources 212213, 232233 changing 215, 236 deleting 217, 237 viewing 215, 235
H
header,hiding 32 health check 38 help on commands 24 host configurations 136 changing 140 creating 137 deleting 142 viewing 139 hosts 136 managing iSCSI initiators 143
configuring 126 deleting 131 viewing 128 licenses viewing 5556 link aggregations 107 changing 109 creating 108 deleting 110 viewing 108 local storage pools 189 logging in 30 logs storing remotely 64
M
managing 32
N
NDMP server settings 123 configuring 123 viewing 123 network shares changing CIFS 210 changing NFS 200, 205 creating CIFS 208 creating NFS 201 deleting CIFS 211 deleting NFS 207 viewing CIFS 209 viewing NFS 204 NFS datastores changing settings 228 creating 225 deleting 230 managing 223 viewing settings 227 NFS network shares 201 changing 200, 205 creating 201 deleting 207 viewing 204 NIS server domains 118 changing 119 creating 118 deleting 120 viewing 118 NTP server settings 115 creating 115 deleting 117 viewing 116
I
I/O modules commiting 170 managing 170 viewing 171 introduction 15 IP routes creating 104 deleting 106 viewing 105 iSCSI host initiators 143 managing CHAP authentication 146 managing nodes 92 virtual disks 218 iSCSI initiators creating 143 deleting 144 viewing 144 iSCSI nodes 92 changing settings 94 creating 93 deleting 95 viewing settings 93 iSCSI storage managing iSCSI nodes 92 managing reverse CHAP 86 setting up iSNS 88 iSNS records creating 88 deleting 89 setting up for iSCSI storage 88 viewing settings 88
O
object qualifiers 19 objects 19 changing 21 creating 2122
L
LDAP settings 125 changing 129
302 VNXe Unisphere CLI User Guide
Index
get help 25 qualifiers 19 viewing 21 one-way CHAP 86 specify secret password 87 specifying the secret password 86
S
schedule rules creating 73 deleting 78 managing 73 viewing 77 schedules deleting 72 managing rules 73 viewing 71 scheduling 71 scripting 16 Service password, changing 298 Shared Folder Servers changing settings 83 creating 81 deleting 85 managing 80 viewing 83 shared folders 192 deleting 199, 230 viewing 197198, 227228 size qualifiers 20 SMTP server settings 121 configuring 122 viewing 121 snapshots 262 creating 263 deleting 267 demoting from iSCSI hosts 266 promoting to iSCSI hosts 265 restoring storage resources to 266 scheduling 71 viewing 264 SNMP sending alerts as traps 291 SNMP destinations 291 changing settings 293 creating 292 deleting 294 viewing 293 software versions 67 spare disks, adding to disk groups 187 SSL certificates 32 clearing 33 configuring policies 32 deleting 33 importing 33 viewing 32 storage pools 174 custom pools 176 Storage Processors changing port settings 97 managing ports 96
P
pools 174, 176 adding disks 180 changing custom 179 configuring automatically 174 configuring custom 177 removing unused disks 181 viewing custom 178 viewing local pools 189 viewing settings for automatic configuration 175 ports aggregating 107 change settings 97 managing 96 viewing settings 96 protection replication 269, 280 snapshots 262
Q
qualifiers for actions 20 for objects 19 for size values 20
R
remote logging 64 configuring 65 viewing settings 65 remote system configurations changing 152 creating 149 deleting 152 verifying settings 150 viewing 151 remote systems 135, 149 replication sessions 269, 280 changing 274, 280 creating 272 deleting 276 failing back 278279 failing over 277 switching over 276 synchronizing manually 275 viewing 274, 280 reverse CHAP 8687 disabling the secret password 87 specifying the secret password 86 viewing settings 86 roles 50
Index
viewing port settings 96 storage profiles viewing 182 viewing recommended 183 storage resources generic iSCSI 212, 232 shared folders 192 viewing system supported 191 storage servers, failing back 37 storage types 16 switches 19, 27 accessing a system 30 viewing 28 syntax 19 help 24 system alerts 283, 297 checking health 38 events 283, 297 system settings 36 changing 37 viewing 36 system software upgrading 69 viewing versions 67
U
upgrade sessions creating 69 viewing 70 upgrading system software 69 creating upgrade sessions 69 viewing upgrade sessions 70 user roles 50 users changing accounts 53, 254 creating accounts 51 deleting accounts 54 viewing accounts 52 viewing roles 50
V
viewing objects 21 viewing the switches 28 virtual disks 218 changing 220 creating 218 deleting 221 viewing 219 VMFS datastores changing settings 236 creating 233 deleting 237 managing 232 viewing settings 235 VMware