110 6252 en R2 CLI Reference Guide
110 6252 en R2 CLI Reference Guide
Reference Guide
PS Series Firmware Version 9.0
FS Series Firmware Version 4.0
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
property laws. Dell and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other
marks and names mentioned herein may be trademarks of their respective companies.
2016 - 06
Rev. 110-6252-EN-R2
Contents
About This Manual................................................................................................. 19
Audience.............................................................................................................................................. 19
Conventions.........................................................................................................................................19
Related Documentation..................................................................................................................... 20
Online Services....................................................................................................................................20
Dell EqualLogic Storage Solutions..................................................................................................... 20
Technical Support and Customer Service......................................................................................... 20
3
acl access-policy-group..................................................................................................................... 47
acl access-policy-group create......................................................................................................... 48
acl access-policy-group delete......................................................................................................... 49
acl access-policy-group rename....................................................................................................... 49
acl access-policy-group select.......................................................................................................... 50
acl access-policy-group select access-policy.................................................................................. 50
acl access-policy-group select associate-to..................................................................................... 51
acl access-policy-group select disassociate-from............................................................................51
acl access-policy-group select show................................................................................................ 52
acl access-policy-group show........................................................................................................... 53
acl volume show................................................................................................................................. 53
ad-groups search................................................................................................................................54
alerts.................................................................................................................................................... 54
alerts select..........................................................................................................................................55
alerts show.......................................................................................................................................... 56
chapuser.............................................................................................................................................. 57
chapuser create...................................................................................................................................57
chapuser delete...................................................................................................................................58
chapuser rename................................................................................................................................ 59
chapuser select................................................................................................................................... 59
chapuser select show......................................................................................................................... 60
chapuser show.................................................................................................................................... 61
collection............................................................................................................................................. 61
collection create................................................................................................................................. 62
collection delete................................................................................................................................. 63
collection rename............................................................................................................................... 63
collection select..................................................................................................................................64
collection select add...........................................................................................................................65
collection select delete.......................................................................................................................65
collection select replication............................................................................................................... 66
collection select replication create-repcol....................................................................................... 66
collection select replication disable................................................................................................... 67
collection select replication enable................................................................................................... 68
collection select replication select show...........................................................................................68
collection select replication show..................................................................................................... 69
collection select schedule..................................................................................................................69
collection select schedule create.......................................................................................................70
collection select schedule delete....................................................................................................... 72
collection select schedule rename.....................................................................................................72
collection select schedule select........................................................................................................73
collection select schedule show........................................................................................................ 75
collection select show........................................................................................................................ 75
4
collection select sync-rep.................................................................................................................. 76
collection show...................................................................................................................................78
discover-devices................................................................................................................................. 78
domain-list show................................................................................................................................ 79
eula status............................................................................................................................................79
failback................................................................................................................................................ 80
failback retry........................................................................................................................................ 81
failback show....................................................................................................................................... 81
failback start........................................................................................................................................ 82
failback stop........................................................................................................................................ 82
folder................................................................................................................................................... 83
folder create........................................................................................................................................ 83
folder delete........................................................................................................................................ 84
folder rename......................................................................................................................................84
folder select.........................................................................................................................................85
folder select inbound-replicaset........................................................................................................ 86
folder select remove-all......................................................................................................................87
folder select show............................................................................................................................... 87
folder select volume........................................................................................................................... 88
folder show......................................................................................................................................... 88
grpparams........................................................................................................................................... 89
grpparams cliaccess-ssh ....................................................................................................................93
grpparams cliaccess-telnet................................................................................................................ 94
grpparams conn-balancing................................................................................................................ 94
grpparams crypto-legacy-protocols................................................................................................. 94
grpparams date................................................................................................................................... 95
grpparams dcb.................................................................................................................................... 96
grpparams dcb def-vlan-id.................................................................................................................96
grpparams default-snapshot-sched.................................................................................................. 96
grpparams default-snapshot-sched show........................................................................................ 99
grpparams default-snapshot-sched start-time.................................................................................99
grpparams def-iscsi-alias................................................................................................................. 100
grpparams def-mgmt-gateway....................................................................................................... 100
grpparams def-sector-size............................................................................................................... 101
grpparams def-snap-borrow............................................................................................................ 101
grpparams def-snap-depletion........................................................................................................ 102
grpparams def-snap-reserve............................................................................................................102
grpparams def-snap-warn................................................................................................................103
grpparams def-thin-growth-max.................................................................................................... 104
grpparams def-thin-growth-warn................................................................................................... 104
grpparams description ..................................................................................................................... 105
grpparams disallow-downgrades.....................................................................................................105
5
grpparams discovery-use-chap....................................................................................................... 106
grpparams dns-server-list................................................................................................................ 106
grpparams dns-suffix-list ................................................................................................................. 107
grpparams email-contact................................................................................................................. 107
grpparams email-from......................................................................................................................108
grpparams email-list......................................................................................................................... 108
grpparams email-notify.................................................................................................................... 109
grpparams ftp-service.......................................................................................................................109
grpparams group-ipaddress............................................................................................................. 110
grpparams group-ipv6address..........................................................................................................110
grpparams info-messages.................................................................................................................112
grpparams iscsi-local-auth............................................................................................................... 112
grpparams iscsi-radius-auth............................................................................................................. 112
grpparams isns-server-list.................................................................................................................113
grpparams location............................................................................................................................113
grpparams login-radius-acct............................................................................................................ 114
grpparams login-radius-attr..............................................................................................................114
grpparams login-radius-auth............................................................................................................ 115
grpparams management-network....................................................................................................115
grpparams name................................................................................................................................ 117
grpparams ntp-server-list..................................................................................................................117
grpparams passwd ............................................................................................................................118
grpparams perf-balancing................................................................................................................ 118
grpparams protocol-endpoint access show....................................................................................119
grpparams radius-acct-list................................................................................................................119
grpparams radius-acct-retries..........................................................................................................120
grpparams radius-acct-secrets........................................................................................................ 120
grpparams radius-acct-timeout....................................................................................................... 121
grpparams radius-auth-list............................................................................................................... 122
grpparams radius-auth-retries..........................................................................................................122
grpparams radius-auth-secrets........................................................................................................ 123
grpparams radius-auth-timeout.......................................................................................................124
grpparams session-banner............................................................................................................... 124
grpparams session-idle-timeout...................................................................................................... 125
grpparams show................................................................................................................................126
grpparams smtp-server-list.............................................................................................................. 127
grpparams snmp............................................................................................................................... 128
grpparams snmp show..................................................................................................................... 129
grpparams standby-button...............................................................................................................129
grpparams syslog-notify................................................................................................................... 129
grpparams syslog-server-list............................................................................................................ 130
grpparams target-auth-password....................................................................................................130
6
grpparams target-auth-username.................................................................................................... 131
grpparams thermal-shutdown.......................................................................................................... 131
grpparams time................................................................................................................................. 132
grpparams timezone......................................................................................................................... 132
grpparams vss-vds ...........................................................................................................................133
grpparams vss-vds access................................................................................................................ 133
grpparams vss-vds access-policy.....................................................................................................135
grpparams vss-vds access-policy-group.........................................................................................135
grpparams vss-vds show.................................................................................................................. 136
grpparams webaccess...................................................................................................................... 136
grpparams webaccess-noencrypt....................................................................................................136
ipsec................................................................................................................................................... 137
ipsec certificate..................................................................................................................................137
ipsec certificate delete...................................................................................................................... 138
ipsec certificate load......................................................................................................................... 138
ipsec certificate select show.............................................................................................................139
ipsec certificate show....................................................................................................................... 140
ipsec enable | disable........................................................................................................................140
ipsec policy........................................................................................................................................140
ipsec policy create.............................................................................................................................141
ipsec policy delete.............................................................................................................................143
ipsec policy show..............................................................................................................................143
ipsec security-association................................................................................................................ 144
ipsec security-association delete..................................................................................................... 145
ipsec security-association show...................................................................................................... 145
ipsec security-params.......................................................................................................................146
ipsec security-params create........................................................................................................... 146
ipsec security-params create certificate.......................................................................................... 147
ipsec security-params create manual-key.......................................................................................149
ipsec security-params create pre-shared-key.................................................................................150
ipsec security-params delete............................................................................................................153
ipsec security-params select show.................................................................................................. 153
ipsec security-params show............................................................................................................. 153
ipsec show......................................................................................................................................... 155
ldap.................................................................................................................................................... 156
ldap ad-group....................................................................................................................................157
ldap ad-group add.............................................................................................................................157
ldap ad-group delete........................................................................................................................ 158
ldap ad-group select.........................................................................................................................159
ldap ad-group select show...............................................................................................................160
ldap ad-group show.......................................................................................................................... 161
ldap ad-server....................................................................................................................................161
7
ldap ad-user...................................................................................................................................... 162
ldap ad-user add............................................................................................................................... 162
ldap ad-user delete........................................................................................................................... 164
ldap ad-user select............................................................................................................................164
ldap ad-user select show..................................................................................................................165
ldap ad-user show............................................................................................................................ 166
ldap authentication........................................................................................................................... 167
ldap server-list .................................................................................................................................. 167
ldap server-list create........................................................................................................................167
ldap server-list delete........................................................................................................................169
ldap server-list select........................................................................................................................ 169
ldap server-list select show.............................................................................................................. 170
ldap server-list show......................................................................................................................... 170
ldap show........................................................................................................................................... 171
local-groups search...........................................................................................................................171
member..............................................................................................................................................172
member delete.................................................................................................................................. 172
member rename................................................................................................................................173
member select...................................................................................................................................174
member select data-reduction compression resume.....................................................................178
member select data-reduction compression start..........................................................................178
member select data-reduction compression suspend................................................................... 179
member select disk select clear-label..............................................................................................179
member select disk select show...................................................................................................... 180
member select disk show.................................................................................................................180
member select eth select..................................................................................................................181
member select eth select dcb show................................................................................................ 183
member select eth select show....................................................................................................... 185
member select eth show.................................................................................................................. 185
member select sed-backup-key...................................................................................................... 186
member select show.........................................................................................................................187
member show................................................................................................................................... 192
monitor..............................................................................................................................................194
nas......................................................................................................................................................195
nas show............................................................................................................................................195
nas-cluster.........................................................................................................................................196
nas-cluster create............................................................................................................................. 196
nas-cluster delete............................................................................................................................. 199
nas-cluster rename........................................................................................................................... 199
nas-cluster select..............................................................................................................................199
nas-cluster select active-client-sessions nfs show........................................................................ 202
nas-cluster select active-client-sessions smb show...................................................................... 202
8
nas-cluster select ad-users search.................................................................................................. 203
nas-cluster select alerts available-space-threshold....................................................................... 203
nas-cluster select alerts used-space-threshold............................................................................. 204
nas-cluster select alerts show......................................................................................................... 204
nas-cluster select all-users.............................................................................................................. 205
nas-cluster select antivirus-servers................................................................................................. 205
nas-cluster select antivirus-servers create......................................................................................206
nas-cluster select antivirus-servers deleteAll..................................................................................206
nas-cluster select appliance.............................................................................................................207
nas-cluster select appliance select..................................................................................................208
nas-cluster select client-load-balance action move load-ip access-ip controller...................... 209
nas-cluster select client-load-balance action pin load-ip access-ip controller........................... 210
nas-cluster select client-load-balance action unpin load-ip access-ip controller....................... 210
nas-cluster select client-load-balance show...................................................................................211
nas-cluster select container..............................................................................................................211
nas-cluster select container create..................................................................................................212
nas-cluster select container delete..................................................................................................214
nas-cluster select container rename............................................................................................... 214
nas-cluster select container select...................................................................................................215
nas-cluster select container select access-security........................................................................216
nas-cluster select container select data-reduction.........................................................................217
nas-cluster select container select def-group-quota.....................................................................218
nas-cluster select container select def-group-quota modify........................................................ 219
nas-cluster select container select def-user-quota....................................................................... 220
nas-cluster select container select def-user-quota modify........................................................... 221
nas-cluster select container select dir-permission......................................................................... 221
nas-cluster select container select few-writers.............................................................................. 222
nas-cluster select container select file-permission........................................................................ 222
nas-cluster select container select group-quota............................................................................223
nas-cluster select container select group-quota create................................................................ 224
nas-cluster select container select group-quota delete................................................................ 224
nas-cluster select container select group-quota-effective-rule select show...............................225
nas-cluster select container select group-quota modify............................................................... 225
nas-cluster select container select group-quota select show.......................................................226
nas-cluster select container select group-quota show..................................................................226
nas-cluster select container select nfs-export................................................................................227
nas-cluster select container select nfs-export create.................................................................... 227
nas-cluster select container select nfs-export delete.................................................................... 229
nas-cluster select container select nfs-export select.....................................................................229
nas-cluster select container select nfs-export show...................................................................... 231
nas-cluster select container select quota-dir create...................................................................... 232
nas-cluster select container select quota-dir delete...................................................................... 233
9
nas-cluster select container select quota-dir select modify.......................................................... 233
nas-cluster select container select quota-dir show....................................................................... 234
nas-cluster select container select quota-usage............................................................................ 235
nas-cluster select container select rename.................................................................................... 235
nas-cluster select container select replication................................................................................235
nas-cluster select container select schedule.................................................................................. 237
nas-cluster select container select schedule create....................................................................... 237
nas-cluster select container select schedule delete.......................................................................239
nas-cluster select container select schedule rename.................................................................... 239
nas-cluster select container select schedule select ...................................................................... 240
nas-cluster select container select schedule show........................................................................ 241
nas-cluster select container select show........................................................................................ 241
nas-cluster select container select size...........................................................................................242
nas-cluster select container select smb-share............................................................................... 243
nas-cluster select container select smb-share create....................................................................243
nas-cluster select container select smb-share delete....................................................................245
nas-cluster select container select smb-share select.................................................................... 245
nas-cluster select container select smb-share select continuousavailability................................247
nas-cluster select container select smb-share select messageencryption...................................248
nas-cluster select container select smb-share show..................................................................... 248
nas-cluster select container select snap-reserve........................................................................... 249
nas-cluster select container select snap-warn............................................................................... 250
nas-cluster select container select snapshot..................................................................................250
nas-cluster select container select snapshot create-now.............................................................. 251
nas-cluster select container select snapshot delete....................................................................... 251
nas-cluster select container select snapshot rename.................................................................... 252
nas-cluster select container select snapshot select....................................................................... 252
nas-cluster select container select snapshot select thin-clone create......................................... 253
nas-cluster select container select snapshot show........................................................................ 254
nas-cluster select container select space-warn............................................................................. 254
nas-cluster select container select thin-clone show......................................................................255
nas-cluster select container select thin-provision disable............................................................. 256
nas-cluster select container select thin-provision enable..............................................................256
nas-cluster select container select thin-provision enable thin-reserve.........................................257
nas-cluster select container select user-quota...............................................................................257
nas-cluster select container select user-quota create................................................................... 258
nas-cluster select container select user-quota delete................................................................... 259
nas-cluster select container select user-quota-effective-rule select show..................................259
nas-cluster select container select user-quota modify..................................................................260
nas-cluster select container select user-quota select show.......................................................... 261
nas-cluster select container select useringroup-quota..................................................................261
nas-cluster select container select useringroup-quota create...................................................... 262
10
nas-cluster select container select useringroup-quota delete...................................................... 263
nas-cluster select container select useringroup-quota modify.....................................................264
nas-cluster select container select useringroup-quota select show.............................................265
nas-cluster select container show...................................................................................................265
nas-cluster select controller............................................................................................................ 266
nas-cluster select controller add..................................................................................................... 267
nas-cluster select controller select..................................................................................................267
nas-cluster select controller select attach...................................................................................... 270
nas-cluster select controller select detach..................................................................................... 270
nas-cluster select controller select load show................................................................................ 271
nas-cluster select controller select traffic show............................................................................. 272
nas-cluster select credentials...........................................................................................................273
nas-cluster select credentials create............................................................................................... 273
nas-cluster select credentials delete................................................................................................275
nas-cluster select credentials modify ad-preferred-dc.................................................................. 276
nas-cluster select credentials select AD.......................................................................................... 277
nas-cluster select data-reduction schedule.................................................................................... 277
nas-cluster select data-reduction schedule create........................................................................ 278
nas-cluster select data-reduction schedule delete........................................................................ 279
nas-cluster select data-reduction schedule rename...................................................................... 279
nas-cluster select data-reduction schedule select.........................................................................280
nas-cluster select def-access-security............................................................................................ 281
nas-cluster select def-available-space-warn.................................................................................. 281
nas-cluster select def-data-reduction............................................................................................ 282
nas-cluster select def-dir-permission............................................................................................. 282
nas-cluster select def-file-permission.............................................................................................283
nas-cluster select def-gateway........................................................................................................283
nas-cluster select def-nfs-permission............................................................................................ 284
nas-cluster select def-nfs-trusted-users........................................................................................ 284
nas-cluster select def-smb-access-based-enum.......................................................................... 285
nas-cluster select def-smb-antivirus...............................................................................................285
nas-cluster select def-smb-avexcludedirs......................................................................................286
nas-cluster select def-smb-avextensions....................................................................................... 286
nas-cluster select def-snap-reserve................................................................................................ 287
nas-cluster select def-snap-warn................................................................................................... 288
nas-cluster select def-space-provision thin|thick.......................................................................... 288
nas-cluster select def-space-warn..................................................................................................289
nas-cluster select def-thin-reserve................................................................................................. 289
nas-cluster select diagnostics..........................................................................................................290
nas-cluster select diagnostics show................................................................................................290
nas-cluster select diagnostics start-client....................................................................................... 291
nas-cluster select diagnostics start-file........................................................................................... 291
11
nas-cluster select diagnostics start-general................................................................................... 292
nas-cluster select diagnostics start-network.................................................................................. 292
nas-cluster select diagnostics start-nfs........................................................................................... 293
nas-cluster select diagnostics start-performance.......................................................................... 293
nas-cluster select diagnostics start-protocols................................................................................294
nas-cluster select diagnostics start-smb.........................................................................................294
nas-cluster select diagnostics start-smb-homeshare.................................................................... 295
nas-cluster select failback................................................................................................................ 295
nas-cluster select fs-scan-rate........................................................................................................ 296
nas-cluster select ftp-service...........................................................................................................296
nas-cluster select initialize-cluster.................................................................................................. 297
nas-cluster select local-group......................................................................................................... 297
nas-cluster select local-group create............................................................................................. 298
nas-cluster select local-group delete............................................................................................. 298
nas-cluster select local-group select show.................................................................................... 299
nas-cluster select local-group show...............................................................................................299
nas-cluster select local-user........................................................................................................... 300
nas-cluster select local-user create.................................................................................................301
nas-cluster select local-user delete................................................................................................ 302
nas-cluster select local-user modify............................................................................................... 302
nas-cluster select local-user select show....................................................................................... 303
nas-cluster select local-user show..................................................................................................304
nas-cluster select mass-failback..................................................................................................... 304
nas-cluster select mass-rebalance.................................................................................................. 305
nas-cluster select max-supported-nfs-version.............................................................................. 305
nas-cluster select ndmp...................................................................................................................306
nas-cluster select ndmp dma-server-list........................................................................................ 306
nas-cluster select ndmp passwd......................................................................................................307
nas-cluster select ndmp port........................................................................................................... 307
nas-cluster select ndmp show.........................................................................................................308
nas-cluster select ndmp start.......................................................................................................... 308
nas-cluster select ndmp stop.......................................................................................................... 309
nas-cluster select ndmp username................................................................................................. 309
nas-cluster select network............................................................................................................... 310
nas-cluster select network create....................................................................................................310
nas-cluster select network create client-secondary....................................................................... 311
nas-cluster select network delete.................................................................................................... 312
nas-cluster select network select.....................................................................................................312
nas-cluster select network select apply-changes........................................................................... 313
nas-cluster select network select cancel-changes.........................................................................314
nas-cluster select network select cluster-ip-list............................................................................. 314
nas-cluster select network select controller select.........................................................................314
12
nas-cluster select network select controller select controller-ip-addr-list................................... 315
nas-cluster select network select controller select show...............................................................316
nas-cluster select network select netmask......................................................................................316
nas-cluster select network select show...........................................................................................316
nas-cluster select network select static-route................................................................................ 317
nas-cluster select network select static-route add.........................................................................318
nas-cluster select network select static-route delete.....................................................................318
nas-cluster select network select static-route show...................................................................... 319
nas-cluster select network select vlan.............................................................................................319
nas-cluster select nfsv4-mode........................................................................................................ 320
nas-cluster select operation............................................................................................................ 320
nas-cluster select replicate-to-partner............................................................................................321
nas-cluster select resize................................................................................................................... 322
nas-cluster select service-mode......................................................................................................322
nas-cluster select show....................................................................................................................323
nas-cluster select show credentials.................................................................................................325
nas-cluster select smb-home-share create....................................................................................326
nas-cluster select smb-home-share delete.................................................................................... 327
nas-cluster select smb-home-share modify...................................................................................328
nas-cluster select smb-home-share show..................................................................................... 329
nas-cluster select smb-protocol maxsupportedversion................................................................ 330
nas-cluster select smb-protocol message-encryption.................................................................. 330
nas-cluster select smb-protocol message-signing.........................................................................331
nas-cluster select smb-protocol ntlm-config ntlm-set-name...................................................... 331
nas-cluster select smb-protocol ntlm-config show.......................................................................332
nas-cluster select smb-protocol show............................................................................................332
nas-cluster select traffic show......................................................................................................... 333
nas-cluster select unix-users search............................................................................................... 333
nas-cluster select update start.........................................................................................................334
nas-cluster select user-mapping..................................................................................................... 335
nas-cluster select user-mapping automatic................................................................................... 336
nas-cluster select user-mapping create..........................................................................................336
nas-cluster select user-mapping delete.......................................................................................... 337
nas-cluster select user-mapping show........................................................................................... 337
nas-cluster show.............................................................................................................................. 338
nfs-export select access...................................................................................................................339
nfs-export select access create....................................................................................................... 339
nfs-export select access delete....................................................................................................... 340
nfs-export select access select........................................................................................................340
nfs-export select access show......................................................................................................... 341
nsfv4-mode....................................................................................................................................... 341
partner............................................................................................................................................... 342
13
partner create....................................................................................................................................343
partner delete....................................................................................................................................347
partner rename................................................................................................................................. 348
partner select.................................................................................................................................... 349
partner select cancel-operation.......................................................................................................352
partner select failback-replicaset..................................................................................................... 352
partner select failback-replicaset select.......................................................................................... 353
partner select failback-replicaset select access.............................................................................. 354
partner select failback-replicaset select access create...................................................................355
partner select failback-replicaset select access delete...................................................................356
partner select failback-replicaset select access select....................................................................357
partner select failback-replicaset select access select show......................................................... 358
partner select failback-replicaset select assign...............................................................................359
partner select failback-replicaset select cancel-operation............................................................ 359
partner select failback-replicaset select delete-failback................................................................ 360
partner select failback-replicaset select pool................................................................................. 360
partner select failback-replicaset select promote........................................................................... 361
partner select failback-replicaset select show.................................................................................361
partner select failback-replicaset select unassign...........................................................................363
partner select failback-replicaset show...........................................................................................363
partner select inbound-nas-replication.......................................................................................... 364
partner select inbound-nas-replication delete............................................................................... 364
partner select inbound-nas-replication select................................................................................365
partner select inbound-nas-replication select pause..................................................................... 365
partner select inbound-nas-replication select promote................................................................ 366
partner select inbound-nas-replication select read-only-access..................................................367
partner select inbound-nas-replication resume............................................................................. 367
partner select inbound-nas-replication show................................................................................ 368
partner select inbound-pause..........................................................................................................368
partner select inbound-repcol.........................................................................................................369
partner select inbound-repcolset.................................................................................................... 370
partner select inbound-replicaset.................................................................................................... 371
partner select inbound-replicaset delete......................................................................................... 371
partner select inbound-replicaset select......................................................................................... 372
partner select inbound-replicaset select access............................................................................. 373
partner select inbound-replicaset select access create..................................................................373
partner select inbound-replicaset select access delete..................................................................375
partner select inbound-replicaset select access select.................................................................. 375
partner select inbound-replicaset select access show................................................................... 377
partner select inbound-replicaset select cancel-operation........................................................... 378
partner select inbound-replicaset select clone...............................................................................378
partner select inbound-replicaset select delete............................................................................. 380
14
partner select inbound-replicaset select lost-blocks mark-valid................................................... 381
partner select inbound-replicaset select manual-xfer done.......................................................... 381
partner select inbound-replicaset select pool................................................................................ 382
partner select inbound-replicaset select promote......................................................................... 382
partner select inbound-replicaset select show............................................................................... 385
partner select inbound-replicaset show..........................................................................................385
partner select inbound-resume....................................................................................................... 386
partner select move-space-delegated............................................................................................ 386
partner select nas-replication.......................................................................................................... 387
partner select nas-replication upgrade-protocol-version..............................................................387
partner select outbound-nas-replication........................................................................................388
partner select outbound-pause....................................................................................................... 389
partner select outbound-repcol...................................................................................................... 389
partner select outbound-repcolset................................................................................................. 390
partner select outbound-replicaset................................................................................................. 391
partner select outbound-replicaset delete...................................................................................... 391
partner select outbound-replicaset select...................................................................................... 392
partner select outbound-replicaset select delete........................................................................... 392
partner select outbound-replicaset select show............................................................................ 393
partner select outbound-replicaset show....................................................................................... 394
partner select outbound-resume.................................................................................................... 394
partner select pool-map...................................................................................................................395
partner select pool-space-delegated..............................................................................................396
partner select show.......................................................................................................................... 397
partner select volume-replication................................................................................................... 398
partner show..................................................................................................................................... 399
pool....................................................................................................................................................401
pool create........................................................................................................................................402
pool delete........................................................................................................................................403
pool merge....................................................................................................................................... 403
pool rename..................................................................................................................................... 404
pool select........................................................................................................................................ 404
pool show......................................................................................................................................... 407
recovery-bin..................................................................................................................................... 407
save-config....................................................................................................................................... 408
show...................................................................................................................................................411
show account....................................................................................................................................413
show alerts........................................................................................................................................ 413
show audit-log.................................................................................................................................. 414
show chapuser.................................................................................................................................. 415
show collections............................................................................................................................... 415
show-devices.................................................................................................................................... 415
15
show grpparams................................................................................................................................416
show member................................................................................................................................... 417
show nas-cluster...............................................................................................................................418
show partners....................................................................................................................................419
show pool......................................................................................................................................... 420
show recentevents........................................................................................................................... 420
show snapcol.................................................................................................................................... 421
show usersessions............................................................................................................................ 422
show volume.....................................................................................................................................422
snapcol..............................................................................................................................................424
snapcol create.................................................................................................................................. 424
snapcol delete...................................................................................................................................425
snapcol rename................................................................................................................................ 426
snapcol select................................................................................................................................... 426
snapcol show.................................................................................................................................... 427
storage-container............................................................................................................................. 427
storage-container create................................................................................................................. 428
storage-container delete................................................................................................................. 429
storage-container rename............................................................................................................... 429
storage-container select.................................................................................................................. 430
storage-container show................................................................................................................... 431
tag...................................................................................................................................................... 431
tag create.......................................................................................................................................... 432
tag delete.......................................................................................................................................... 432
tag rename........................................................................................................................................ 433
tag select show................................................................................................................................. 433
tag select value add.......................................................................................................................... 434
tag select value delete......................................................................................................................434
tag select value rename....................................................................................................................435
tag show............................................................................................................................................435
unix-groups search...........................................................................................................................436
volume.............................................................................................................................................. 436
volume create................................................................................................................................... 437
volume delete...................................................................................................................................440
volume rename................................................................................................................................. 441
volume select....................................................................................................................................442
volume select access........................................................................................................................447
volume select access create............................................................................................................ 448
volume select access delete............................................................................................................ 450
volume select access select.............................................................................................................450
volume select access show.............................................................................................................. 451
volume select clone......................................................................................................................... 452
16
volume select convert-to.................................................................................................................454
volume select create-thin-clone..................................................................................................... 455
volume select delete-failback.......................................................................................................... 455
volume select multihost-access...................................................................................................... 456
volume select pool........................................................................................................................... 457
volume select replicate-to-primary.................................................................................................458
volume select replication................................................................................................................. 458
volume select replication cancel..................................................................................................... 459
volume select replication create-replica.........................................................................................460
volume select replication demote....................................................................................................461
volume select replication disable.....................................................................................................462
volume select replication enable..................................................................................................... 462
volume select replication pause...................................................................................................... 464
volume select replication resume....................................................................................................464
volume select replication select...................................................................................................... 465
volume select replication show....................................................................................................... 466
volume select schedule....................................................................................................................467
volume select schedule create........................................................................................................ 468
volume select schedule delete........................................................................................................ 470
volume select schedule rename...................................................................................................... 470
volume select schedule select..........................................................................................................471
volume select schedule show.......................................................................................................... 472
volume select show.......................................................................................................................... 473
volume select shrink......................................................................................................................... 477
volume select size.............................................................................................................................478
volume select snapshot....................................................................................................................479
volume select snapshot create-now...............................................................................................480
volume select snapshot delete.........................................................................................................481
volume select snapshot rename...................................................................................................... 481
volume select snapshot select.........................................................................................................482
volume select snapshot select clone.............................................................................................. 484
volume select snapshot select restore............................................................................................ 485
volume select snapshot select show...............................................................................................486
volume select snapshot show......................................................................................................... 488
volume select snap-borrowing........................................................................................................488
volume select sync-rep....................................................................................................................489
volume select sync-rep failover....................................................................................................... 491
volume select tag assign...................................................................................................................491
volume select tag create.................................................................................................................. 492
volume select tag show....................................................................................................................492
volume select tag unassign.............................................................................................................. 493
volume show tag............................................................................................................................493
17
volume show.................................................................................................................................... 494
4 Global Commands............................................................................................513
alias.................................................................................................................................................... 513
clear................................................................................................................................................... 513
cli-settings......................................................................................................................................... 514
exec....................................................................................................................................................517
exit......................................................................................................................................................519
help....................................................................................................................................................520
history................................................................................................................................................ 521
logout................................................................................................................................................ 522
stty..................................................................................................................................................... 522
tree.....................................................................................................................................................522
whoami..............................................................................................................................................523
A Dell FluidFS Diagnostic Tool.......................................................................... 525
Start the Dell FluidFS Diagnostic Tool..............................................................................................525
Run the Dell Support Diagnostic Tool Cluster Options.................................................................. 526
Run the FluidFS Diagnostic Tool Diagnostics Tools........................................................................528
Run the Dell Support Diagnostic Tool Network Tools....................................................................530
Run the Dell Support Diagnostic Tool Disk Tools........................................................................... 532
Run the FluidFS Diagnostic Tool Quick Diagnostics....................................................................... 535
B Third-Party Copyrights................................................................................... 537
18
Preface
About This Manual
Dell EqualLogic PS Series arrays optimize resources by automating capacity, performance, and network
load balancing. Additionally, PS Series arrays offer all-inclusive array management software and firmware
updates. Dell EqualLogic FS Series appliances, combined with PS Series arrays, offer a high-performance,
high-availability, scalable NAS solution.
The Dell EqualLogic Group Manager command-line interface (CLI) lets you use CLI commands to
manage the group, a specific array, or a NAS appliance for maintenance purposes.
For information about using the Group Manager graphical user interface (GUI) to manage a group, see
the Dell EqualLogic Group Manager Administrator's Guide.
Audience
The PS Series and FS Series documentation is designed for administrators responsible for managing a PS
Series group and one or more FS Series appliances. Administrators are not required to have extensive
network or storage system experience. However, it is helpful to understand:
In addition, administrators might find it useful to understand the basic concepts for:
Network topologies
RAID configurations
Disk storage management
NOTE: Although this guide provides examples of using PS Series and FS Series hardware in some
common network configurations, detailed information about setting up a network is beyond the
scope of this document.
Conventions
The following typographical conventions are used in this document.
Convention Usage
> A greater-than symbol indicates the CLI command prompt.
19
Convention Usage
bold fixed width Input to command prompt
fixed_width_italic Indicates that you replace the variable with a command, parameter, file
name, and so on
text1|text2 Indicates that you can choose one of the items presented
parameter ... Trailing dots indicate that you can enter multiple parameters on a
command line, separated by spaces.
option [,...] Trailing dots, preceded by a comma, indicate that you can enter
multiple variables, separated by commas and no spaces.
[parameter] Brackets indicate that the item inside the bracket is optional.
Related Documentation
For detailed information about PS Series arrays, FS Series appliances, groups, volumes, array software, and
host software, log in to the Documentation page at the customer support site.
Online Services
You can learn about Dell products and services using this procedure:
Contacting Dell
Dell provides several online and telephone-based support and service options. Availability varies by
country and product, and some services might not be available in your area. To contact Dell for sales,
technical support, or customer service issues, go to dell.com/support.
20
1
Introduction to the CLI
The Dell EqualLogic Group Manager command-line interface (CLI) provides a comprehensive set of
commands for managing a group. The CLI also enables you to manage individual storage arrays for
maintenance purposes.
When connected to the group (or an array), press the Enter key and log in to a group administration
account (for example, grpadmin). You can then enter CLI commands at the command prompt.
The following example shows how to use telnet to log in to a group. The password is not shown on the
screen.
group1>
Command Types
The CLI commands are divided into the following categories:
Group management commands These commands manage the group, members, and volumes.
They use a tree structure and generally have subcommands, parameters, or variables.
See Group Management Commands for detailed information about command formats and examples.
Array management commands These commands operate only on a specific array. To run, you
must use a telnet or ssh connection to an IP address assigned to a network interface on the array, not
to the group (or management) IP address. Alternatively, you can use a serial connection to the array.
See Array Management Commands for detailed information about command formats and examples.
Global commands These commands can be used anywhere in the CLI tree structure.
See Global Commands for detailed information about command formats and examples.
CLI help messages have two components, as shown in the following example:
If the component to the left is in angle brackets (< >), you must replace the variable. If the component to
the left is not in angle brackets, you must specify the parameter itself (and possibly a variable).
Command-Line Editing
To see help on editing the command line itself, use the help edit command.
For example, entering grp and then pressing the Tab key is the same as entering grpparams:
> grp<Tab>
> grpparams
Similarly, you can enter the beginning of a volume, member, snapshot, partner, or other object name and
press the Tab key to display all the names that match those initial letters or number. For example, when
you type: volume select vo<Tab>, the CLI completes the volume name for you, if only one volume begins
with those characters. If several volumes begin with vo, the CLI displays all of them:
At this point, you can select and paste the correct volume name. Alternatively, if you enter enough
characters to make the name unique, the CLI completes the name for you.
In some cases, you can use subcommand mode to simplify entering repetitive commands related to the
same component (for example, a volume or a member). Subcommand mode is available with the
grpparams command and with commands that use the select subcommand.
To use subcommand mode with the grpparams command, enter the command without any parameters
and press the Enter key. At the resulting grpparams prompt, you can enter parameters, pressing the Enter
key after each one. When you are done, enter the exit command to leave subcommand mode.
With commands that use the select subcommand, select the component and press the Enter key. You
can then enter parameters.
For example, the following commands create a volume and then use subcommand mode to specify a
description for the volume and change the permission to read-only:
Using subcommand mode is optional. The following example uses two complete command lines to
specify a description and read-write permission for a volume.
You can have multiple levels of subcommand mode when a command uses multiple select
subcommands. Use the exit command to leave one level at a time. Use the exit all command to leave
subcommand mode.
For example, the following series of commands takes you first into the subcommand level for a member,
then into the subcommand level for disk 1. Typing exit returns you to the member subcommand level.
From the disk subcommand level, typing exit all returns you to the root CLI level.
The stty command also displays the current settings and the type of terminal in use. See stty for more
information.
Whether to display confirmation messages for critical actions, such as deleting or restarting a member
Whether to display sizes in MB or GB
Whether to display event messages on the console
Whether to format the output of a show command
Whether to enable or disable the automatic logout of idle CLI sessions after 1 hour of inactivity
Whether to display one screenful of output at a time
PerformanceDiagnostic
NetworkDiagnostic
ProtocolsDiagnostic
FileSystemDiagnostic
GeneralSystemDiagnostic
To find either address, in the PS Series Group Manager GUI, select the NAS cluster name, then click
the Network tab.
2. From the CLI, run the following command with the diagnostic option you want (see list above):
For example:
ftp://admin@managementIP:44421/diagnostics
NOTE: The controller IP address you should use to retrieve the diagnostic file is displayed on
the screen.
2. Enter your grpadmin password.
NOTE: Use the embedded system diagnostics to test only your system. Using this program with
other systems might cause invalid results or error messages.
The ePSA Pre-boot System Assessment window is displayed, listing all devices detected in the
system. The diagnostics starts executing the tests on all the detected devices.
account
Manages local administration accounts. Only a group administrator can create new accounts.
Account Types
You can create the following types of accounts, which have the abilities and restrictions listed in Table 2.
Administration Account Types and Abilities.
Group administrators Can perform the same tasks as the grpadmin account, except
updating member firmware or retrieving diagnostic files using FTP
Can configure and manage the NAS cluster
Pool administrators Can see and manage only the objects (volume and members) that
are in the pool or pools specified by the account
Can optionally see all objects in the group
Can see any volume administrator accounts that have quotas in the
pool administrators pools
Cannot see or manage the NAS cluster
Cannot manage access policies or access policy groups
Volume administrators Can create, modify, and delete volumes in one or more pools, within
the quota limits set by the group administrator for that account
Can create, modify, and delete access policies and access policy
groups for the volumes under their control
Can optionally be assigned a replication partner for their volumes
Monitoring (read-only) Can see but cannot modify objects in the group (has read-only
accounts permission)
Cannot see or manage the NAS cluster
NOTE: You can also manage administration accounts using external RADIUS servers to perform the
authentication. See grpparams radius-acct-list.
Format
account subcommand
Subcommands
Subcommand Description
create Creates an account
show Shows all accounts or information about a specific account. Also shows
information about accounts that are currently logged in to the group.
account create
Creates an administration account. By default, the new account will be a group administrator account.
For a list of account types and what each type can do, see account.
When you create an account, you must enter the new account password twice. The password is not
shown on the screen. An account password must be 3 to 16 ASCII characters and is case-sensitive.
Punctuation characters are allowed, but spaces are not. Only the first 8 characters are used; the rest are
ignored (without a message).
You can enter user names containing pound signs (#). However, the group processes only those
characters preceding the pound sign. For example, if you try to create an account named
AdminUser#George, the resulting account is named AdminUser.
Formats
account create name [parameter ...]
account create name pool-admin pools pool1,pool2,... [group-read-access]
[parameter ...]
account create name volume-admin pool-quota-list {pool,quota,...|unlimited}
[partners] [parameter ...]
For your security, Dell recommends that you not reuse administrator
account names after they have been deleted. All accounts can always
view their own audit log information, and new accounts with previously
used account names will be able to view audit records for the old
account.
Common Parameters
Parameter Description
description text (Optional) Description of the account, up to 127 characters. Fewer
characters are accepted for this field if you enter the value as a Unicode
character string, which takes up a variable number of bytes, depending
on the specific character.
If the text contains spaces, enclose it in quotation marks.
contact name (Optional) Name of the person responsible for the account, up to 63
characters. Fewer characters are accepted for this field if you enter the
value as a Unicode character string, which takes up a variable number
of bytes, depending on the specific character.
If the name contains spaces, enclose it in quotation marks.
mobile phone_number (Optional) Mobile (cell phone) number, up to 31ASCII characters, of the
person responsible for the account.
If you use a #, make sure it is inside quotation marks (for
example: "test#test"). Otherwise, characters that follow the # will be
ignored.
enable|disable Sets the status for the account: enabled (default) or disabled
pools pool_name,... Specifies the pools that the account can manage. Separate the pool
names with commas only (no spaces).
partners (Optional) Specifies the replication partners to which the account has
partner1,partner2,... access for managing replication objects
Examples
Creating a Group Administrator Account
Create a group administration account. This account has the same privileges as the default grpadmin
account:
Create a read-only account. The account can see but cannot modify anything in the group.
Create a pool administration account that can manage the objects in two pools:
Create a pool administration account that can manage the objects in a pool, and can see all other objects
in the group:
Create a volume administration account that can manage volumes in three pools, and specify the quota
limit for each pool:
Create a volume administration account that can manage volumes in a pool, with no quota (unlimited).
This administrator can also replicate to a partner.
account delete
Deletes an administration account. You cannot delete the default grpadmin account.
NOTE: Dell recommends that administrator account names not be reused after they have been
deleted. All accounts can always view their own audit log information, and new accounts with
previously used account names will be able to view audit records for the old account.
Format
account delete account
Variable
Variable Description
account Name of an account
Example
Delete the an account:
Restrictions
You cannot change the name of an account. Instead, you must delete the account and then recreate
it with the new name.
You cannot disable, delete, change the name, or change the type of the default grpadmin account.
Only a group administrator can modify the pools for a pool administrator, the volume assignments,
pools, quotas, or replication partners for a volume administrator, or enable or disable any account.
Only a group administrator can modify the attributes of another group administrator account
(including changing it to a read-only account), with the exceptions noted above for the default
grpadmin account.
You cannot apply read-only permission to a volume administrator or pool administrator account.
Only a group administrator can set or remove the read-only flag.
A pool administrator can see all volumes in their pools. The pool administrator can unassign any
volume in their pools. However, the pool administrator cannot change any volume administrators
pool access privileges or storage quotas.
An existing account (for example, a group administrator account) cannot change its type (for example,
to volume administrator or pool administrator). To change the privileges on an account, delete it and
then create it with the preferred privileges.
Description
Contact name
Email address
Telephone number
Mobile phone number
Password
To delete a name, phone number, email address, or description, enter two quotation marks ().
Format
account select account parameter ...
Variable
Variable Description
account Name of an account
description text Description of the account, up to 127 characters. Fewer characters are
accepted for this field if you enter the value as a Unicode character
string, which takes up a variable number of bytes, depending on the
specific character.
If the text contains spaces, enclose it in quotation marks.
email email_address Email address, up to 31 ASCII characters, for the person responsible for
the account
mobile phone_number Mobile (cell phone) number, up to 31 ASCII characters, for the person
responsible for the account.
If you use a #, make sure it is inside quotation marks (for
example: "test#test"). Otherwise, characters that follow the # will be
ignored.
pool-admin pools list Comma-separated list of pools that the pool administrator can manage
volume-admin [pool- Selects a volume administrator account and specifies the pools that the
quota-list account can manage, and the quota for each pool. Follow each pool
pool_name,quota,...]
partners name with its quota. Separate the pool names and their quota limits
partner_list,...] with commas only (no spaces).
The minimum quota is 15MB, and the default unit of measure is MB. Use
g, G, gb, GB, m, M, mb, or MB to specify the unit of measure.
Examples
Changing a Password
Change the password for an account:
Increasing Quotas
Increase the quotas for a volume administrator:
The account still has read-write access on all objects in its designated pool or pools, but can no longer
see other objects in the group.
account show
Shows all administration accounts or information about a specific account.
Format
account show [account] [active]
Variable
Variable Description
account Name of an account
Parameter
Parameter Description
active Displays the accounts currently logged in to the group. For users logged
in through the GUI, the active parameter also shows the remote IP
address of the user and the local IP address (that is, the group or
member IP address to which the user is connected).
acl
Manages access control policies and access policy groups for application to multiple volumes in the
group.
For detailed information about access control policies and access policy groups, see the Dell EqualLogic
Group Manager Administrator's Guide.
Format
acl subcommand
volume show Displays the association of access policies and policy groups to volumes
acl access-policy
Manages access policies.
In PS Series firmware version 7.0 and higher, access policies provide an easier way to apply basic access
points to volumes. The policies determine how hosts and clusters access those volumes.
Use this command to define an access policy for hosts. The access policy provides an access descriptor
for how a host will access its volumes. For a group of hosts or nodes in a cluster, you define an access
policy group (see acl access-policy-group) that describes how a cluster will access its shared volumes.
For more information about access policies and access policy groups, see the Dell EqualLogic Group
Manager Administrator's Guide.
You can use access policies even if you already have basic access points defined on individual volumes
(see volume select access).
Format
acl access-policy subcommand
Subcommands
Subcommand Description
create Creates a new access policy
Format
acl access-policy create name [description text]
Variable
Variable Description
name Name of a new access policy, can be up to 31 characters long. Space
and underscores are not permitted. Fewer characters are accepted for
this field if you enter the value as a Unicode character string, which
takes up a variable number of bytes, depending on the specific
character.
Parameter
Parameter Description
description text Description for the access policy, 127 characters in length.Fewer
characters are accepted for this field if you enter the value as a Unicode
character string, which takes up a variable number of bytes, depending
on the specific character.
If the text contains spaces, enclose it in quotation marks (for example,
"my access policy").
Example
Create a new access policy with a description:
> acl access-policy create SQLserver description "Access policy for SQL server
host"
See Also
acl access-policy select
acl access-policy-group
Format
acl access-policy delete name
Example
Delete an access policy:
Format
acl access-policy rename current_name new_name
Variables
Variable Description
current_name Current name of an access policy
Example
Rename an access policy:
Format
acl access-policy select name subcommand
Subcommands
Subcommand Description
access-point Manages access points for the policy
Format
acl access-policy select name access-point subcommand
Variable
Variable Description
name Name of an access policy
Subcommands
Subcommand Description
add Adds an access point to the policy
Format
acl access-policy select name access-point add type[s] [description text]
type[s] Adds an access point of one or more of the following types to the
policy:
chap chapuser_name1, chapuser_name2, ...
ipaddress address1, address 2, ...
initiator initiator_name1, initiator_name2, ...
NOTE: You can have only one CHAP and iSCSI initiator name in an
access point. Multiple CHAP and iSCSI initiator names are
supported only in an access policy.
Parameter
Parameter Description
description text Adds or changes the description for the access policy.
If the text contains spaces, enclose it in quotation marks (for example,
my access point).
Examples
Add an access point for a CHAP user to an access policy:
> acl access-policy select SQLhost23 access-point add chap SJones initiator iqn.
1995-07.com.mycompany:sal_jonesPC.myemail.net
Format
acl access-policy select name access-point delete id
Example
Delete an access point from an access policy.
First, display the access points for the policy, then delete the access point by its ID number:
Redisplay the access policy to confirm that the access point was deleted:
Format
acl access-policy select name access-point select id [parameters | show]
Variables
Variable Description
name Name of an access policy
Parameters
Parameter Description
chap One or more CHAP user names, separated by
chapuser_name1,chapuser_name2,... commas (no spaces)
description text Adds or changes the description for the access policy.
If the text contains spaces, enclose it in quotation
marks (for example, my access point).
Subcommand
Subcommand Description
show Displays details for the selected access point ID
Examples
Add three CHAP users to an access policy:
> acl access-policy select Test access-point add chap kris initiator iqn.
1995-07.com.mycompany:user-pc.company.com
Format
acl access-policy select name associate-to volume association-type type
Variables
Variable Description
name Name of the access policy to select
type Specifies whether to associate the access policy to the volume and its
snapshots, the snapshots only, or the volume only:
vol-only
vol-and-snap
snap-only
Example
Associate an access policyto a volume, for both the volume and its snapshots:
NOTE: If the access policy does not have any access points defined, a message is displayed asking
you to confirm the operation. For information about access points, see acl access-policy select
access-point.
Format
acl access-policy select name disassociate-from volume
volume Name of the volume from which to disassociate the access policy
Example
Disassociate an access policy from a volume:
Format
acl access-policy select name show
Variable
Variable Description
name Name of an access policy
Example
Display detailed information about an access policy:
Format
acl access-policy show [-chap | -ip-addr | -initiator-name]
-ip-addr address Filters the display by IP address. Enter a specific IP address to display all
the access policies that use that IP address.
-initiator-name Filters the display by initiator name. Enter a specific initiator name to
initiator_iqn_name display all the access policies that use that initiator.
Examples
Display all access polices for a group:
acl access-policy-group
Manages access policy groups. Access policy groups combine individual access policies together so that
they can be managed as a single entity.
Format
acl access-policy-group subcommand
Format
acl access-policy-group create name [description text]
Variable
Variable Description
name Name of a new access policy. The name can be up to 31 characters
long. Spaces and underscores are not permitted.
Fewer characters are accepted for this field if you enter the value as a
Unicode character string, which takes up a variable number of bytes,
depending on the specific character.
Parameter
Parameter Description
description text Description for the access policy, up to 127 characters. If the description
contains spaces, enclose the text in quotation marks (for example, my
access policy group).
Fewer characters are accepted for this field if you enter the value as a
Unicode character string, which takes up a variable number of bytes,
depending on the specific character.
Example
Create a new access policy group:
Format
acl access-policy-group delete name
Variables
Variable Description
name Name of the access policy group to delete
Example
Delete an access policy group:
Format
acl access-policy-group rename current_name new_name
Variables
Variable Description
current_name Current name of the access policy group
Example
Rename an access policy group from its current name to a new name:
Format
acl access-policy-group select name subcommand
Variable
Variable Description
name Name of the access policy group to select
Subcommands
Subcommand Description
access-policy Adds access policies to, or removes them from, the policy group
Format
acl access-policy-group select name access-policy add|remove policy_name
Variables
Variable Description
name Name of the access policy group to select
Example
Add an access policy to a policy group:
Format
acl access-policy-group select name associate-to volume [association-type type]
Variables
Variable Description
name Name of the access policy group to select
volume Name of the volume to which to associate the access policy group
Parameter
Parameter Description
association-type type Specifies whether to associate the access policy group to the volume
and its snapshots, the snapshots only, or the volume only:
vol-only
vol-and-snap
snap-only
Example
Associate an access policy group to a volume. If multihost access is not already enabled on the volume,
you are asked whether you want to enable it:
Would you like to enable multihost access on this volume? (y/n) [n] y
Format
acl access-policy-group select name disassociate-from volume
volume Name of the volume from which to disassociate the access policy
group
Example
Disassociate an access policy group from a volume. If multihost access is enabled on the volume, you are
given the option to keep it enabled or to disable it:
Multihost access is currently enabled on this host, would you like to keep
multihost access enabled? (y/n) [y] n
Format
acl access-policy-group select name show
Variable
Variable Description
name Name of the access policy group to select
Example
Display details about an access policy group:
Format
acl access-policy-group show
Example
Display all access policy groups:
Format
acl volume show [associated|disassociated]
Parameters
Parameter Description
associated Shows only those access policies and groups that are associated to
volumes
disassociated Shows only those access policies and groups that are not associated to
volumes
Examples
Display all access policies and policy groups:
Display only access polices and policy groups that are associated to volumes:
ad-groups search
Searches for instances of the specified user name in the specified domain.
Format
ad-groups search domain domain search_string
Variable
Variables Description
domain Name of an Active Directory domain that is allowed to connect to the
group
search_string Searches for users in the Active Directory database that match the terms
in the search string
Example
Search for instances of a user name in a domain. The search string looks for names that include the letter
n.
alerts
Sets the event priorities for email and syslog event notification.
When you enable an event notification method, by default events with fatal, error, or warning priority
result in notifications. You can change the notification event priorities.
Priority Description
FATAL Catastrophic failure that might require immediate administrator
intervention or an array restart
WARNING Potential problems in the group. Might become an event with error
priority if administrator intervention does not occur.
INFO Normal operational and transitional events in the group that are of
interest to administrators but do not require intervention. Setting this
priority could result in a large number of notifications.
To enable email notification, see grpparams email-notify. To enable syslog notification, see grpparams
syslog-notify.
Format
alerts subcommand
Subcommands
Subcommand Description
select Selects an event notification method
alerts select
Specifies one or more event priorities for the selected type of event notification.
You can also use this command to stop email or syslog notification.
Format
alerts select method priority type | show
Variable
Variable Description
method One of the following notification methods:
email Email notification
syslog Remote syslog notification
Subcommand
Subcommand Description
show Shows the event priorities for the selected method
Examples
Configure a remote syslog server to receive only those events with the specified priorities:
alerts show
Shows the event priorities that result in email and syslog notification, if notification is enabled.
Format
alerts show
Example
Show the event priorities for email and syslog notification:
Format
chapuser subcommand
Subcommands
Subcommand Description
create Creates a CHAP account
chapuser create
Creates a local CHAP account for iSCSI initiator authentication.
RequirementTo enable local CHAP authentication of iSCSI initiators, see grpparams discovery-use-
chap.
RecommendationTo prevent unauthorized hosts from connecting to targets protected only with
CHAP, see grpparams discovery-use-chap.
After creating a local CHAP account, set up a basic access point for the volume and specify the account
name. See volume select access create.
Format
chapuser create name parameter
Variable
Variable Description
name CHAP account (user) name, up to 63 printable characters. Spaces
cannot be used.
Parameters
Parameter Description
enable|disable Enables (default) or disables the CHAP account
Examples
Create two local CHAP accounts:
chapuser delete
Deletes a local CHAP account.
Format
chapuser delete name
Variable
Variable Description
name Name of a CHAP account
NOTE: If the CLI confirmation setting is off, you will not see the prompt asking if you want to delete
the CHAP account. See cli-settings.
chapuser rename
Renames a local CHAP account.
Format
chapuser rename current_name new_name
Variables
Variable Description
current_name Current name of a CHAP account
Example
Rename a CHAP account:
chapuser select
Modifies or shows the selected local CHAP account.
Format
chapuser select name parameter | show
Variable
Variable Description
name Name of a CHAP account
passwd password (Optional) Password for the selected CHAP account, up to 254 printable
characters. Spaces cannot be used.
If you do not specify a password, the group creates a password that
consists of 16 characters.
Subcommand
Subcommand Description
show Shows details for the selected CHAP account
Example
Disable a CHAP account:
Format
chapuser select name show
Variable
Variable Description
name Name of a CHAP account
Example
Display details about a CHAP account:
Format
chapuser show [name]
Variable
Variable Description
name Name of a CHAP account
Example
Show the local CHAP accounts in the group:
collection
Manages the volume collections in a group.
A volume collection is a set of one or more volumes (up to eight) grouped together for the purpose of
creating simultaneous snapshots of the volumes in the collection (snapshot collection) or simultaneous
replicas of the volumes in the collection (replica collection).
NOTE: See snapcol create for information about creating snapshot collections. See collection select
replication for information about creating replica collections.
Format
collection subcommand
Subcommands
Subcommand Description
create Creates a volume collection
delete Deletes a volume collection, but does not delete the volumes in the
collection
collection create
Creates a volume collection in the group.
NOTE: A collection cannot include template volumes or NAS volumes.
Format
collection create name volume[,volume,...] [description text] [sync-rep]
Variables
Variable Description
name Collection name, up to 63 characters.
Name can be up to 63 bytes and is case insensitive. You can use any
printable Unicode character except for ! " # $ % & ' ( ) * + , / ; < = > ?@
[ \ ] ^ _ ` { | } ~. First and last characters cannot be a period, hyphen, or
colon. Fewer characters are accepted for this field if you enter the value
as a Unicode character string, which takes up a variable number of
bytes, depending on the specific character.
Parameters
Parameter Description
sync-rep Enables the collection for synchronous replication (SyncRep).
To configure additional SyncRep options on the collection, see
collection select sync-rep.
description text Description for the volume collection, up to 127 characters. If the text
includes spaces, enclose it in quotation marks.
Fewer characters are accepted for this field if you enter the value as a
Unicode character string, which takes up a variable number of bytes,
depending on the specific character.
Example
Create a volume collection that includes two volumes:
Format
collection delete collection_name
Variable
Variable Description
collection_name Name of a volume collection
Example
Delete a volume collection:
collection rename
Renames a volume collection.
Format
collection rename current_name new_name
Variables
Variable Description
current_name Current name of a volume collection
Example
Rename a volume collection:
Format
collection select collection_name description text | subcommand
Variable
Variable Description
collection_name Name of a volume collection
Parameter
Parameter Description
description text Adds a description for the collection, up to 127 characters. If the text
contains spaces, enclose it in quotation marks. To remove a description,
enter two quotation marks ().
Fewer characters are accepted for this field if you enter the value as a
Unicode character string, which takes up a variable number of bytes,
depending on the specific character.
Subcommands
Subcommand Description
add Adds a volume to the volume collection
Example
Add a description for a volume collection:
Format
collection select collection_name add volume_name
Variables
Variable Description
collection_name Name of a volume collection
Example
Add a volume to a volume collection:
Format
collection select collection_name delete volume_name
Variables
Variable Description
collection_name Name of a volume collection
Examples
Delete a volume from a volume collection:
Delete the last volume from a volume collection, and also delete the collection:
You can recover data by cloning an individual replica or promoting a replica set.
Format
collection select collection_name replication subcommand
Variable
Variable Description
collection_name Name of a volume collection
Subcommands
Subcommand Description
create-repcol Creates a replica of this volume collection on a partner
select show Shows information about volume collection replication activity to the
selected partner
show Shows the replication partners configured for the volume collection or
detailed information about volume collection replication activity to a
specific partner
You must configure each volume in the collection to replicate to the same partner. See volume select
replication enable. In addition, you must configure replication on the volume collection itself (see
collection select replication enable).
Format
collection select collection_name replication create-repcol [manual] partner
partner Name of the replication partner that will store the replica collection
(the secondary group)
Parameter
Parameter Description
manual Creates the replica collection using manual transfer replication
Examples
Create a replica collection:
Format
collection select collection_name replication disable partner_name
Variables
Variable Description
collection_name Name of a volume collection
Example
Disable replicating a volume collection to a partner:
Format
collection select collection_name replication enable partner_name
Variables
Variable Description
collection_name Name of a volume collection
Example
Enable replicating a volume collection to a partner:
Format
collection select collection_name replication select partner_name show
Variables
Variable Description
collection_name Name of a volume collection
Example
Show information about volume collection replication activity to a partner:
Format
collection select collection_name replication show [partner_name]
Variables
Variable Description
collection_name Name of a volume collection
Example
Show information about the replication partner configured for the volume collection:
Format
collection select collection_name schedule subcommand
Variable
Variable Description
collection_name Name of a volume collection
Subcommands
Subcommand Description
create Creates a schedule
Schedule name
Schedule type
Time to start creating the snapshots or replicas
Partner name (only for replication collection schedules)
Optionally, you can specify other parameters, based on the schedule type. To specify more than one
parameter, separate them with commas and no spaces.
Format
collection select collection_name schedule create schedule_name parameters
Variables
Variable Description
collection_name Name of a volume collection
schedule_name Name for the schedule. Name can be up to 63 bytes and is case
insensitive. You can use any printable Unicode character except for ! " #
$ % & ' ( ) * + , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last characters
cannot be a period, hyphen, or colon. Fewer characters are accepted
for this field if you enter the value as a Unicode character string, which
takes up a variable number of bytes, depending on the specific
character.
If the name contains spaces, enclose it in quotation marks (for example,
schedule for daily backups).
Parameters
Parameter Description
enable|disable Enables (default) or disables the schedule
end-date mm/dd/yy Month, day, and year that the schedule will stop. The default is no
ending date.
end-time hh:mm[AM|PM] Time when the schedule will stop creating a sequence of snapshot or
replica collections. Use 24-hour time or specify AM or PM.
partner partner_name Name of the partner that will store replica collections created through
the schedule.
Required for replication schedules.
read-write|read-only Permission for snapshots created from the schedule. The default is
read-write.
start-date mm/dd/yy Month, day, and year that the schedule will start. The default is the day
that the schedule was created (or the following day, if the starting time
has passed).
start-time hh:mm[AM| (Required) Time when the schedule will start creating snapshot or
PM] replica collections. Use 24-hour time or specify AM or PM.
Examples
Set up a schedule that creates a replica collection of a volume collection every day at 11:30 p.m.:
> collection select db1col schedule create dailydbsch type daily start-time
11:30PM repeat-interval 1days partner psgroup2
Set up a schedule that creates a snapshot collection of a volume collection every day, every 2 hours,
from 7:00 a.m. to 8:00 p.m.:
> collection select mailcol schedule create mailsch type daily start-time
07:00AM end-time 20:00 frequency 2hours repeat-interval 1days
Format
collection select collection_name schedule delete schedule_name
Variables
Variable Description
collection_name Name of a volume collection
Example
Delete a schedule:
Format
collection select collection_name schedule rename current_name new_name
Variables
Variable Description
collection_name Name of a volume collection
new_name Name for the schedule. Name can be up to 63 bytes and is case
insensitive. You can use any printable Unicode character except for ! " #
$ % & ' ( ) * + , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last characters
cannot be a period, hyphen, or colon. Fewer characters are accepted
Example
Rename a schedule:
NOTE: You cannot modify the partner for a replication collection schedule. Instead, delete the
schedule and then create a new schedule with the correct partner.
Format
collection select collection_name schedule select schedule_name parameter | show
Variables
Variable Description
collection_name Name of a volume collection
Parameters
Parameter Description
enable|disable Enables or disables the schedule
end-date mm/dd/yy Month, day, and year that the schedule will stop
end-time hh:mm[AM|PM] Time when the schedule will stop creating a sequence of snapshot or
replica collections. Use 24-hour time or specify AM or PM.
Applies only to schedules of type daily.
start-date mm/dd/yy Month, day, and year that the schedule will start
start-time hh:mm[AM| Time when the schedule will start creating snapshot or replica
PM] collections. Use 24-hour time or specify AM or PM.
Subcommand
Subcommand Description
show Shows detailed information about the selected schedule
Examples
Change the time that snapshot collections of a volume collection are created with a schedule:
Select a schedule with a name that contains spaces for further operations:
Format
collection select collection_name schedule show [schedule_name]
Variables
Variable Description
collection_name Name of a volume collection
Example
Show the snapshot and replication collection schedules for a volume collection:
Format
collection select collection_name show
Variable
Variable Description
collection_name Name of a volume collection
Example
Show information about a volume collection:
Format
collection select collection_name sync-rep subcommand
Variable
Variable Description
collection_name Name of a volume collection
Subcommands
Subcommand Description
disable Disables synchronous replication for the collection
failover [force] Changes the SyncActive pool and discards unreplicated changes
pool_name
sync-active-offline Sets volumes in the collection offline and prevents connections to the
pool_name SyncActive pool
42282:33442:gigan34:MgmtExec:22-Mar-2015 14:
48:19.184755:syncReplSwitch.cc:1095:INFO:8.2.36:Successfully switched the Syn
cRep SyncActive pool to syncrep for volume kvol1.
42283:33443:gigan34:MgmtExec:22-Mar-2015 14:
48:19.214756:syncReplSwitch.cc:1095:INFO:8.2.36:Successfully switched the Syn
cRep SyncActive pool to syncrep for volume kvol2.
42284:33444:gigan34:MgmtExec:22-Mar-2015 14:
48:19.254757:syncReplSwitch.cc:1095:INFO:8.2.36:Successfully switched the
SyncRep Syn
cActive pool to syncrep for volume kvol3.
After the command completes, you can run the show command to see the new pool status. In the
following output, note that the SyncActive pool is now syncrep (originally, it was default):
Format
collection show [collection_name]
Variable
Variable Description
collection_name Name of a volume collection
Example
Show all the volume collections in the group:
discover-devices
Discovers available, uninitialized NAS devices on the network.
Format
discover-devices
Example
> discover-devices
domain-list show
Shows the domains in use for different types of users.
Format
domain-list show
Example
> domain-list show
eula status
Displays the end-user license agreement (EULA) information for the PS Series group firmware and the
NAS firmware (if a NAS cluster is configured).
Format
eula status
Example
Display the end-user license agreement information for the group:
Failback is the third step in recovering replicated data from the secondary group when the primary group
is temporarily unavailable, either because of maintenance or failure:
1. Fail over to the secondary group. This step involves promoting the volumes inbound replica set to a
recovery volume. See partner select inbound-replicaset select promote.
2. Replicate to the primary group. After the primary group and the original volume become available,
this step involves demoting the original volume to a failback replica set and replicating the recovery
volume to the primary group. See volume select replicate-to-primary.
3. Fail back to the primary group. When you are ready to fail back, this step performs a final replication,
demotes the recovery volume to the original inbound replica set, and promotes the failback replica
set to the original volume.
All steps are performed on the secondary group in the volume replication configuration.
The replicate-to-primary step and the failback step include multiple tasks that must complete before you
can perform the next step.
You can start or stop failback operations, display in-progess and completed operations, or retry a failback
operation if an error occurs. Examine event messages to identify any problems. If a problem occurs,
correct it and retry the operation.
Format
failback subcommand
Subcommands
Subcommand Description
retry Retries a failback operation on a recovery volume
Format
failback retry volume_name
Variable
Variable Description
volume_name Name of a recovery volume
Example
Retry a failback operation:
failback show
Displays all failback operations. The output varies depending on whether operations are in progess or
complete.
Format
failback show
Examples
Display in-progess and completed failback operations:
Optionally, you can use manual transfer replication to perform the failback operation. See the Dell
EqualLogic Manual Transfer Utility Installation and Users Guide for more information.
Format
failback start [manual-replica] volume_name
Variable
Variable Description
volume_name Name of a recovery volume
Example
Start a failback operation on a recovery volume:
failback stop
Stops an in-progess failback operation and deletes the task.
Format
failback stop volume_name
Variable
Variable Description
volume_name Name of a recovery volume
folder
Manages volume folders on the PS Series group.
Format
folder subcommand
Subcommands
Subcommand Description
create Creates a folder
folder create
Creates volume folders on the PS Series group.
Format
folder create folder_name [description text]
Variable
Variable Description
folder_name Name for the folder. Name can be up to 63 bytes and is case insensitive.
You can use any printable Unicode character except for ! " # $ % & ' ( ) *
+ , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last characters cannot be a
period, hyphen, or colon. Fewer characters are accepted for this field if
you enter the value as a Unicode character string, which takes up a
variable number of bytes, depending on the specific character.
Example
Create a folder with a description:
See Also
To add volumes to a folder, see folder select volume.
folder delete
Deletes volume folders on the PS Series group. Deleting a folder does not delete the volumes in that
folder.
Format
folder delete folder_name
Variable
Variable Description
folder_name Name of the folder to delete
Example
Delete a folder:
folder rename
Renames a volume folder on the PS Series group.
Format
folder rename current_name new_name
Example
Rename a folder:
folder select
Selects volume folders for additional operations.
Format
folder select folder_name [description text] | subcommand
Variable
Variable Description
folder_name Folder names are not case sensitive. For example, folder01 and
FOLDER01 are treated as the same name.
Parameter
Parameter Description
description text Description for the folder, up to 127 characters. If the description
includes spaces, enclose it in quotation marks.
Fewer characters are accepted for this field if you enter the value as a
Unicode character string, which takes up a variable number of bytes,
depending on the specific character.
remove-all Removes all volumes from the folder. Does not delete the volumes or
the folder itself.
Example
Add a description for a folder:
See Also
To add volumes to a folder, see folder select volume.
Format
folder select folder_name inbound-replicaset subcommand
Variable
Variable Description
folder_name Name of the folder
Subcommands
Subcommand Description
add inbound_replicaset Adds the specified inbound replica set to the folder
remove Removes the specified inbound replica set from the folder
inbound_replicaset
Example
Add an inbound replica set to a folder:
Format
folder select folder_name remove-all
Variable
Variable Description
folder_name Name of the folder from which to remove volumes
Example
Remove all the volumes from a folder:
Format
folder select folder_name show
Variable
Variable Description
folder_name Name of the folder
Example
Display details about a folder:
Format
folder select folder_name volume subcommand
Variable
Variable Description
folder_name Name of the folder
Subcommands
Subcommand Description
add volume_name Adds the specified volume to the folder
Example
Add a volume to a folder:
folder show
Display all folders for a group.
Format
folder show
Example
Display all folders on the group:
Unless otherwise specified, to remove a list, location, or address, enter two quotation marks ().
Format
grpparams parameter | show
Parameters
Parameters Description
cliaccess-ssh Enables (default) or disables the SSH service running on the group.
Optionally disables the default SSH version 1 protocol for increased
security.
cliaccess-telnet Enables (default) or disables the telnet service running on the group
dcb Enables or disables data center bridging (DCB) for all network interfaces
in the group
dcb def-vlan-id Sets the default VLAN ID for Ethernet interfaces to receive data center
bridging (DCB) control packets. The ID must be a number from 0
through 4095.
default-snapshot-sched Enables (default) or disables the creation of volume snapshots using the
default snapshot schedule
default-snapshot- Displays the current settings for the default snapshot schedule
sched show
default-snapshot- Specifies the starting time for the default snapshot schedule
sched start-time
def-iscsi-alias Specifies the groupwide default for whether the volumes iSCSI target
alias (public name) is set to the internal volume name. Also applies to
volume snapshots. Default is yes.
def-mgmt-gateway Configures or removes the default gateway for the group (IPv4 only)
def-snap-warn Specifies the groupwide default for the threshold at which an alarm
occurs because the amount of free reserved snapshot space has fallen
below this value (as a percentage of total reserved snapshot space).
Applies only to new volumes. Default is 10%.
def-thin-growth-max Specifies the groupwide default for the maximum percentage of the
reported volume size that can be in use for a new thin-provisioned
volume. When in-use space reaches this limit, the volume will be set
offline. Default is 100%.
def-thin-growth-warn Specifies the groupwide default for the percentage of the reported
volume size that, when reached by in-use space, creates a warning
alarm and event message for a new thin-provisioned volume. Default is
60%.
email-contact Enables customer support and the specified local address to receive
email notification of firmware updates and hardware failures
email-from Specifies the email address to be used as the From address in email
notification messages. Up to 127 ASCII characters
ftp-service Enables (default) or disables the FTP server on the group. When
disabled, prevents FTP file transfers to and from the group.
isns-server-list Specifies up to three IP addresses (with optional port) for iSNS servers
name Sets the group name, which identifies the group, especially for
expansion and replication purposes
ntp-server-list Specifies up to three IP addresses (with optional port) for NTP servers
passwd Sets the password for adding members to the group. Do not specify the
password on the command line. You will be prompted for it.
radius-acct-retries Specifies the number of times the group will try to contact a RADIUS
accounting server after the first try fails. The default is 1 retry.
radius-auth-list Adds one to three IP addresses (with optional port) for external RADIUS
authentication servers
radius-auth-retries Specifies the number of times the group will try to contact a RADIUS
authentication server after the first try fails. The default is 1 retry.
radius-auth-timeout Specifies the number of seconds the group will wait for a RADIUS
authentication server to respond. The default is 2 seconds.
session-idle-timeout Enables or disables (default) the idle timeout value for a login session,
and optionally sets the length of time for the timeout value
smtp-server-list Specifies up to three IP addresses (with optional port) for SMTP (Simple
Mail Transfer Protocol) servers
snmp Manages SNMP (Simple Network Management Protocol) for the group
standby-button Enables or disables (default) the standby button for all members (arrays)
in the group that support this feature (PS4100 or PS6100 array models)
thermal-shutdown Enables (default) or disables the thermal shutdown feature for all
members in the group that support this feature (PS4100 or PS6100 array
models)
timezone Specifies the time zone using a country/city designation. The default is
America/New_York.
vss-vds Manages basic access points for Microsoft service access to the group
webaccess Enables (default) or disables standard web access (port 80) to the GUI
webaccess-noencrypt Enables (default) or disables the ability to use a web connection to the
GUI that is not encrypted with SSL
grpparams cliaccess-ssh
Enables or disables the SSH service.
This command has two functions:
By itself, enables (default) or disables the SSH service running on the group. Disabling the SSH service
prevents any SSH access to the group or a group member.
With the v1-protocol option, enables (default) or disables the SSH v1 protocol. You can disable V1 and
use only the v2 protocol, if your security considerations require it.
Recommendation Unless you need to use older SSH clients that do not support the protocols
currently recognized as the best security practices, Dell recommends disabling the v1 protocol.
Formats
grpparams cliaccess-ssh enable|disable
grpparams cliaccess-ssh v1-protocol enable|disable
Examples
Disable SSH service:
Disable the SSH v1 protocol. SSH access uses the v2 protocol instead.
When SSH v2 protocol is enabled on the group, the grpparams show display looks similar to the following
output. See the bolded lines in the example (output has been edited for brevity).
grpparams cliaccess-telnet
Enables or disables CLI access through telnet.
Format
grpparams cliaccess-telnet enable|disable
Example
Enable CLI access through telnet:
grpparams conn-balancing
Enables (default) or disables iSCSI connection load balancing across group members.
Format
grpparams conn-balancing enable|disable
Example
Disable connection load balancing:
grpparams crypto-legacy-protocols
Enables (default) or disables the use of legacy encryption protocols and authentication algorithms.
You must use the CLI to change the encryption protocols for the group; this functionality is not available
through the GUI.
The group supports security protocols SSL/TLS and SSH, with a range of encryption algorithms. The
protocols and algorithms enabled by default include some older protocols (such as SSH v1 and SSL v2)
and encryption algorithms (such as DES) that are no longer recommended as best security practices.
Disabling legacy protocols causes the group to reject all certificates using encryption keys of fewer than
2048 bits. For example, when you log in to the GUI using https, the group warns that the certificate has
changed. When you log in to the CLI using SSH, the group might display a warning about the key. You
might need to remove the old key from the host, and accept a new key signature.
Disabling legacy protocols affects the key length allowed for certificates used with IP security. For more
information, see ipsec certificate.
Format
grpparams crypto-legacy-protocols enable|disable
Example
Disable the use of legacy encryption protocols and authentication algorithms in the group:
See Also
grpparams cliaccess-ssh
ipsec certificate
grpparams date
Sets the date for the group members.
NOTE: The date is assumed to be 2000 or later. You must enter a two-digit number for the year.
Format
grpparams date mm/dd/yy
Variable
Variable Description
mm/dd/yy Month (mm), day of month (dd), and year (yy)
Example
Set the date for the group members:
Format
grpparams dcb enable|disable
Example
Enable data center bridging for the group:
Format
grpparams dcb def-vlan-id n
Variable
Variable Description
n VLAN ID for iSCSI interfaces. The ID ust be a number from 0 through
4095.
Example
Set the VLAN ID:
grpparams default-snapshot-sched
Enables (default) or disables the creation of volume snapshots using the default snapshot schedule (DSS).
The schedule runs once a day to create read-only snapshots of any eligible unprotected volumes in a
group on an array.
The default snapshot schedule is enabled by default. Disabling the schedule prevents snapshots from
being created by the schedule. Enabling the schedule after it has been disabled resumes the use of the
schedule to create snapshots. Only a group administrator can disable or reenable the schedule
System Information
The default snapshot schedule is available as of PS Series firmware version 8.0. When the system is
updated, the default snapshot schedule is enabled automatically.
A PS Series group can have a maximum of 1024 custom snapshot schedules. The default snapshot
schedule does not reduce the number of available schedules (meaning that all 1024 schedules could be
defined and the default schedule will still be added).
The schedule covers all eligible volumes in a group. (Schedule parameters cannot be modified on a per-
volume basis.) When a volume is created, the group administrator does not need to explicitly associate
the volume to the schedule; the association happens automatically.
To be eligible for the default snapshot schedule, a volume must meet the following criteria:
The group can support a maximum of 10,000 snapshots, and DSS-created snapshots are included in that
number. Snapshots created by the schedule are offline, read-only, and otherwise identical to traditional
snapshots. DSS-created snapshots follow standard compression rules and, in most cases, will not be
trimmed.
Recommendations
The default snapshot schedule is used primarily to create snapshots of volumes to which a traditional
snapshot schedule was never explicitly associated. Associating a snapshot schedule with a volume when
the volume is created provides a level of data protection that could save the group from losing data. If
volumes become corrupt, the group administrator can restore data from the most current snapshot.
Dell recommends that any volume whose data can be written, and therefore corrupted, should be
protected against data loss using the PS Series snapshot schedule mechanism. The default snapshot
schedule unobtrusively enforces this recommendation.
CAUTION: Although the purpose of DSS-created snapshots is to protect volume data against
write corruption, the schedule should not be used as a replacement for the existing snapshot
schedule mechanism. The default snapshot schedule provides an additional safeguard against
rare instances of data corruption, but it is intended solely as a disaster-recovery mechanism and
should not be relied on as the only data-protection strategy for the group.
Schedule Operation
While the default snapshot schedules execution is designed to use minimal system resources, it should
be run at a time of day when it will least affect usage load. To set the starting time for the schedule, see
grpparams default-snapshot-sched start-time.
The max-keep value stays at 1 until at least the next time the schedule runs, when pool free space is
calculated again. If the amount of free space at that point is greater than 15 percent for all pools, max-
keep returns to the default value of 2.
To process multiple volumes, the schedule repeatedly resubmits itself to the snapshot schedule queue,
and yields for 5 seconds after each snapshot is created or after encountering 10 successive ineligible
volumes. The time it takes the DSS to create snapshots for all volumes in a group depends on the number
of eligible volumes in that group. In general, the DSS will complete its processing of all volumes within 5
minutes (though systems at or near the maximum number of allowed volumes could take up to 2.5
hours).
When the schedule is disabled, the system asks about deleting all of the existing snapshots that were
created by the schedule. The default is to not delete snapshots, and snapshots are not deleted if CLI
echoing is turned off. Deleted snapshots cannot be undeleted.
Format
grpparams default-snapshot-sched enable|disable
Parameters
Parameters Description
enable|disable Enables or disables the default snapshot schedule
Examples
Disable the default snapshot schedule:
Delete all snapshots generated by the default snapshot schedule? [y/n] [n] y
Are you sure? [y/n] [n] y
For more information about the default snapshot schedule, see grpparams default-snapshot-sched.
Format
grpparams default-snapshot-sched show
Example
Display the current settings for the default snapshot schedule for the group:
Variable
Variable Description
hh:mm[AM|PM] Time when the default snapshot schedule will start creating snapshots
of eligible volumes. Use 24-hour time or specify AM or PM. The default
is midnight.
Examples
Specify the starting time for the default snapshot schedule to run:
grpparams def-iscsi-alias
Specifies whether volumes will automatically use the volume name as the iSCSI target alias. (Using an
alias is optional.)
The default is to use the volume name (yes). If you do not use the volume name (no), you must manually
specify an alias for the volume.
Changing the groupwide setting does not change the settings for current volumes. You can override the
groupwide setting for a specific volume by using the volume create command or the volume select
command.
Format
grpparams def-iscsi-alias yes|no
Example
Prevent volume names from being used automatically as the iSCSI target alias:
grpparams def-mgmt-gateway
Sets or deletes the default management gateway for the group that uses a dedicated management
network.
The management gateway applies to all the configured management interfaces.
You must add a management address to the group. See grpparams management-network.
Format
grpparams def-mgmt-gateway [ipaddress ip_address | none]
Example
Set the default management gateway for the group:
grpparams def-sector-size
Sets the default sector size for new volumes: either 512 bytes (the default) or 4096 bytes (4K-bytes).
You can create volumes that use either 512-byte or 4K-byte sectors. The sector size of a volume does
not depend on the sector size of the physical drives in the members. The default volume setting of 512
bytes is almost always optimal, even if the physical drives use 4K-byte sectors.
Before you create a volume that uses 4K-byte sectors, verify that your operating system supports 4K-byte
sectors. You cannot change the sector size of a volume after it is created. Refer to the documentation for
your operating system for information about whether 4K-byte sectors are supported.
Format
grpparams def-sector-size 512|4096
Example
Set the default sector size for the group to 4K-bytes:
grpparams def-snap-borrow
For new volumes, enables or disables the ability to borrow from free space to create snapshots.
Changing the groupwide setting does not change the settings for current volumes.
You can override the groupwide setting for a specific volume by using the volume create command or
the volume select command.
Format
grpparams def-snap-borrow enable|disable
grpparams def-snap-depletion
Specifies a groupwide default space recovery policy for new volumes.
For new volumes, specifies one of the following groupwide default space recovery policies when no
more snapshot reserve is available:
Changing the groupwide setting does not change the settings for current volumes.
You can override the groupwide setting for a specific volume by using the volume create command or
the volume select command.
Format
grpparams def-snap-depletion delete-oldest|volume-offline
Parameters
Parameter Description
delete-oldest Deletes the oldest snapshots until enough space is recovered. This
action is the default.
Example
Set the groupwide default to set volumes and their snapshots offline when the reserved snapshot space
has been used:
grpparams def-snap-reserve
Specifies the groupwide default for new volumes for the amount of space, as a percentage of the volume
reserve, to reserve for volume snapshots.
The default is 100 percent of the volume reserve.
Changing the groupwide setting does not change the settings for current volumes.
You can override the groupwide setting for an individual volume by using the volume create command or
the volume select command.
Variable
Variable Description
n Percentage of the volume reserve to reserve for snapshots
Example
Set the groupwide default for reserved snapshot space. You must include the percent sign (%).
grpparams def-snap-warn
Specifies the groupwide default threshold at which an alarm occurs when the amount of free reserved
snapshot space is less than this threshold, specified as a percentage of the total reserved snapshot space.
Applies only to new volumes.
The default is 10 percent of the total reserved snapshot space for a volume.
Changing the groupwide setting does not change the settings for current volumes.
You can override the groupwide setting for an individual volume by using the volume create command or
the volume select command.
Format
grpparams def-snap-warn n%
Variable
Variable Description
n Percentage of reserved space for the threshold. If free reserved space
falls below this value, a warning occurs.
Example
Set the groupwide default for the free snapshot space warning threshold. You must include the percent
sign (%).
If the maximum in-use space value is 100 percent and an initiator write exceeds this limit, the volume is
not set offline. However, the write fails, and the group generates event messages.
Changing the groupwide setting does not change the settings for current volumes.
You can override this value on a specific thin-provisioned volume by using the volume create command
or the volume select thin-growth-max command.
Format
grpparams def-thin-growth-max n%
Variable
Variable Description
n Maximum percentage of the reported volume size that can be in use for
a thin-provisioned volume
Example
Set the groupwide default for the maximum percentage of the volume size that can be in use for a thin-
provisioned volume. You must include the percent sign (%).
grpparams def-thin-growth-warn
Specifies the groupwide default for new thin-provisioned volumes for the in-use space warning limit.
When the in-use space reaches this value, as a percentage of reported volume size, a warning occurs.
The default is 60 percent.
Changing the groupwide setting does not change the settings for current volumes.
You can override this value on a specific thin-provisioned volume by using the volume create command
or the volume select thin-growth-warn command.
Format
grpparams def-thin-growth-warn n%
Example
Set the groupwide default for the in-use space warning limit. You must include the percent sign (%).
grpparams description
Sets the group description. To remove a description, enter two quotation marks ().
Format
grpparams description text
Variable
Variable Description
text Group description, up to 63 ASCII characters. If the text contains
spaces, enclose it in quotation marks.
Example
Add a group description:
grpparams disallow-downgrades
Prevents group members from reverting to a previous PS Series firmware version.
In some cases, you must run this command to use new features in the installed firmware or to perform
replication.
You can use this command only once on a group. If you later try to use the update command (see
update) to install a previous firmware version on a member, the operation will fail.
Make sure you are connected to the group IP address (or dedicated management address) when running
this command.
Prevent all the group members from returning to a firmware version earlier than v5.0.
Format
grpparams disallow-downgrades
grpparams discovery-use-chap
Allows or prevents (default) the discovery of targets by iSCSI initiators for which the initiators are not
authorized.
If you do not prevent target discovery, initiators that support discovery will try to log in to a target, even if
they do not have the correct access credentials. The attempted logins will result in a large number of
events logged in the group and an inefficient use of resources.
Format
grpparams discovery-use-chap enable|disable
Example
Prevent unauthorized hosts from discovering volumes that are authenticated only with CHAP:
grpparams dns-server-list
Specifies from one to three IP addresses for Domain Name servers (DNS).
To change a server in the DNS server list, you must enter the IP addresses on the command line.
To remove all servers from the list, enter two quotation marks ().
Format
grpparams dns-server-list ip_address
Variable
Variable Description
ip_address Comma-separated list of up to three IP addresses. For example:
192.0.2.23,[fc00::7447:b795:6ba7:28f1],192.0.2.35
Example
Add two DNS servers for the group:
Format
grpparams dns-suffix-list suffix
Variable
Variable Description
suffix Comma-separated list of one to three DNS suffixes. For example:
companyA.com,companyB.com,companyC.com
Example
Add two DNS suffixes for the group:
grpparams email-contact
Enables Email Home, which sends notification of firmware updates and hardware failures to customer
support and the specified local address.
You must specify an SMTP server or email relay for any type of email notification (see grpparams smtp-
server-list). You can also specify a sender address for the notification messages (see grpparams email-
from).
Format
grpparams email-contact email_address
Variable
Variable Description
email_address Email address of the recipient
Example
Enable Email Home and configure the specified email address to receive notification. (Customer support
also receives notifications.)
Format
grpparams email-from email_address
Variable
Variable Description
email_address Email address of the sender
Example
Add an email address to be used as the From address in email event notification messages:
grpparams email-list
Specifies one to five email addresses to receive email notification of events.
When you enable email notification, by default events with a fatal, error, or warning priority result in
notification, unless you specify different priorities with the alerts command (see alerts).
To configure email event notification, you must enable email notification and specify an SMTP server or
email relay. See grpparams email-notify and grpparams smtp-server-list. In addition, you can specify a
sender address for the notification messages. See grpparams email-from.
Format
grpparams email-list email_address[,email_address,...]
Variable
Variable Description
email_address One to five addresses, separated by a comma and no space. To change
an email address, you must reenter all the addresses (old and new) on
the command line.
To remove all addresses from the list, enter two quotation marks ().
grpparams email-notify
Enables or disables (default) email notification.
NOTE: Email notification is not the same as the Email Home feature. Email Home sends email to the
support provider for your array. Email notification configures the group to send email about group
events to recipients of your choosing. For more information about these features, see the Dell
EqualLogic Group Manager Administrator's Guide.
To receive email event notification, you must specify one or more email addresses to receive messages
and an SMTP server or email relay. See grpparams email-list and grpparams smtp-server-list. In addition,
see grpparams email-from to specify a sender address for the notification messages.
Format
grpparams email-notify enable|disable
Example
Enable email notification:
grpparams ftp-service
Enables (default) or disables the FTP server running on the group.
Disabling the server prevents FTP file transfers to and from the group. Preventing these transfers provides
enhanced security for those organizations that require it.
NOTE: To retrieve NAS cluster diagnostics, FTP service must be enabled on the cluster. See nas-
cluster select ftp-service.
Format
grpparams ftp-service enable|disable
Example
Disable FTP service to the group:
NOTE: Modifying the group IP address disconnects group management sessions and iSCSI
discovery sessions. If you modify the group IP address and initiators are configured statically with
the group IP address, you might need to update the iSCSI initiators with the new information.
However, if initiators are finding targets dynamically (for example, through iSNS), they can
rediscover the targets.
Format
grpparams group-ipaddress ip_address|none
Variable
Variable Description
ip_address|none Group IP address. To delete the group IP address, specify none.
Example
Change the IP address for the group:
grpparams group-ipv6address
Specifies the group IP address, which is used for group administration (unless you configured a dedicated
management network) and iSCSI initiator access to volumes, in Internet Protocol version 6 (IPv6) format.
A group can have both an IPv4 address and an IPv6 address.
2001:0db8:85a3:08d3:1319:8a2e:0370:7334
If an address has only one instance of consecutive groups of 0000, you can replace them with double
colons. Leading zeros in an address group can also be omitted (as in ::1 for localhost).
2001:0db8:0000:0000:0000:0000:1428:57ab
2001:0db8:0000:0000:0000::1428:57ab
2001:0db8:0:0:0:0:1428:57ab
2001:0db8:0:0::1428:57ab
2001:0db8::1428:57ab
2001:db8::1428:57ab
If the group has a replication partner, make sure that the network addressing supports replication
between the partners. See partner create.
NOTE: Adding an IPv6 address to a group that also has an IPv4 address has no effect on current
group management sessions. However, if you remove the groups IPv4 address while connections
are open, users or initiators that become disconnected will not be able to reconnect to the original
address. If initiators are configured statically with the group IP address, you might need to update
the iSCSI initiators with the new information. However, if initiators are configured to find targets
dynamically, they can rediscover the targets. The computer running the initiator and the group must
use a common Internet Protocol to perform discovery and log in to a target.
Format
grpparams group-ipv6address ip_address|none
Variable
Variable Description
ip_address|none Group IP address in IPv6 format. To delete the IPv6 address, specify
none.
Example
Set an IPv6 address for the group:
Showing informational messages might result in the logging of a large amount of data to the console and
GUI.
Format
grpparams info-messages enable|disable
Example
Disable showing informational messages on the console and in the GUI:
grpparams iscsi-local-auth
Enables (default) or disables using local CHAP accounts to authenticate iSCSI initiator access to volumes
and snapshots (iSCSI targets). If enabled, the local CHAP accounts are queried before any external
RADIUS authentication servers.
To set up local CHAP accounts in the group, see chapuser.
NOTE: You can also use RADIUS servers to authenticate iSCSI initiator access to volumes. See
grpparams iscsi-radius-auth.
Format
grpparams iscsi-local-auth enable|disable
Example
Disable the use of local CHAP accounts:
grpparams iscsi-radius-auth
Enables or disables (default) the use of RADIUS authentication servers for authenticating either iSCSI
initiator access to volumes or snapshots or Microsoft service access to the group.
NOTE: You can set up local CHAP accounts in the group to authenticate iSCSI initiator access to
volumes. See chapuser. You can set up target authentication in addition to initiator authentication.
See grpparams target-auth-password and grpparams target-auth-username.
You must specify external RADIUS servers for authenticating host access to volumes. See grpparams
radius-auth-list.
Example
Enable the use of RADIUS authentication servers for authenticating host iSCSI access to volumes:
grpparams isns-server-list
Specifies or removes an IP address for an iSNS (Internet Storage Name Service) server.
An iSNS server can help with the automated discovery, management, and configuration of iSCSI devices
and other devices on a TCP/IP network.
NOTE: By default, an iSNS server cannot discover iSCSI targets (volumes or snapshots) in a group.
You must enable iSNS discovery on each target.
Format
grpparams isns-server-list ip_address[:port]
Variables
Variable Description
ip_address IP address of the iSNS server
Example
Add an iSNS server and port:
grpparams location
Specifies the physical location of the group. The default location is default.
To remove a group location, enter two quotation marks ().
Format
grpparams location text
Example
Add a group location:
grpparams login-radius-acct
Enables or disables (default) the use of RADIUS accounting servers for tracking the activity of group
administration accounts that are authenticated using RADIUS authentication servers.
To use RADIUS accounting, you must also enable RADIUS authentication for accounts. See grpparams
login-radius-auth. For information about specifying RADIUS accounting servers, see grpparams radius-
acct-list.
Format
grpparams login-radius-acct enable|disable
Example
Enable the use of RADIUS accounting servers:
grpparams login-radius-attr
Enables (default) or disables requiring a RADIUS authentication server to supply the EQL-Admin attribute
when authenticating group administration accounts.
See grpparams login-radius-auth for information about enabling RADIUS authentication for group
administration accounts.
See the Dell EqualLogic Group Manager Administrator's Guide for information about additional RADIUS
attributes that you can configure.
Format
grpparams login-radius-attr enable|disable
Example
Require the RADIUS authentication server to supply the EQL-Admin attribute when authenticating group
administration accounts:
To enable RADIUS authentication, you must specify external RADIUS authentication servers. See
grpparams radius-auth-list.
Dell recommends that the RADIUS authentication server supply the EQL-Admin attribute for security
purposes. See grpparams login-radius-attr.
Format
grpparams login-radius-auth enable|disable
Example
Enable the use of RADIUS authentication servers for authenticating group administration accounts:
grpparams management-network
Configures, removes, or displays the management network for a group.
A management network lets you separate iSCSI traffic (volume and snapshot I/O) from group
management traffic. After you configure and enable a management network, you log in to the
management address, instead of the group IP address, to perform any management operations.
Replication and other intergroup communication, in addition to iSCSI initiators, continue to use the group
IP address.
NOTE: To use a dedicated management network, your physical network must be set up with a
separate management router, with unique IP addresses and subnet masks. The management
network interface addresses and the group management address use either the IPv4 or IPv6
protocol.
1. See the Dell EqualLogic Group Manager Administrator's Guide for detailed information about
configuring a dedicated management network.
2. Configure the highest-numbered network interface on each group member on the management
network, which must be on a different subnet than the iSCSI network. See member select eth select.
3. Add a default management gateway to the group. The management gateway applies to all the
configured management interfaces. See grpparams def-mgmt-gateway.
4. Configure a management address in the group.
Parameters
Parameter Description
ipaddress mgmt_address Specifies a management network address for the group. The network
ipv6address must be on the same subnet as the management interfaces on the
mgmt_address group members.
none Removes a management network address from the group and disables
the dedicated management address.
Subcommand
Subcommand Description
show Displays the IP addresses for the management network
Examples
NOTE: This example assumes that you have already correctly configured the network interfaces on
all group members. Adding the management network address is the last step in the process of
configuring and using a management network. To test or use the management network, log in to
the group (either through the GUI or CLI) specifying the new management address.
IP Address
--------------------
192.0.2.37
2040:192.0.3.34
grpparams name
Modifies the group name, which you use to identify the group for the purposes of adding new members
or setting up replication.
If the group is configured for replication, make sure to update the group name that is stored on all
replication partners.
Format
grpparams name group_name
Variable
Variable Description
group_name Group name for administrative purposes, up to 31 ASCII characters,
including hyphens. The first character must be a letter or a number.
Example
Change the group name:
grpparams ntp-server-list
Specifies from one to three IP addresses for Network Time Protocol (NTP) servers. Using an NTP server
sets a consistent time on all group members.
To change a server in the NTP server list, you must enter the IP addresses on the command line.
To remove all servers from the list, enter two quotation marks ().
Format
grpparams ntp-server-list ip_address[:port]
Example
Add two NTP servers for the group:
grpparams passwd
Changes the password that is required to add a member to a group.
The original password was set when the group was created. The password must be between 3 and 16
ASCII characters and is case-sensitive. Do not specify a current user or account password.
NOTE: Do not specify a password on the command line. After entering the command, you will be
prompted for the new password. Passwords are not shown on the screen.
Format
grpparams passwd
Example
Change the password for adding a group member:
grpparams perf-balancing
Enables (default) or disables performance load balancing.
When you enable performance load balancing, the group places volume data on members that have the
optimal RAID level for the volume, based on the volumes performance metrics and historical I/O pattern.
Performance load balancing occurs only after a period of time during which the group monitors the
volumes performance and I/O pattern. Over time, volume data might be moved across members.
Format
grpparams perf-balancing enable|disable
Format
grpparams protocol-endpoint access show
Example
> grpparams protocol-endpoint access show
grpparams radius-acct-list
Specifies one to three IP addresses for external RADIUS accounting servers that are used to track group
administration accounts that are also authenticated with RADIUS. The servers are contacted in the order
specified.
To enable RADIUS accounting, see grpparams login-radius-acct.
Depending on how you configured the RADIUS accounting server, you might need to specify secrets
(passwords). See grpparams radius-auth-secrets.
Optionally, you can override the default retry and timeout values for contacting RADIUS accounting
servers. See grpparams radius-auth-retries and grpparams radius-auth-timeout.
Format
grpparams radius-acct-list ip_address[:port]
Variable
Variable Description
ip_address[:port] One to three IP addresses, separated by commas but no spaces.
Optionally, specify a port if it is different from the default RADIUS server
port (1812).
To remove all addresses from the list, enter two quotation marks ().
Example
Add two RADIUS accounting servers:
grpparams radius-acct-retries
Specifies the number of times the group will try to contact a RADIUS accounting servers after the first
attempt fails. If the group cannot connect within the specified number of retries, it will try to connect to
another accounting server, if one is configured.
For example, when a user logs in to a group administration account, the group tries to contact a RADIUS
authentication server. Then if the account is authenticated the group tries to contact an accounting
server. If the group receives no response within the time limit set by the radius-acct-timeout
parameter, the group will keep trying to contact the server the number of times specified by the radius-
acct-retries parameter.
Format
grpparams radius-acct-retries n
Variable
Variable Description
n Number of times the group will try to contact a RADIUS accounting
server after the initial attempt fails. The default is 1 retry.
Example
Configure the group to try again two times to contact a RADIUS accounting server after the initial
attempt fails:
grpparams radius-acct-secrets
Specifies secrets (passwords) for the external RADIUS accounting servers that are used to track group
administration accounts that are authenticated with a RADIUS authentication server.
To specify RADIUS accounting servers, see grpparams radius-acct-list.
Variable
Variable Description
secrets One to three secrets (passwords), up to 63 ASCII characters each,
separated by commas and no spaces.
Specify the secrets in the same order as the list of specified accounting
servers. The first secret will apply to the first server specified with the
radius-acct-list parameter (see grpparams radius-acct-list). The
second secret will apply to the second server, and so on.
Example
Add secrets for two RADIUS accounting servers:
grpparams radius-acct-timeout
Specifies the number of seconds the group will wait for a RADIUS accounting server to respond before
timing out.
For example, when a user logs in to a group administration account, the group tries to contact a RADIUS
authentication server. Then if the account is authenticatedthe group tries to contact a RADIUS
accounting server. If the server does not respond within the timeout period, the contact fails. If the value
of the radius-acct-retries parameter is more than 1, the group will try to contact the server for the
specified number of times.
Format
grpparams radius-acct-timeout n
Variable
Variable Description
n Number of seconds to wait for a response from a RADIUS accounting
server. The default is 2 seconds.
Example
Configure the group to wait 5 seconds before trying again to contact the RADIUS accounting server:
Depending on the RADIUS server configuration, you might need to specify secrets (passwords) for the
authentication servers (see grpparams radius-auth-secrets.
Optionally, you can specify retry and timeout values for the servers. See grpparams radius-auth-retries
and grpparams radius-auth-timeout.
NOTE: After you have configured the group to use a RADIUS authentication server for host access
to volumes, you can create a basic access point for the volume with a CHAP account name that is
the same as an account on the RADIUS server. For more information about setting up basic access
points, see volume select access create.
Format
grpparams radius-auth-list ip_address[:port]
Variable
Variable Description
ip_address[:port] One to three IP addresses, separated by commas but no spaces, and
optional port. Optionally, specify a port if it is different from the default
RADIUS server port (1812).
The order in which you specify the IP addresses is the order in which
they will be used. To change any of the servers in the list, you must
reenter all the IP addresses. To remove all addresses from the list, enter
two quotation marks ().
Example
Add two RADIUS authentication servers:
grpparams radius-auth-retries
Specifies the number of times the group will try to contact a RADIUS authentication server after the first
attempt fails. If the group cannot connect within the specified number of retries, it will try to contact
another authentication server, if one is configured.
For example, when a host (iSCSI initiator) tries to connect to a volume (or a user logs in to an
administration account), the group tries to contact a RADIUS authentication server. If the group receives
Format
grpparams radius-auth-retries n
Variable
Variable Description
n Number of times the group will try to contact a RADIUS authentication
server after the initial attempt fails. The default is 1 retry.
Example
Configure the group to try again two time to contact a RADIUS authentication server after the initial
attempt fails:
grpparams radius-auth-secrets
Specifies secrets (passwords) for the external RADIUS authentication servers that are used to authenticate
host access to volumes, authenticate group administration accounts, or authenticate Microsoft service
access to the group.
To specify RADIUS authentication servers, see grpparams radius-auth-list.
Format
grpparams radius-auth-secrets secret[,secret,...]
Variable
Variable Description
secret One to three secrets (passwords), up to 63 ASCII characters each,
separated by commas and no spaces.
Specify the secrets in the same order as the list of specified
authentication servers (see grpparams radius-auth-list). The first secret
applies to the first server, the second secret applies to the second
server, and so on.
Example
Add two RADIUS authentication secrets:
Format
grpparams radius-auth-timeout n
Variable
Variable Description
n Number of seconds to wait for a response from a RADIUS
authentication server. The default is 2 seconds.
Example
Set the RADIUS timeout value to 3 seconds:
grpparams session-banner
Enables or disables the display of a text banner before users log in to the group through the GUI or the
CLI.
Format
grpparams session-banner enable "bannerText" | disable
Variable
Variable Description
bannerText Text string, enclosed in quotation marks (), to be displayed in the
GUI or the CLI when a user logs in to the group.
The text string can be up to 256 characters.
grpparams session-idle-timeout
Enables or disables (default) the idle timeout value for a login session, and optionally sets a length of time
for the value.
If enabled, the timeout value is the number of minutes that the session can remain idle before being
logged out. If disabled, the timeout value is ignored.
Format
grpparams session-idle-timeout enable [n] | disable
Variable
Variable Description
n Number of minutes, from 1 to 1440 (24 hours), to wait before the group
automatically logs out an idle session. By default, the timeout value is
set to 30 minutes but disabled.
NOTE: If the timeout value has been changed from the default to a
different number, you must use the enable parameter to set the
value back to 30 (grpparams session-idle-timeout enable 30).
Examples
Enable the idle timeout value and keep the current value (30 by default):
Enable the idle timeout value and set the value to 15 minutes:
After you enable and set the value, the display from the grpparams show command will show the
following settings:
Disable the idle timeout value (the current value stays the same):
See Also
cli-settings
Format
grpparams show [list]
Variable
Variable Description
list Specifies one of the following lists to display:
access-points-list
email-list
isns-server-list
ntp-server-list
radius-acct-list
radius-auth-list
smtp-server-list
syslog-server-list
Examples
Display the list of syslog servers configured for the group:
Display all the basic access points, access policies, access policy groups, and associations between
access policy groups and volumes:
grpparams smtp-server-list
Specifies from one to three IP addresses for SMTP (Simple Mail Transfer Protocol) servers or email relays
used for email event notification.
To change any of the servers in the SMTP server list, reenter all the IP addresses on the command line.
To remove all servers from the list, enter two quotation marks ().
To set up email notification, you must also specify one or more email addresses to receive the email and
enable email event notification. See grpparams email-list and grpparams email-notify. In addition, you
can specify a sender address for the notification messages (see grpparams email-from).
Format
grpparams smtp-server-list ip_address[:port]
Example
Configure an SMTP server for the group:
grpparams snmp
Sets or shows SNMP (Simple Network Management Protocol) configuration parameters, such as
community strings and trap destinations.
To remove a community string, SNMP managers string, or trap community string, enter two quotation
marks ().
Format
grpparams snmp parameter | show
Parameters
Parameter Description
read-only-comms string One or more read-only community strings, separated by commas and
no spaces, used by the SNMP agent to authenticate SNMP requests
snmp-managers string One or more IP addresses, separated by commas and no spaces, for
SNMP trap destinations
trap-community string Community string used by the SNMP agent when sending traps
Subcommand
Subcommand Description
show Displays the SNMP parameters
Example
Set the IP address for an SNMP trap destination:
Format
grpparams snmp show
Example
Display the SNMP parameters:
grpparams standby-button
Enables or disables (default) the standby button for all members in the group that support this feature.
Only certain control modules have the standby button.
NOTE: Standby operation is compatible with all PS Series group members that have Type 11 or 12
control modules (PS4100 or PS6100 array models). Only a group administrator can enable or
disable the standby button setting in the CLI or the GUI. See the Hardware Owner's Manual for
details about the Standby ON/OFF button.
Format
grpparams standby-button enable|disable
Example
Enable the standby feature for all group members that support it:
If you add more members (arrays) to the group, the standby setting is automatically applied to members
that have the Standby ON/OFF button. Use the grpparams show command to view the standby mode
activity.
grpparams syslog-notify
Enables or disables (default) event logging to remote syslog servers.
When you enable syslog notification, by default events with a fatal, error, or warning priority result in
notification, unless you specify different priorities with the alerts command. See alerts.
To use syslog notification, you must also specify IP addresses for the syslog servers. See grpparams
syslog-server-list.
Example
Enable sending event logs to a remote syslog server:
grpparams syslog-server-list
Sets one to three IP addresses for remote servers that will log events to a remote syslog-style log file.
The servers must be configured to accept remote log files. The default port number is 514 (UDP).To use
syslog notification, you must also enable syslog notification. See grpparams syslog-notify.
To change any of the servers in the syslog server list, reenter the IP addresses on the command line.
To remove all servers from the list, enter two quotation marks ().
Format
grpparams syslog-server-list ip_address[,ip_address,ip_address]
Variable
Variable Description
ip_address One to three IP addresses, separated by commas and no spaces
Example
Add a syslog server for the group:
grpparams target-auth-password
Specifies a CHAP password to be used for target authentication, which lets the volume (iSCSI target) be
authenticated by the host (iSCSI initiator).
You must also specify the target authentication user name (see grpparams target-auth-username). You
cannot use target authentication without setting up initiator authentication. See chapuser and grpparams
cliaccess-ssh.
Format
grpparams target-auth-password password
Example
Create a CHAP password for target authentication:
grpparams target-auth-username
Specifies a CHAP user name to be used for target authentication, which lets the volume (iSCSI target) be
authenticated by the host (iSCSI initiator).
You must also specify the target authentication password (see grpparams target-auth-password). You
cannot use target authentication without setting up initiator authentication. See chapuser and grpparams
cliaccess-ssh.
Format
grpparams target-auth-username name
Variable
Variable Description
name User name, up to 63 ASCII characters
Example
Configure a CHAP user name for target authentication:
grpparams thermal-shutdown
Enables (default) or disables the thermal-shutdown feature for group members that support the feature
(for example, PS4100 and PS6100 array models).
The thermal-shutdown feature automatically shuts down the array when the ambient temperature
reaches a certain critical point past which the array will be damaged or destroyed if it continues to
operate.
WARNING:
Dell strongly discourages disabling the thermal-shutdown feature. Disabling this feature allows the
array to operate past its safe operating temperature and can result in the destruction of the array
and the data on it. Disabling this feature might void the warranty for the arrays that support it.
Example
Disable the thermal shutdown feature (not recommended), which is enabled by default:
grpparams time
Sets the time for the group.
Format
grpparams time hh:mm:ss
Variable
Variable Description
hh:mm:ss Time in 24-hour format: hours (hh), minutes (mm), and seconds (ss)
Example
Set the group time:
grpparams timezone
Sets the time zone for the group, using a country and city designation.
The default is America/New_York.
Format
grpparams timezone zone
Variable
Variable Description
zone Time zone. To see a list of supported time zones, use the grpparams
timezone ? command.
grpparams vss-vds
Configures VSS/VDS hosts to communicate with the group.
Hosts communicate with the group through the Microsoft Volume Shadow Copy Service (VSS) and
Virtual Disk Service (VDS).
Format
grpparams vss-vds subcommand
Subcommands
Subcommand Description
access Creates a basic access point for Microsoft service access to the group
access-policy Creates an access policy for Microsoft service access to the group
access-policy-group Creates an access policy group for Microsoft service access to the
group
show Displays all Microsoft service basic access points, access policies, and
policy groups
NOTE: If you are using CHAP to authenticate Microsoft service access to the group, you must set up
a CHAP account either locally (see chapuser) or on a RADIUS server (see grpparams radius-auth-
list). The Windows server that is running the Microsoft service must be configured with a matching
CHAP user name and password. See the Host Integration Tools for Microsoft documentation for
more information.
Format
grpparams vss-vds access subcommand [parameter]
Parameters
Parameter Description
authmethod chap|none Specifies whether the record uses CHAP authentication (chap) to
restrict Microsoft service access to the group. The default is none;
CHAP authentication is not used.
You must also specify the username chap_name parameter for CHAP
authentication.
username chap_name CHAP account name (up to 63 printable characters; spaces cannot be
used) to which access is restricted. The name must match a local CHAP
account or an account on an external RADIUS server that is known to
the group.
You must also specify the authmethod chap parameter for CHAP
authentication.
ipaddress address IP address to which access is restricted. An asterisk (*) in any of the four
parts of an IP address is interpreted as a wildcard character; that is, any
value is accepted for that 8-bit field.
initiator name Name of the iSCSI initiator to which group access is restricted. For
example:
iqn.2002-10.com.mycompany.qla-4000.sn00044
Example
Create a basic access point that grants a user access to the Microsoft service for the group, using an
authentication method of CHAP:
Format
grpparams vss-vds access-policy subcommand name
Variable
Variable Description
name Name of an access policy
Subcommands
Subcommand Description
associate-to Associates the specified access policy to the Microsoft service
disassociate-from Disassociates the specified access policy from the Microsoft service
Example
Associate an access policy to the Microsoft service for the group:
Format
grpparams vss-vds access-policy-group subcommand name
Variable
Variable Description
name Name of the access policy group
Subcommands
Subcommand Description
associate-to Associates the specified access policy group to the Microsoft service
disassociate-from Disassociates the specified access policy group from the Microsoft
service
Format
grpparams vss-vds show
Example
Display all Microsoft service basic access points, access policies, and policy groups for the group:
grpparams webaccess
Enables (default) or disables the use of standard HTTP web connections (through port 80) to the group
manager GUI.
To restrict GUI access to web connections that are secured with SSL, see grpparams webaccess-
noencrypt.
Format
grpparams webaccess enable|disable
Example
Disable web connections to the group:
grpparams webaccess-noencrypt
Enables (default) or disables requiring access to the GUI through a web connection that is not encrypted
with SSL or TLS.
If enabled, SSL and TLS are not required. To limit GUI access only to web connections that are secured
with SSL or TLS encryption, disable this feature and install the Java plug-in with SSL on the host running
the web browser. Also, you must select the checkbox next to Encrypt communication in the GUI login
dialog box.
Format
grpparams webaccess-noencrypt enable|disable
ipsec
Manages IP security for the group.
NOTE: Enabling or disabling IPsec for the group using the ipsec enable and ipsec disable commands
might disrupt host connectivity to the group for several minutes. To prevent unplanned outages,
Dell recommends that IPsec be enabled or disabled during a planned maintenance window when
no volumes have any active iSCSI connections.
Format
ipsec subcommand
Subcommands
Subcommand Description
certificate Loads a security certificate. See ipsec certificate.
show Displays the IPsec certificates and security parameters for the group
See Also
ipsec certificate
ipsec security-association
ipsec security-params
ipsec policy
ipsec certificate
Manages IP security certificates for the group.
Formats
ipsec certificate subcommand
Subcommands
Subcommand Description
delete Deletes an IP security certificate
Format
ipsec certificate certificate_name delete
Variable
Variable Description
certificate_name Name of the certificate
Example
Delete an IP security certificate:
Variables
Variable Description
certificate_name Name of the certificate (64 characters or fewer). Valid characters
include letters, numbers, period, hyphen, and underscore.
priv_key_file Used only with the local certificate type. Specifies the file containing the
private key.
password Used only with the local certificate type. Specifies the password to
decrypt the private key file.
Examples
Load a local certificate:
Format
ipsec certificate select certificate_name show
Variable
Variable Description
certificate_name Name of the certificate
Example
Display information about an IP security certificate:
Format
ipsec certificate show
Example
Display information about all IP security certificates on the group:
Format
ipsec enable|disable
Subcommands
Subcommand Description
disable Disables IP security on the group
Example
Enable IPsec on the group:
ipsec policy
Manages IP security policies.
Format
ipsec-policy subcommand
See Also
ipsec
ipsec certificate
ipsec security-params
Formats
For IPv4:
For IPv6:
Variable
Variable Description
name Specifies the name of this security policy.
Names can be up to 32 characters.
Parameters
Parameter Description
type v4|v6 Specifies whether this policy applies to IPv4 or IPv6
ip-addr ip_address Specifies the IP address of the host or network address of the
remote endpoints
prefix-length length (IPv6 only) Specifies the length of the prefix (from 1 to 128)
used by the remote endpoints for this policy
local-port port Specifies the local port number (from 1 to 65535) to which
the policy applies
remote-port port Specifies the remote port number (from 1 to 65535) to which
the policy applies
protocol protocol_type Specifies the network protocol for this policy. You can create
a unique policy for each protocol. The protocols support
different IP versions, as follows:
action drop|pass|protect Specifies the action to take when a packet that matches the
security-params specified policy is received. Choices are:
Examples
Create a security policy for a certificate-based security parameter for an IPv4 implementation:
Create a security policy for a pre-shared-key security parameter for an IPv6 implementation:
Create a security policy for a certificate-based security parameter that uses tunneling for an IPv4
implementation:
See Also
ipsec
ipsec certificate
ipsec security-params
Format
ipsec-policy delete policy_name
Variable
Variable Description
policy_name Specifies the name of the security policy to delete
Example
Delete a security policy:
See Also
ipsec
ipsec certificate
ipsec security-params
Format
ipsec policy show
Example
Display all the configured security policies on the group:
See Also
ipsec
ipsec certificate
ipsec security-params
ipsec security-association
Manages IP security associations.
NOTE: You cannot use the save-config CLI command to preserve the groups IPsec certificate
configuration. The save-config command saves the CLI commands that were used to configure
IPsec, but it does not save certificates that have been transferred to the array using FTP. Therefore,
when you restore a configuration, you must manually restore any configuration options that were
set using the ipsec certificate load and ipsec security-params create certificate commands.
Format
ipsec security-association subcommand
Subcommands
Subcommand Description
delete Deletes an IP security association
Example
See Also
ipsec
ipsec certificate
ipsec security-params
ipsec policy
Format
ipsec security-association delete type v4|v6 rem-ip-addr ip_address
Parameters
Parameter Description
rem-ip-addr ip_address Specifies an IP address (for example, of an iSCSI initiator) to delete.
Deleting the address breaks the security association to that remote
address.
type v4|v6 Specifies whether this security association applies to IPv4 or IPv6
Example
Delete a security association for an IPv4 address:
See Also
ipsec
ipsec certificate
ipsec security-params
ipsec policy
Format
ipsec security-association show
Example
Display all the security associations on the group:
ipsec security-params
Manages IP security parameters.
NOTE: The save-config CLI command does not preserve the groups IPsec certificate configuration.
The save-config command saves the CLI commands that were used to configure IPsec, but it does
not save certificates that have been transferred to the array using FTP. Therefore, when you restore
a configuration, you must manually restore any configuration options that were set using the ipsec
certificate load and ipsec security-params create certificate commands.
Format
ipsec security-params subcommand
Subcommands
Subcommand Description
create Creates IP security parameters
See Also
ipsec
ipsec certificate
ipsec policy
ipsec security-association
Format
ipsec security-params create security_param parameter
Parameters
Parameter Description
certificate Creates an IP security parameter using a certificate
See Also
ipsec
ipsec certificate
ipsec policy
ipsec security-association
For each certificate, you can specify any combination, all, or none of the following encryption methods:
null-encryption
require-ike-v2
tunnel (with either an IPv4 or IPv6 tunnel type, plus a tunnel IP address)
Formats
For a certificate that uses an IP address:
ipsec security-params create security_param certificate id-type ip-address
id-value ip_address [null-encryption] [require-ike-v2] [tunnel type type tun-
ip-addr tunnel_ip_address]
For a certificate that uses a domain name:
ipsec security-params create security_param certificate id-type domain-name
id-value domain_name [null-encryption] [require-ike-v2] [tunnel type type
tun-ip-addr tunnel_ip_address]
For a certificate that uses an email address:
ipsec security-params create security_param certificate id-type email-
address id-value email_address [null-encryption] [require-ike-v2] [tunnel
type type tun-ip-addr tunnel_ip_address]
Variables
Variable Description
security_param Specifies the name of the security parameter to create
Parameters
Parameter Description
null-encryption Specifies null encryption for the security certificate
tunnel type v4|v6 Specifies a tunnel to an IP address for the security certificate, and
whether the tunnel uses IPv4 or IPv6 protocol
The string must comply with the syntax rules specified in Internet Engineering Task Force (IETF) RFC
4514, which is available at: http://www.ietf.org. In this context, this rule requires that you must escape
all spaces, as well as the following nonalphanumeric characters, by preceding them with a backslash
(\) character: " # + , ; < > = \ Special characters must be escaped only when they are part of the value
of a component. When used as delimiters or syntactic markers, they should not be escaped. Using
D=US! as an example, the exclamation mark (!) must be escaped, and the equal sign (=) must not.
You must enclose the string in quotation marks if it contains nonalphanumeric characters, including
non-ASCII or Unicode (double-byte) characters.
If the string itself contains quotation marks or null characters, you must enter them in hexadecimal
notation. For example:
A string containing only alphanumeric characters that does not require encapsulation in quotation
marks: C=US, O=Dell, CN=EquallogicArray42
A string containing nonalphanumeric characters that do not need to be escaped: "C=US!,
O=Dell, CN=EqualLogicArray-42"
Examples
Create a certificate-based security parameter:
See Also
ipsec
ipsec certificate
ipsec policy
ipsec security-association
Format
ipsec security-params create security_param manual-key
auth-algorithm auth_alg auth-key-in inbound_key auth-key-out outbound_key
spi-inbound number spi-outbound number encrypt-algorithm enc_alg
[tunnel type type tun-ip-addr tunnel_ip_address]
Variable
Variable Description
security_param Specifies the name of the security parameter to create
Parameters
Parameter Description
auth-algorithm Specifies the authentication algorithm for the manual key. Either:
auth_alg
sha1 For Secure Hash Algorithm version 1 (SHA-1)
spi-inbound number Specifies the inbound SPI. This number must be in the range between
255 and 4096.
spi-outbound number Specifies the outbound SPI. This number must be in the range between
255 and 4096.
encrypt-algorithm Specifies the encryption algorithm for the key. Options are:
enc_alg
3des-cbc
aes-cbc
null
tunnel type v4|v6 Specifies using tunnel mode and the tunnel type (either v4 or v6)
tun-ip-addr Specifies the tunnel IP address. Used only if you specified tunnel mode.
tunnel_ip_address
See Also
ipsec
ipsec certificate
ipsec policy
ipsec security-association
null-encryption
require-ike-v2 (with either an IP address, domain name, email address, or distinguished name)
tunnel (with either an IPv4 or IPv6 tunnel type, plus a tunnel IP address)
Variables
Variable Description
security_param Specifies the name of the security parameter to create
key string Specifies the name of the pre-shared key. Pre-shared key names can be
from 6 to 32 characters, and can contain letters, numbers, or any of the
following nonalphanumeric characters: ! " # $ % & ( ) * + , - . / : ; < = > ?
@[\]^_`{|}~
ip_address IP address of the host or tunnel that is allowed to connect to the group
Parameters
Parameter Description
null-encryption Specifies null encryption for the security parameter
tunnel type v4|v6 Specifies tunnel mode, and the tunnel type (either v4 or v6)
The string must comply with the syntax rules specified in Internet Engineering Task Force (IETF) RFC
4514, which is available at: http://www.ietf.org. In this context, this rule requires that you must escape
all spaces, as well as the following nonalphanumeric characters, by preceding them with a backslash
(\) character: " # + , ; < > = \
Special characters must be escaped only when they are part of the value of a component. When used
as delimiters or syntactic markers, they should not be escaped. Using D=US!as an example, the
exclamation mark (!) must be escaped, and the equal sign (=) must not.
You must enclose the string in quotation marks if it contains nonalphanumeric characters, including
non-ASCII or Unicode (double-byte) characters.
If the string itself contains quotation marks or null characters, you must enter them in hexadecimal
notation. For example:
A string containing only alphanumeric characters that does not require encapsulation in quotation
marks: C=US, O=Dell, CN=EquallogicArray42
A string containing nonalphanumeric characters that do not need to be escaped: "C=US!,
O=Dell, CN=EqualLogicArray-42"
A string containing nonalphanumeric characters that must be escaped: "C=US, O=Dell,
CN=EqualLogic\+Array\ 42"
Examples
Create a security parameter based on a pre-shared key:
Create a security parameter based on a pre-shared key that uses tunneling and requires IKEv2 with a
domain name:
See Also
ipsec
ipsec certificate
ipsec policy
ipsec security-association
Format
ipsec security-params delete security_parameter
Variable
Variable Description
security_parameter Name of the IP security parameter to be deleted
Example
Delete a specific security parameter:
Format
ipsec security-params select security_peer show
Variable
Variable Description
security_peer Name of the security peer
Example
Display information about a security peer for the group:
Format
ipsec security-params show parameter
Examples
Display All Security Parameters
Display all the security parameters for the group that use a certificate (output is formatted for readability):
Display all the security parameters for the group that use a manual key:
See Also
ipsec
ipsec certificate
ipsec policy
ipsec security-association
ipsec show
Displays the IPsec certificates and security parameters for the group.
Format
ipsec show
Example
Display the IPsec certificates and security parameters configured on the group:
ldap
Manages LDAP and Active Directory authentication within a PS Series group.
Format
ldap subcommand
Subcommands
Subcommand Description
ad-group Adds, removes, modifies, or displays information about one or all Active
Directory user groups that have administrative privileges in the group
ad-server Configures and displays information about the Active Directory servers.
Only group administrator accounts can configure Active Directory
servers.
ad-user Adds, removes, modifies, or displays information about one or all Active
Directory user accounts or a specific AD user in the group
server-list Configures and displays information about the LDAP server list
Format
ldap ad-group subcommand
Subcommands
Subcommand Description
add Grants administrator privileges to all accounts in an Active Directory
group
delete Revokes administrator privileges for all accounts in the Active Directory
group
Formats
ldap ad-group add name group-admin [read-only]
ldap ad-group add name pool-admin pools pool_list [group-read-access]
ldap ad-group add name volume-admin pool-quota-list pool_quota_list partners
partner_list
Variables
Variable Description
name Active Directory group name, up to 63 ASCII characters
pool-admin pools pool_list Grants the accounts in the Active Directory group pool
[group-read-access] administrator access to the specified pools.
Optionally, specify group-read-access to give the Active
Directory group users read-only access to the group.
volume-admin pool-quota-list Grants the accounts in the Active Directory group volume
pool_quota_list administrator privileges within the specified pool, as well as
an assigned storage quota
Examples
Add an Active Directory group for which all users will be volume administrators with a 100GB quota in the
default storage pool:
Add an Active Directory group for which all users will have group administrator privileges:
Add an Active Directory group for which all users will be pool administrators for the default storage pool:
Format
ldap ad-group delete group
Example
Remove an Active Directory group:
Formats
ldap ad-group select group show
ldap ad-group select group group-admin [read-only|read-write]
ldap ad-group select group pool-admin pools pool_list [group-read-access]
ldap ad-group select group volume-admin pool-quota-list pool_quota_list
[partners partner_list]
Variables
Variable Description
group Active Directory group name
pool_quota_list List of pools to which the account has access, including the storage
quota within the pool. For example: pool1,300GB
Parameters
Parameter Description
group-admin [read- Grants group administrator privileges to the account.
only|read-write]
Specify read-only to give the user read-only access to the group.
Specify read-write to give the user read-write access.
pool-admin pools Grants the account pool administrator access to the specified pools.
pool_list [group-read-
Specify group-read-access to give the Active Directory user read-
access]
only access to the group.
partners partner_list Specifies the replication partners to which volume administrators can
replicate their volumes. Applicable only with the volume-admin
parameter.
Examples
Grant pool administrator privileges for a storage pool to the accounts in an Active Directory group:
Grant volume administrator privileges within a storage pool to the accounts in an Active Directory group,
with each account having a quota of 100GB and replication partnership privileges to two other groups:
Format
ldap ad-group select group show
Variable
Variable Description
group Active Directory group to display information about
Example
Display information about an Active Directory group:
Format
ldap ad-group show
Example
Display the list of Active Directory groups:
ldap ad-server
Configures and displays information about the Active Directory servers. Only group administrator
accounts can configure Active Directory servers.
Format
ldap ad-server subcommand
Subcommands
Subcommand Description
get-join-status Checks whether the group is currently registered with Active Directory
join user_name Adds the group to the current set of AD servers. You must specify a user
name for Active Directory server authentication.
leave user_name Removes the group from the current set of AD servers. You must
specify a user name for Active Directory server authentication.
Example
Add the group to the list of AD servers, and supply the AD server authentication user name:
Remove the group from the Active Directory domain. You must specify the AD user name for
authentication.
ldap ad-user
Adds, removes, modifies, or displays information about Active Directory user accounts that have
administrative privileges in the group.
Format
ldap ad-user subcommand
Subcommands
Subcommand Description
add Adds an Active Directory user to the groups list of administrator
accounts
delete Removes the Active Directory user account from the group
Formats
ldap ad-user add name group-admin [read-only]
ldap ad-user add name pool-admin pools [group-read-access]
ldap ad-user add name volume-admin pool-quota-list pool_quota_list [partners
partner_list]
Parameters
Parameter Description
group-admin [read- Grants group administrator privileges to the account.
only|read-write]
Specify read-only to grant the user read-only access to the group.
Specify read-write to grant the user read-write access.
pool-admin pools Grants the account pool administrator access to the specified pools.
pool_list [group-read-
Optionally, specify group-read-access to grant the Active Directory
access]
user read-only access to the group.
volume-admin pool- Grants the accounts volume administrator privileges within the
quota-list specified pool, as well as an assigned storage quota
pool_quota_list
partners partner_list Specifies the replication partners to which a volume administrator can
replicate volumes. Applies only to thevolume-admin parameter.
Examples
Create an Active Directory user with group administrator privileges:
Create an Active Directory user with pool administrator access to two pools and with read access to the
entire group:
Format
ldap ad-user delete user_name
Variable
Variable Description
user_name Active Directory user name
Example
Delete an Active Directory user:
Formats
ldap ad-user select name group-admin [read-only|read-write]
ldap ad-user select name pool-admin pools group-read-access
ldap ad-user select name volume-admin pool-quota-list pool_quota_list [partners
partner_list]
Variables
Variable Description
name Active Directory user name
Parameters
Parameter Description
group-admin [read-only|read- Grants group administrator privileges to the account. By
write] default, the account will have read-write access.
Specify read-only to grant the user read-only access to the
group.
pool-admin pools [group-read- Grants the account pool administrator access to the specified
access] pools.
Specify group-read-access to grant the Active Directory
user read-only access to the group.
Examples
Change a user to a read-only account:
Give pool administrator access to a user, granting her access to two pools:
Format
ldap ad-user select user_name show
Variable
Variable Description
user_name Active Directory user name to display
Format
ldap ad-user show
Example
> ldap ad-user show
__________________ Active Directory Users - Allowed Access ___________________
Name Permission Privilege
-------------------- ---------- -------------
volume_admin_eng read-write volume-admin
volume_admin_sales read-write volume-admin
volume_admin_market read-write volume-admin
group_admin read-write group-admin
pool_admin_1 read-write pool-admin
pool_admin_2 read-write pool-admin
ldap authentication
Enables or disables LDAP authentication for administrator accounts in the group.
Format
ldap authentication enable|disable
Example
Enable LDAP authentication:
ldap server-list
Manages LDAP servers for the group.
Format
ldap server-list subcommand
Subcommands
Subcommand Description
create Creates a prioritized list of Active Directory servers
select show Shows the configuration of the selected Active Directory server
Format
ldap server-list create base-dn base_dn secure-protocol none|tls ip-addr-list
address_list anonymous-access bind-dn bind_dn
'cn=username,us=users,dc=ldap,dc=company,dc=com'
'cn=username,ou=org_unit,dc=company,dc=com
For more information about distinguished name usage, see Formatting Distinguished Names.
Parameters
Parameter Description
anonymous-access Enables anonymous access to the directory
secure-protocol tls| Specifies the secure protocol used for communications with the Active
none Directory server: TLS or none (unsecured communications)
Create a server list for the EqualLogic domain, using the TLS protocol and Bind Distinguished Name
options:
Format
ldap server-list delete priority_index
Variable
Variable Description
priority_index Server priority number. Use the ldap server-list show command to
display the list of servers and their respective priorities.
Example
Remove the LDAP server with an index value of 1:
Format
ldap server-list select priority_index [ipaddress ip_address]
Variables
Variable Description
priority_index Server priority number. Use the ldap server-list show command to
display the priority index numbers.
Example
Set the IP address that the group will use to communicate with the server (which has an index value of 1):
Format
ldap server-list select priority_index show
Variable
Variable Description
priority_index Server priority number. Use the ldap server-list show command to
display the list of servers and their respective priorities.
Example
Display information about the LDAP server with an index value of 1:
Format
ldap server-list show
Example
> ldap server-list show
___________________________ Configured LDAP Servers __________________________
ldap show
Displays information about the groups Active Directory authentication configuration.
Format
ldap show
Example
Display the groups Active Directory authentication configuration:
local-groups search
Searches for a specified user in the defined local group.
Format
local-groups search search_string
Example
> unix-groups search a
Name Type Source
---------------------------------------- -------- --------
Bnas30+Administrators Windows Local
member
Manages group members.
Format
member subcommand
Subcommands
Subcommand Description
delete Removes a member from the group
show Shows information about all the group members or a specific member
member delete
Removes a member from its pool and from the group. Resets the array to factory defaults. Resetting an
array removes any group, member, and volume configuration information on the array.
Restrictions
You can remove only one member at a time.
You can cancel an in-progress member delete operation. To see member status, use the member show
command. While volume data is moving to other members, the member status is vacating-in-
progress. When complete, the member no longer shows in the member show output.
In rare cases, you might need to remove a member that is offline (for example, if the member has failed
and is no longer operational). Because deleting an offline member can have serious or unintended
consequences, you must contact your support provider to proceed.
Format
member delete member_name
Variable
Variable Description
member_name Name of a member
Example
Remove a member from its pool and the group:
# 3255:1361:quicksecpm:17-May-2015
13:37:22.431122:util_render.c:254:ERROR::65.4.1:IPsec (IKEv2) negotiation
failed as responder to remote identity: '192.0.2.28: (null)', using local
identity: '192.0.2.52: (null)'.
3257:1363:quicksecpm:17-May-2015
13:37:22.431124:util_render.c:323:ERROR::65.4.7:The IPsec or IKE protocols or
algorithms proposed by the peer do not match what is available on the array.
You can safely ignore these messages. The member deletion is completing normally. These error
messages will be removed in a future release.
member rename
Renames a member.
Format
member rename current_name new_name
Example
Change the name of a member:
member select
Modifies or shows the configuration of the selected member, including the network configuration, RAID
policy, and the pool to which the member belongs. You can also cancel an in-progress member
operation, such as a member delete (vacate) operation.
Format
member select member_name subcommand | parameter...
Variable
Variable Description
member_name Name of a member
Subcommands
Subcommand Description
data-reduction resume| Manages compression on a member
start|suspend
disk select clear- Clears the label of or shows information about the selected disk
label|show
disk show Shows information about the disks in the selected member
eth select dcb show| Shows the configuration of the selected network interface
show
eth show Shows the configuration of all the network interfaces on the member
sed-backup-key Manages key shares for group members tht use encrypted drives
show [component] Shows detailed information about the member or the specified member
component:
channelcards
connections
Parameters
Parameter Description
cancel-operation op_id Cancels an in-progress move or delete operation. Use the member
select show command to obtain the operations ID number.
controller-safe Enables or disables (default) controller-safe mode for the member. The
enable|disable recommended setting is disable.
def-gateway none| Sets a default gateway for the member. The choices are none (for no
ip_address default gateway) or the IP address of the gateway to use.
delay-data-move Specifies whether or not the space on a member is usable before RAID
enable|disable verification is complete and batteries are fully charged.
If disabled (default), the member space is used immediately. However,
member performance is not optimal while the RAID verification is in
progress.
This parameter applies only when setting the member RAID policy for
the first time (see the raid-policy parameter). You can disable this
functionality at any time. However, you cannot reenable the
functionality.
description text Description for the member, up to 127 ASCII characters. If the text
contains spaces, enclose it in quotation marks.
locate enable|disable Enables or disables the flashing of array LEDs for the purpose of
locating the array.
Flashing stops automatically after 2 hours.
pool pool Adds the member to a pool. Note that moving a member from one pool
to another can be a lengthy operation, because volume data on the
member must be moved to the remaining pool members. The data
raid-policy policy Sets the RAID policy for the member to one of the following levels:
[delay-data-move]
raid5 (not recommended)
raid6
raid6-accelerated (available only on certain PS Series array
models)
raid10
raid50
raid6-nospares
raid10-nospares
raid50-nospares
For the highest availability, choose a RAID policy that includes spare
disks, which are used automatically if a disk fails.
After you set a member RAID policy, you might be able to convert it to a
different RAID policy. However, the group does not support all RAID
policy conversions. When you convert a RAID policy, the members
RAID status is expanding.
RAID 5 does not offer optimal data protection for business-critical data
due to the higher risks of encountering a second drive failure during a
rebuild. As a result, Dell recommends against using this policy.
See the Dell EqualLogic Group Manager Administrator's Guide for more
information about specifying a members RAID policy.
raid-rebuild-delay Enables or disables (default) delaying the rebuilding of an SSD RAID set
by 24 hours to allow a new SSD to be inserted. When this feature is
enabled, an active status indicates that the 24-hour delay is in
progress.
This feature applies only to hybrid members with configurations that
include a single HDD spare but not an SSD spare. On these systems, if
you need to resolve a drive issue that is affecting the RAID set, you can
use the period of time provided by the rebuild delay feature to supply
the array with the required SSD spare. Supplying the SSD spare within
the 24-hour period prevents the array from using the HDD spare
instead, which could result in degraded system performance.
NOTE: The feature must have already been enabled on the system
before you can use it to resolve any issues.
If you try to enable this feature on an unsupported platform, the system
displays the following error message: Operation not supported on
sed-backup-key Generates a new set of backup key shares for encrypted drives, or
generate|verify verifies existing key shares. See About Encrypted Drives.
A member with encrypted drives can belong to the same group or pool as members without encrypted
drives. However, if a volume spans members that do and do not include encrypted drives, the volume
data is not considered to be encrypted.
To ensure that all the data in a specific volume is encrypted, use only members with encrypted drives in
that pool.
If you move a volume from an all-encrypted pool to a non-encrypted pool, or to a pool with a mix of
encrypted and non-encrypted members, the volume data is no longer guaranteed to be encrypted.
If the member contains encrypted drives, setting or changing the RAID policy also generates the backup
key data for those drives.
You can copy and save the key shares to a separate location (paste the command output into another file
stored off the array).
Examples
Moving a Member to Another Pool
Set a default gateway for all interfaces on the member (except the management network interface, if
any):
Set the RAID policy for a new group member. Because the member contains encrypted drives, the key
shares are displayed.
Format
member select member_name data-reduction compression resume
Variable
Variable Description
member_name Name of the member
Example
Resume compression on a member:
Format
member select member_name data-reduction compression start
Variable
Variable Description
member_name Name of the member
Format
member select member_name data-reduction compression suspend
Variable
Variable Description
member_name Name of the member
Example
Pause compression on a member:
Format
member select member_name disk select slot_number clear-label
Variables
Variable Description
member_name Name of a member
slot_number Disk slot number. The total number of slots in a member varies based
on the array model.
Format
member select member_name disk select slot_number show
Variables
Variable Description
member_name Name of a member
slot_number Disk slot number. The total number of slots in a member varies based
on the array model.
Example
Display information about a disk:
Format
member select member_name disk show
Variable
Variable Description
member_name Name of a member
Example
Show information about a members disks:
A network interface for iSCSI traffic can use either the IPv4 or the IPv6 protocol.
For IPv4, you must specify an IPv4 address and a netmask (subnet mask).
For IPv6, you can specify an IPv6 address, but these addresses are usually configured automatically
when you enable the interface. Subnet masks do not apply to IPv6.
Each interface can have up to eight (8) addresses. One interface can be a static IPv4 address, and one can
be a static IPv6 address (except for an interface configured for management). The other interfaces are
dynamic, and cannot be set, changed, or deleted. One of these dynamic addresses is a link-local address.
NOTE: If network problems occur, group members might lose the ability to communicate with each
other over the network. In this situation, some management operations are not allowed. For
example, you cannot change the IP address for an isolated members network interface.
Format
member select member_name eth select port_number parameter ...
Variables
Variable Description
member_name Name of a member
port_number Port number of the network interface (0, 1, or 2). For example, specify 2
for eth2.
Parameters
Parameter Description
description text Description for the network interface, up to 127 ASCII characters. If the
text contains spaces, enclose it in quotation marks.
Must be specified as a separate command.
You can also specify the netmask IP address on the same command
line.
lldp show Displays the LLDP (Link Layer Discovery Protocol) properties of the
Ethernet port
mgmt-only enable| Restricts the interface to dedicated management traffic. Supported only
disable on the highest-numbered network interface and only for an IPv4
address.
netmask mask_ip Netmask address (subnet mask) for the network interface. Applies only
to IPv4 addresses.
up|down Enables (up) or disables (down) the interface for I/O traffic.
Must be specified on a separate command line.
Examples
Configuring a Network Interface
The following commands configure a network interface and then enable it:
In a group using only the IPv6 protocol, you typically do not need to specify an IPv6 address for the
network interfaces. The router broadcasts available addresses. When you enable an interface, it takes one
of those addresses.
To enable a network interface in an IPv6 group and allow it to use a dynamic address, enter:
To configure a static IPv6 address for a network interface and enable it, enter the following commands:
To configure a static IPv6 address for a network interface that is already enabled (up), enter:
Changing the IP address closes all management and iSCSI connections associated
with this IP address. Do you really want to change? (y/n) [n] y
The following commands configure eth2 as a management interface, enable the interface, and designate
it as a management-only interface:
> member select member1 eth select 2 ipaddress 192.0.2.27 netmask 255.255.0.0
Format
member select member_name eth select port_number dcb parameter show
Variables
Variable Description
member_name Name of a member
Parameters
Parameter Description
congestion- Displays congestion notification for the selected interface
notification
lossless-priority Displays the lossless priority configuration for the selected interface
statistics Displays DCB control packet statistics information for the selected
interface
Format
member select member_name eth select port_number show
Variables
Variable Description
member_name Name of a member
Example
Show the configuration of a network interface:
Format
member select member_name eth show
Example
Show the configuration of the network interfaces on a member:
Format
member select member_name sed-backup-key subcommand
Variable
Variable Description
member_name Name of a group member with encrypted drives
Subcommands
Subcommand Description
generate Generates a new set of key shares for the member
verify Validates a set of key shares. You are prompted for each share one at a
time. Press Enter after entering each share to display the prompt for the
next one.
Examples
Generating Key Shares
Generate a new set of key shares that can be used to unlock the encrypted drives in the member:
NOTE: Because the key shares are very long, it is good practice to widen the CLI window as much
as possible so that each key share fits on one line. Making the window wider also helps with visually
scanning a share to check for data entry (or pasting) errors. Due to the page size of this document,
the example does not show each share on one line.
Format
member select member_name show [component]
Variables
Variable Description
member_name Name of a member
Examples
Displaying Member Information
______________________________________________________________________________
____________________________ Health Status Details ___________________________
Critical conditions::
None
Warning conditions::
None
______________________________________________________________________________
____________________________ Operations InProgress ___________________________
ID StartTime Progress Operation Details
-- -------------------- -------- ---------------------------------------------
______________________________________________________________________________
______________________________________________________________________________
SlotID: 1 Status: active
Model: 70-0202(TYPE 7) BatteryStatus: ok
ProcessorTemperature: 51 ChipsetTemperature: 25
LastBootTime: 2015-06-11:14:03:25 SerialNumber: RMS0935328G27RY
Manufactured: 1611 ECOLevel: C00
CM Rev.: A04 FW Rev.: Unreleased V7.0.0 (R345131)
NVRAM Battery: good BootRomVersion: 2.3.3
BootRomBuilDate: Tue Mar 31 16:37:31
EDT 2010
______________________________________________________________________________
______________________________ Cache Information _____________________________
CacheMode: write-back Controller-Safe: disabled
Low-Battery-Safe: enabled
______________________________________________________________________________
Show information about the channel cards in an array (applies only to some PS Series array models):
__________________________________________________________________
__________________________________________________________________
SlotID: 1 Status: good
SerialNumber: ICS713910002A25 FW Rev.: V2.c
Init Rev.: V03.1
__________________________________________________________________
______________________________________________________________________________
member show
Shows information about all the group members or a specific member, including any in-progress
operations. Different array models show slightly different information.
Format
member show [member_name] [-poolinfo]
Variable
Variable Description
member_name Name of a member
Parameter
Parameter Description
[-poolinfo] Displays pool information for the member
monitor
Shows information about host tools that are used for monitoring the group.
Format
monitor subcommand
Subcommands
Subcommand Description
delete monitor_index Removes monitoring information for a specific host, by its index
number.
For example, if a host has been permanently removed from the network
or is no longer serving as a monitoring host, use this command to
delete old index references to it.
select monitor_index Displays information about a particular host tools monitoring instance
show Shows information about host tools monitoring the group, including the
index numbers for the monitoring instances
Examples
Display all hosts that are currently monitoring the group:
Select an index number to display more details about the host monitoring the group:
nas
Manages the NAS cluster in the group.
The nas command structure is identical to, and is a built-in alias for, the nas-cluster select command
structure. With the exception of creating, deleting, or renaming a NAS cluster, you can perform the same
operations with the nas command that you can with the nas-cluster commands.
Because only one NAS cluster can be in a PS Series group, by default the nas command selects the
existing NAS cluster (equivalent to entering nas-cluster select cluster_name).
The full nas command structure is not documented in this guide. See the corresponding nas-cluster
select command for full syntax and usage details, or see the CLI help.
Format
nas subcommand
Subcommands
The nas command supports all the same subcommands as the nas-cluster select command. See nas-
cluster select for the complete list.
nas show
Displays information about the NAS cluster.
Format
nas show
Example
Display NAS cluster information:
nas-cluster
Manages the NAS cluster in the group.
Format
nas-cluster subcommand
Subcommands
Subcommand Description
create Creates a NAS cluster
nas-cluster create
Creates a NAS cluster in the group. You can configure only one NAS cluster per PS Series group.
The maximum size of the NAS cluster cannot exceed 510TB.
Format
nas-cluster create cluster_name controller_count nas_reserve_size pool
parameters
NOTE: For the NAS overhead, these minimum values are absolute.
If you select the minimum values, no space will be left for
containers. However, you can increase the NAS reserve later.
pool Storage pool from which the NAS reserve will be taken.
NOTE: After you set it initially, you cannot change the pool for the
NAS reserve.
Parameters
NOTE: You must enter the percent sign with these values.
Parameter Description
def-snap-reserve n% NAS clusterwide default snapshot reserve setting, as a percentage of the
container size. Minimum: 0%. Maximum: 90%.
Example
To create a NAS cluster, use the following sequence of commands:
1. discover-devices
(Obtain the service tag for each NAS controller that you want to use in the NAS cluster.)
See discover-devices.
2. nas-cluster create cluster_name controller_count nas_reserve_size pool
For example:
(Repeat for each NAS controller, specifying the service tag for each controller. You can add
controllers only in pairs, and the current limit is 2 pairs per cluster.)
For example:
For example:
nas-cluster delete
Deletes a NAS cluster from the group.
Format
nas-cluster delete cluster_name
Variable
Variable Description
cluster_name NAS cluster to delete
nas-cluster rename
Renames the NAS cluster in the group.
Format
nas-cluster rename cluster_name new_name
Variables
Variable Description
cluster_name Current name of the NAS cluster
new_name New name for the NAS cluster. The NAS cluster name can contain up to
15 ASCII characters (letters, numbers, and hyphens), but must begin
with a letter.
nas-cluster select
Selects the NAS cluster in the group for additional operations.
Format
NOTE: Because only one NAS cluster is supported in a PS Series group, you can use either the nas-
cluster command or the nas command to manage an existing NAS cluster. See nas for more
information.
nas-cluster select cluster_name subcommand parameters
Subcommands
Subcommand Description
active-client- Displays all the active NFS or SMB sessions from a client
sessions nfs|smb show
initialize-cluster Starts the NAS cluster configuration using the configuration information
previously specified in the CLI
Parameters
NOTE: Some of these parameters are used only with certain subcommands.
Parameter Description
def-access-security Specifies the default file security style for new containers
def-smb-antivirus Enables or disables (default) the antivirus service for an SMB share
def-smb-avextensions Manages the file extensions (types) to exclude from antivirus scanning
def-dir-permission Specifies the default UNIX permissions for new directories created by
clients
def-file-permission Specifies the default UNIX permissions for new files created by clients
def-nfs-permission Specifies the default permission setting for new NFS exports (read-write
or read-only)
def-nfs-trusted-user Specifies the default trusted user setting for new NFS exports (all-
except-root, nobody, or all). Other users will be identified as guests.
NOTE: To specify all, you must also restrict the client IP addresses
to a specific range. See nas-cluster select container select nfs-
export select.
def-space-warn Specifies, as a percentage of the container size, the default in-use space
warning limit for new containers
Format
nas-cluster select cluster_name active-client-sessions nfs show
Variable
Variable Description
cluster_name NAS cluster name
Example
Display the active NFS sessions:
NOTE: NFS3 protocol displays connection-related information, such as IP the address or controller
ID. Unlike SMB3, NFS3 does not contain session-related information such as user names or number
of open files.
Format
nas-cluster select cluster_name active-client-sessions smb show
Example
Display the active SMB sessions:
Format
nas-cluster select cluster_name ad-users search search_string
Variables
Variable Description
cluster_name Name of a NAS cluster
search_string Searches for users in the Active Directory database that match the terms
in the search string
Example
Search for specific users in the Active Directory database:
Format
nas-cluster select cluster_name alerts available-space-threshold percentage
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name alerts used-space-threshold percentage
Variables
Variable Description
cluster_name NAS cluster name
Example
Set the NAS reserve used space alert as the specified percentage of the reserve size:
Format
nas-cluster select cluster_name alerts show
Variable
Variable Description
cluster_name NAS cluster name
Example
Display the NAS reserve alerts:
Format
nas-cluster select cluster_name all-users subcommand
Variable
Variable Description
cluster_name NAS cluster name
Subcommand
Subcommand Description
search search_string Searches for users that match the terms in the search string in all of the
configured user databases
Example
Search for a specific set of users n a NAS cluster:
Format
nas-cluster select cluster_name antivirus-servers subcommand
Variable
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
create Configures antivirus servers for the cluster
Format
nas-cluster select cluster_name antivirus-servers create server_list
Variables
Variable Description
cluster_name NAS cluster name
Examples
Configure three antivirus servers using host names and ports:
Format
nas-cluster select cluster_name antivirus-servers deleteAll
Variable
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name appliance appliance_name subcommand parameters
Variables
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
select Selects an appliance in the NAS cluster
Parameters
Parameter Description
fan Displays information about the fans in the appliance
Examples
Display all the appliances in the NAS cluster:
Format
nas-cluster select cluster_name appliance select appliance parameters
Variables
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
select Selects an appliance in the NAS cluster
Parameters
Parameter Description
fan Displays fan information for the specified appliance
Examples
Display information for a fan in an appliance in a NAS cluster:
Format
nas-cluster select cluster_name client-load-balance action move load-ip load_ip
access-ip access_ip controller controller_name
Variables
Variable Description
cluster_name NAS cluster name
Example
Move the local client connection to the specified controller:
Format
nas-cluster select cluster_name client-load-balance action pin load-ip load_ip
access-ip access_ip controller controller_name [interface]
Variables
Variable Description
cluster_name NAS cluster name
Example
Pin a client load to the specified controller and specified interface:
Format
nas-cluster select cluster_name client-load-balance action unpin load-ip
load_ip access-ip access_ip controller controller_name [interface]
Variables
Variable Description
cluster_name NAS cluster name
Example
Unpins a client load from the specified controller and interface:
Format
nas-cluster select cluster_name client-load-balance show
Variable
Variable Description
cluster_name NAS cluster name
Example
Display information about the load for a client:
Format
nas-cluster select cluster_name container subcommand
Variable
Variable Description
cluster_name NAS cluster name
show Displays all the containers in the NAS cluster or displays the specified
container
Example
Display all containers for a NAS cluster:
Format
nas-cluster select cluster_name container create container_name size parameters
Variables
Variable Description
cluster_name NAS cluster name
snap-warn percent Snapshot reserve in-use space warning limit, as a percentage of the
snapshot reserve size.
If not specified, uses the clusterwide default value.
file-permission Sets the 3-digit octal UNIX file permissions, such as 777 or 744 (default).
octal_value
If not specified, uses the clusterwide default value.
dir-permission Sets the 3-digit octal UNIX directory permissions, such as 777 or 755
octal_value (default).
If not specified, uses the clusterwide default value.
few-writers Enables the distribution of workloads for few writers across domains
Examples
Create a container in the NAS cluster:
Create a container with few writers workloads enabled in the NAS cluster:
Format
nas-cluster select cluster_name container delete container_name
Variables
Variable Description
cluster_name NAS cluster name
Example
Delete a container:
Format
nas-cluster select cluster_name container rename current_name new_name
Variables
Variable Description
cluster_name NAS cluster name
Example
Rename a container:
Format
nas-cluster select cluster_name container select container_name parameter
subcommand
Variables
Variable Description
cluster_name NAS cluster name
Parameters
Parameter Description
access-security policy Sets the file security for the container to either:
ntfs (default)
mixed
unix
dir-permission Sets the 3-digit octal UNIX directory permissions, such as 777 or 744
octal_value (default)
file-permission Sets the 3-digit octal UNIX file permissions, such as 777 or 755 (default)
octal_value
size size Modifies the container size (capacity). Enter the new size in MB (default)
or GB.
snap-warn percent Snapshot reserve in-use space warning limit, as a percentage of the
snapshot reserve size:
Minimum10%
Maximum100%
Default80%
space-warn percent In-use space warning limit, as a percentage of the container size:
Minimum10%
Maximum100%
Default80%
Subcommands
Subcommand Description
smb-share Manages SMB shares on the container
group-quota-effective Displays the group quota effective rule for this container
user-quota-effective Displays the user quota effective rule for a specific user for this
container
useringroup-quota Manages quotas for each user in a group for the container
Format
nas-cluster select cluster_name container select container_name access-security
policy
policy Sets the file security policy for the container to either:
mixed
ntfs (default)
unix
Format
nas-cluster select cluster_name container select container_name data-reduction
parameter subcommand
Variables
Variable Description
cluster_name NAS cluster name
Parameters
Parameter Description
access-time-filter Excludes files from data reduction that have been accessed in the
num_days specified number of days (5 to 365)
filter-mode use- Filters files by the specified access time and modify time values or
filters|ignore-filters ignores the filters, and makes all files candidates for data reduction
Subcommands
Subcommand Description
disable Disables data reduction
modify-time-filter Excludes files from data reduction that have been modified in the
num_days specified number of days (5 to 365)
Examples
Enable only data reduction on a container:
Exclude files from data reduction that have not been accessed within the past 45 days:
Enable or disable rehydrate on read for a container. You must combine modifying rehydration with
disabling data reduction or it has no effect.
Format
nas-cluster select cluster_name container select container_name def-group-quota
subcommand
Subcommands
Subcommand Description
delete Deletes the default group quota for the selected container
modify Modifies the default group quota for the selected container
show Displays the default group quota for the selected container
Example
Show the group quota limit and warning percentage for a container:
Format
nas-cluster select cluster_name container select container_name def-group-quota
modify parameters
Variables
Variable Description
cluster_name NAS cluster name
warn-percentage n% Specifies the default warning limit as a percentage of the default group
quota size. You must enter the percent sign.
Example
Set a group quota and a warning limit on a container:
Format
nas-cluster select cluster_name container select container_name def-user-quota
subcommand
Variables
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
delete Deletes the default user quota for the selected container
modify Specifies the default user quota for the selected container
show Displays the default user quota for the selected container
Examples
Displaying User Quotas
Format
nas-cluster select cluster_name container select container_name def-user-quota
modify parameters
Variables
Variable Description
cluster_name NAS cluster name
Parameters
Parameter Description
quota size Specifies the default user quota for the selected container in MB
(default) or GB
warn-percentage n% Specifies the default warning limit as a percentage of the default user
quota size. You must enter the percent sign.
Formats
nas-cluster select cluster_name container select container_name dir-permission
octal_value
Variables
Variable Description
cluster_name NAS cluster name
Example
Set the directory permission for a container:
Format
nas-cluster select cluster_name container select container_name enable|disable
Variables
Variable Description
cluster_name NAS cluster name
Example
Enable workload distribution for few writers on a container:
Formats
nas-cluster select cluster_name container select container_name file-permission
octal_value
Variables
Variable Description
cluster_name NAS cluster name
Example
Set the default UNIX permissions for files created from SMB shares for a container:
If you are using an external server (such as Active Directory, LDAP, or NIS) to authenticate users and
groups on the destination cluster, quotas will be applied to the recovery container.
If you are using only local users and groups, quotas will not be applied.
If you are using both local users and groups and externally authenticated users and groups, user and
group quotas are applied for the externally authenticated accounts. Quotas will also be applied for the
local users and groups, but they might not be applied correctly.
For more information about this behavior, see the Dell EqualLogic Group Manager Administrator's Guide.
Format
nas-cluster select cluster_name container select container_name group-quota
subcommand
Variables
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
create Creates a group quota for a container
Format
nas-cluster select cluster_name container select container_name group-quota
create group_name quota_value warn_level
Variables
Variable Description
cluster_name NAS cluster name
quota_value Amount of container space the group can use, in MB, GB, or TB
Example
Specify a group quota and a warning level for a group:
> nas-cluster select NAS1 container select container1 group-quota create Qgroup
50GB 75%
Format
nas-cluster select cluster_name container select container_name group-quota
delete group_name
Variables
Variable Description
cluster_name NAS cluster name
group_name Name of the group for which you are deleting the quota
Format
nas-cluster select cluster_name container select container_name group-quota-
effective-rule select group_name show
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name container select container_name group-quota
modify group_name quota_value [warn_level]
Variables
Variable Description
cluster_name NAS cluster name
quota_value Amount of container space the group can use, in MB, GB, or TB
> nas-cluster select NAS1 container select container1 group-quota modify Qgroup
80GB 60%
Format
nas-cluster select cluster_name container select container_name group-quota
select group_name show
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name container select container_name group-quota
show [group_name]
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name container select container_name nfs-export
subcommand
Variables
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
create Creates an NFS export on the container
Format
nas-cluster select cluster_name container select container_name nfs-export
create export_name export_dir [parameters]
Variables
Variable Description
cluster_name NAS cluster name
Parameters
Parameter Description
client-IP address (Optional) IP address for client access to the export. The default is all
clients, or you can limit access to one specific IP address.
access read-only|read- (Optional) Permission for the export, either read-only or read-write
write (default).
If not specified, uses the clusterwide default value.
limit-size size (Optional) Limits the container size reported to clients to the specified
value (in MB, GB, TB).
If not specified, uses the clusterwide default value.
Examples
Create an NFS export for a container:
Format
nas-cluster select cluster_name container select container_name nfs-export
delete export_name
Variables
Variable Description
cluster_name NAS cluster name
Example
Delete an export from a container in the NAS cluster:
> nas-cluster select NAS_1 container sel container1 nfs-export delete export1
Format
nas-cluster select cluster_name container select container_name nfs-export
select export_name [parameters] | show
Variables
Variable Description
cluster_name NAS cluster name
directory export-dir Full path of the directory to export. The maximum length of the entire
directory path is 511 characters, including all slashes (/). The maximum
length of any individual directory name is 256 characters, including one
slash.
For example, the path can be /a/b/c/d/e/f/g/.... up to a total length of
511 characters, or reallylongdirectoryname/... where each directory
name (and one slash) is 256 characters, for a total of 511 characters,
including all slashes.
limit-size [size|none] Limits the container size reported to clients to the specified value (in
MB, GB, TB).
To remove a limit, specify none.
security-methods Associates one or more of the following security methods with the NAS
method1,method2,... container:
comma-separated list
sys UNIX style
krb5 Kerberos v5
krb5i Kerberos v5 integrity
krb5p Kerberos v5 privacy
Subcommand
Subcommand Description
show Displays information about the NFS export
Set the trusted users on an export to all users, and also (required) restrict the range of client IP addresses
that users can access:
Create only sys and krb5p security methods for the specified cluster and disable krb5 and krb5i:
> nas-cluster select NAS1 container select VOL1 nfs-export select NFS security-
methods sys,krb5p
Format
nas-cluster select cluster_name container select container_name nfs-export show
[export_name]
Variables
Variable Description
cluster_name NAS cluster name
Example
Display information about an NFS export:
Format
nas-cluster select cluster_name container select container_name quota-dir
create directory_name [hardLimit size [softLimit size]
Variables
Variable Description
cluster_name NAS cluster name
directory_name Full path for the quota directory rule. The maximum path length is 112
characters.
Parameters
Parameter Description
hardLimit size (Required) Sets a higher limit for quota directory usage and triggers an
error message when the limit is exceeded. This error prevents more
space from being used than the quota directory rule specifies.
The default unit is MB. If the size is specified in GB or TB, then the unit
must follow the value. For example: 2GB or 1TB
softLimit size (Optional) Sets a lower limit for directory quota usage and triggers a
warning message when the limit is exceeded.
The default unit is MB. If the size is specified in GB or TB, then the unit
must follow the value. For example: 2GB or 1TB
> nas-cluster select NAS_1 container select CON_2 quota-dir create /DIR_5
hardLimit 2GB
Format
nas-cluster select cluster_name container select container_name quota-dir
delete directory_name
Variables
Variable Description
cluster_name NAS cluster name
directory_name Full path for the quota directory rule. The maximum path length is 112
characters.
Example
Delete the quota directory rule for a directory in a NAS container:
> nas-cluster select NAS_1 container select CON_2 quota-dir delete /DIR_5
Format
nas-cluster select cluster_name container select container_name quota-dir
select directory_name modify hardLimit|softLimit
Variables
Variable Description
cluster_name NAS cluster name
Parameters
Parameter Description
hardLimit size Sets a higher limit for the quota directory and triggers an error message
when the limit is exceeded. This error prevents more space from being
used than the quota directory rule specifies.
The default size is MB. If the size is specified in GB or TB, then the size
must follow the value. For example: 2GB or 1TB
softLimit size Sets a lower limit for the quota directory and triggers a warning
message when the limit is exceeded.
The default size is MB. If the size is specified in GB or TB, then the size
must follow the value. For example: 2GB or 1TB
Example
Modify the quota directory rule for a directory by specifying a soft limit:
> nas-cluster select NAS_1 container select CON_2 quota-dir select /DIR_5
modify softLimit 1GB
Format
nas-cluster select cluster_name container select container_name quota-dir show
Variables
Variable Description
cluster_name NAS cluster name
Example
Display the quota directories for a NAS container. Quota usage indicates the quota currently used by a
quota directory.
Format
nas-cluster select cluster_name container select container_name quota-usage show
Variables
Variable Description
cluster_name NAS cluster name
Example
Display quota usage information for all users and groups using a NAS container:
Format
nas-cluster select cluster_name container select container_name rename new_name
Variables
Variable Description
cluster_name NAS cluster name
new_name New name for the container. Valid characters include letters, numbers,
and underscores. Names must begin with a letter or underscore.
Format
nas-cluster select cluster_name container select container_name replication
parameter
Parameters
Parameter Description
apply-access-config Applies the replication configuration from a source container to this
container
enable partner Enables replication on the container to the specified partner. Optionally
[destination] names the destination container.
To disable (delete) replication on a container, see partner select
outbound-nas-replication.
pause | resume Pauses or resumes replication of the container to the specified partner
partner_name
Subcommands
Subcommand Description
cancel Cancels an in-progress container replication
promote [keep-demote] Promotes the replica container. Optionally, specify one or both of the
[keep-dest-config] following parameters:
partner_name
keep-demote Applies the configuration from a source container
to this container.
keep-dest-config Keeps the original replica container
configuration. Opposite of the nas-cluster select container select
replication apply-access-config command.
Format
nas-cluster select cluster_name container select container_name schedule
subcommand
Variables
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
create Creates a snapshot schedule
Format
nas-cluster select cluster_name container select container_name schedule create
schedule_name parameters
Parameters
Parameter Description
type run_type Specifies when the schedule will run:
once
hourly
daily
start-time time Specifies when the schedule will start. For example: 6, 7AM, 08:30AM,
3:30PM, 23:00
end-time time Specifies when the schedule will end. For example: 6, 7AM, 08:30AM,
3:30PM, 23:00
The default is the time for start-time.
frequency frequency Specifies how often the schedule will run. For example: 5mins, 1hour,
90mins, 2hours
Does not apply if type is once.
start-date date Specifies the start date for a schedule in MM/DD/YY format. Default is
the date the schedule is created.
Does not apply if type is once.
end-date date Specifies the end date for a schedule in MM/DD/YY format. Default is no
end date.
Does not apply if type is once.
partner partner_name Applies only to replication schedules. Specifies the name of the partner
to which this replication schedule applies.
Format
nas-cluster select cluster_name container select container_name schedule delete
schedule_name
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name container select container_name schedule rename
schedule_name new_name
Variables
Variable Description
cluster_name NAS cluster name
schedule_name Current name of the schedule. If the schedule name contains spaces,
enclose the name in quotation marks (for example, schedule for daily
backups).
NOTE: You cannot create schedule names with spaces using the
CLI; however, you can in the GUI.
Format
nas-cluster select cluster_name container select container_name schedule select
schedule_name parameters
Variables
Variable Description
cluster_name NAS cluster name
NOTE: You cannot create schedule names with spaces using the
CLI; however, you can in the GUI.
Parameters
Parameter Description
enable|disable Enables or disables the selected schedule
start-time time Specifies when the schedule will start. For example: 6, 7AM, 08:30AM,
3:30PM, 23:00
end-time time Specifies when the schedule will end. For example: 6, 7AM, 08:30AM,
3:30PM, 23:00
The default is the time for start-time.
frequency frequency Specifies how often the schedule will run. For example: 5mins, 1hour,
90mins, 2hours
Does not apply if type is once.
end-date date Specifies the end date for a schedule in MM/DD/YY format. Default is no
end date.
Does not apply if type is once.
Format
nas-cluster select cluster_name container select container_name schedule show
[schedule_name]
Variables
Variable Description
cluster_name NAS cluster name
NOTE: You cannot create schedule names with spaces using the
CLI; however, you can in the GUI.
Format
nas-cluster select cluster_name container select container_name show
Example
Display information about a container.
Format
nas-cluster select cluster_name container select container_name size new_size
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name container select container_name smb-share
subcommand
Variables
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
create Creates an SMB share on the container
Format
nas-cluster select cluster_name container select container_name smb-share
create parameters share_name directory
Variables
Variable Description
cluster_name NAS cluster name
Parameters
Parameter Description
antivirus enable| Enables or disables antivirus detection on the SMB share
disable
avexcludedirs Specifies a path within the SMB share to exclude from antivirus scanning
directory_path
messageencryption Enables or disables making data transfers secure by encrypting data in-
enable|disable flight
Example
Create an SMB share on a directory:
> nas-cluster select NAS1 container select container1 smb-share create share1
/smbdir1
NOTE: The default antivirus exclude path is no longer available. Directory paths must already exist in
the SMB share before they can be excluded.
To exclude directory paths from antivirus scanning:
1. Create the SMB share without the exclude option. See the Dell EqualLogic Group Manager
Administrator's Guide for details.
2. Go to the SMB share and create the directory paths you want to exclude from the antivirus
scanning.
3. In the Group Manager GUI, modify the antivirus setting by specifying the file extensions and/or
directory paths to exclude.
CAUTION: Any default antivirus exclude path that you have set in previous versions will be lost.
Format
nas-cluster select cluster_name container select container_name smb-share
delete share_name
Variables
Variable Description
cluster_name NAS cluster name
Example
Delete an SMB share in a container:
Format
nas-cluster select cluster_name container select container_name smb-share
select share_name parameters
Variables
Variable Description
cluster_name NAS cluster name
messageencryption Enable or disable making data transfers secure by encrypting data in-
enable|disable flight
Examples
Displaying SMB Share Details
> nas-cluster select NAS1 container select container1 smb-share select SMB_1
show
___________________________ SMB Share Information ___________________________
Name: test Shared-Dir: /
SMB-Antivirus: disable SMB-FileExtensions:
SMB-ExcludeDirPaths:
______________________________________________________________________________
Exclude file extensions for graphics from antivirus scanning within an SMB share:
NOTE: The default antivirus exclude path is no longer available. Directory paths must already exist in
the SMB share before they can be excluded.
To exclude directory paths from antivirus scanning:
1. Create the SMB share without the exclude option. See the Dell EqualLogic Group Manager
Administrator's Guide for more details.
2. Go to the SMB share and create the directory paths you want to exclude from the antivirus
scanning.
3. In the Group Manager GUI, modify the antivirus setting by specifying the file extensions and/or
directory paths to exclude.
CAUTION: Any default antivirus exclude path that you have set in previous versions will be lost.
Format
nas-cluster select cluster_name container select container_name smb-share
select share_name continuousavailabilty enable|disable
Variables
Variable Description
cluster_name NAS cluster name
Example
Enable continuous availability on a share:
Format
nas-cluster select cluster_name container select container_name smb-share
select share_name messageencryption enable|disable
Variables
Variable Description
cluster_name NAS cluster name
Example
Enable traffic encryption while connected to a share:
Format
nas-cluster select cluster_name container select container_name smb-share show
[share_name]
Variables
Variable Description
cluster_name NAS cluster name
> nas-cluster select NAS1 container select sales smb-share show SMB_1
___________________________ SMB Share Information ___________________________
Name: SMB_1 Exported-Dir: /smbdir1new
______________________________________________________________________________
The following information is displayed with the advanced options for this command:
> nas-cluster select NAS1 container select sales smb-share select SMB_1 show
___________________________ SMB Share Information ___________________________
Name: SMB_1
Shared-Dir: /
AMB-Antivirus: disable
SMB-ThreatActionPolicy: quarantine
SMB-FileExtensions:
SMB-ExcludedDirPaths:
SMB-LargeFileSize: 3072MB
SMB-LargeFileOpenPolicy: denied
SMB-Access-Based_Enumeration: disable
SMB-Continuous-Availability: disable
SMB-Message-Encryption: disable
______________________________________________________________________________
Format
nas-cluster select cluster_name container select container_name snap-reserve
percent
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name container select container_name snap-warn
percent
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name container select container_name snapshot
subcommand
Variables
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
create-now Creates a snapshot of the container
Format
nas-cluster select cluster_name container select container_name snapshot create-
now snapshot_name
Variables
Variable Description
cluster_name NAS cluster name
Example
Create a snapshot of a container:
Format
nas-cluster select cluster_name container select container_name snapshot delete
snapshot_name
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name container select container_name snapshot rename
snapshot_name new_name
Variables
Variable Description
cluster_name NAS cluster name
Example
Rename a snapshot of a container:
Format
nas-cluster select cluster_name container select container_name snapshot select
snapshot_name subcommand
Variables
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
restore Restores the container from the selected snapshot
thin-clone create Creates a clone from the select snapshot. See nas-cluster select
container select snapshot select thin-clone create.
Examples
Display information about a snapshot of a container:
Format
nas-cluster select cluster_name container select container_name snapshot select
snapshot_name thin-clone create thin_clone_name [size]
Variables
Variables Description
cluster_name NAS cluster name
Example
Create a clone for the container based on the specified snapshot:
> nas-cluster select NASclstr1 container select c1 snapshot select snap1 thin-
clone create c1_snap1_clone
Format
nas-cluster select cluster_name container select container_name snapshot show
Variables
Variable Description
cluster_name NAS cluster name
Example
Display the snapshots for a container:
Format
nas-cluster select cluster_name container select container_name space-warn
percent%
Example
Set an in-use space warning percent for a container:
Format
nas-cluster select cluster_name container select container_name thin-clone show
Variables
Variables Description
cluster_name NAS cluster name
Example
Display the clones for a container:
Format
nas-cluster select cluster_name container select container_name thin-provision
disable
Variables
Variable Description
cluster_name NAS cluster name
Example
Disable thin provisioning on the specified container:
Format
nas-cluster select cluster_name container select container_name thin-provision
enable
Variables
Variable Description
cluster_name NAS cluster name
Example
Enable thin provisioning on the specified container:
Format
nas-cluster select cluster_name container select container_name thin-provision
enable thin-reserve [percent]%
Variables
Variable Description
cluster_name NAS cluster name
Example
Set the percentage of the reserve on the specified container:
If you are using an external server (such as Active Directory, LDAP, or NIS) to authenticate users and
groups on the destination cluster, quotas will be applied to the recovery container.
If you are using only local users and groups, quotas will not be applied.
If you are using both local users and groups and externally authenticated users and groups, user and
group quotas are applied for the externally authenticated accounts. Quotas will also be applied for the
local users and groups, but they might not be applied correctly.
For more information about this behavior, see the Dell EqualLogic Group Manager Administrator's Guide.
Format
nas-cluster select cluster_name container select container_name user-quota
subcommand
Subcommands
Subcommand Description
create Creates a quota for the specified user
show Displays the user quotas for the container or the specified user quota
Example
Display the user quotas for a NAS container:
Format
nas-cluster select cluster_name container select container_name user-quota
create user_name quota [percent]
Variables
Variable Description
cluster_name NAS cluster name
quota Quota size (amount of container space that the user can consume)
Format
nas-cluster select cluster_name container select container_name user-quota
delete user_name
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name container select container_name user-quota-
effective-rule select user_name show
Variables
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
select show Selects a user to display information about the quota applied to that
user based on the container's default user quota
Format
nas-cluster select cluster_name container select container_name user-quota
modify user_name quota_value warn_level
NOTE: You must enter a value for both the quota and the warning limit. To change one value
without changing the other, use the show command to display the current values (see nas-cluster
select container select user-quota). Then enter this command, specifying both the value that stays
the same and the value that changes. See the examples.
Variables
Variable Description
cluster_name NAS cluster name
Parameters
Parameter Description
quota_value Quota size (amount of container space the user can consume) in MB,
GB, or TB
warn_level Quota space warning limit (specified as a percentage of the quota size)
that, when reached, generates a warning. If not specified, no warning is
generated. The percent sign (%) is required.
Examples
Change the user quota for a user for a container in a NAS cluster. The new quota value for the user is
200GB, with a warning level of 75 percent. When the user consumes 75 percent of the quota, a warning
is generated.
> nas-cluster select NAS1 container select usr user-quota modify koala 200GB 75%
Change only the quota value, leaving the warning level as is. (First, use the show command to display the
current values if you are unsure.) In this example, the warning level stays at 75 percent, but the quota
value increases to 300GB for the user.
> nas-cluster select NAS1 container select usr user-quota modify koala 300GB 75%
> nas-cluster select NAS1 container select usr user-quota modify koala 300GB 60%
Format
nas-cluster select cluster_name container select container_name user-quota
select user_name show
Variables
Variable Description
cluster_name NAS cluster name
Example
Display the quota for a user for a NAS container:
> nas-cluster select NAS1 container select con34 user-quota select admin show
If you are using an external server (such as Active Directory, LDAP, or NIS) to authenticate users and
groups on the destination cluster, quotas will be applied to the recovery container.
If you are using only local users and groups, quotas will not be applied.
If you are using both local users and groups and externally authenticated users and groups, user and
group quotas are applied for the externally authenticated accounts. Quotas will also be applied for the
local users and groups, but they might not be applied correctly.
For more information about this behavior, see the Dell EqualLogic Group Manager Administrator's Guide.
Format
nas-cluster select cluster_name container select container_name useringroup-
quota subcommand
Subcommands
Subcommand Description
create Creates a quota for each user in a group
delete Deletes the individual user quota for the specified group
select show Displays the user-in-group quota for the specified group
Example
Display the user-in-group quotas for a container in a NAS cluster:
Format
nas-cluster select cluster_name container select container_name useringroup-
quota create group_name quota_value warn_level%
Variables
Variable Description
cluster_name NAS cluster name
warn_level% Quota space warning limit (specified as a percentage of the quota size)
that, when reached, generates a warning. If not specified, no warning is
generated.
Minimum 0% (default)
Maximum 99%
Examples
Create a user group for a container in a NAS cluster, and set the quota for all users in that group and a
warning level:
> nas-cluster select NAS1 container select usr useringroup-quota create group1
150GB 75%
Format
nas-cluster select cluster_name container select container_name useringroup-
quota delete group_name
Variables
Variable Description
cluster_name NAS cluster name
Example
Delete the user quotas for a group for a container in a NAS cluster:
> nas-cluster select NAS1 container select usr useringroup-quota delete group1
Format
nas-cluster select cluster_name container select container_name useringroup-
quota modify group_name quota_value warn_level
NOTE: You must enter a value for both the quota and the warning limit. To change one value
without changing the other, use the show command to display the current values (see nas-cluster
select container select useringroup-quota). Then enter this command, specifying both the value
that stays the same and the value that changes.
Variables
Variable Description
cluster_name NAS cluster name
group_name Name of the user group whose values you are changing
quota_value Quota size (amount of container space each user in the group can
consume) in MB, GB, or TB
warn_level% Quota space warning limit (specified as a percentage of the quota size)
that, when reached, generates a warning.
The percent sign (%) is required.
Examples
Change the quota value without changing the warning level. (First, use the show command to display the
current values if you are unsure.) In this example, the warning level stays at 75 percent, but the quota
value increases to 300GB for each user.
> nas-cluster select NAS1 container select users useringroup-quota modify sales
300GB 75%
Change the warning level without changing the quota value. (First, use the show command to display the
current values if you are unsure.) In this example, the quota value stays at 300GB, but the warning level
decreases to 60 percent per user.
> nas-cluster select NAS1 container select users useringroup-quota modify sales
300GB 60%
Format
nas-cluster select cluster_name container select container_name useringroup-
quota select group_name show
Variables
Variable Description
cluster_name NAS cluster name
Example
Display the user-in-group quotas for the specified group:
> nas-cluster select NAS1 container select usr useringroup-quota select grp1
show
Format
nas-cluster select cluster_name container show
Variable
Variable Description
cluster_name NAS cluster name
Name Size Used Space Snap Res Used Snap NFS SMB Data Red Clone Thin
---------- ------- ---------- -------- --------- --- ---- -------- ----- ----
c1 5GB 6MB 2.5GB 0MB 0 0 disable no N
Container1 10GB 3GB 5GB 0MB 0 1 disable no N
Container1 10GB 3GB 0MB 0MB 0 1 disable yes Y
Clone1
Container1 10GB 9GB 0MB 0MB 0 1 disable yes N
Clone2
Container1 10GB 1MB 5GB 0MB 0 0 disable yes N
Clone3
Format
nas-cluster select cluster_name controller subcommand
Variable
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
add Adds the controller with the specified service tag to the NAS cluster
show Displays information about all the controllers or the specified controller
Examples
Display information about all controllers in a NAS cluster:
Format
nas-cluster select cluster_name controller add service_tag
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name controller select controller_name subcommand
Subcommands
Subcommand Description
attach Attaches the NAS controller with the specified service tag to the NAS
cluster
client-connection show Displays the client connection for the NAS controller
detach Detaches the selected NAS controller from the NAS cluster, returning
the controller to a preconfigured state
disk show Displays disk information for the selected NAS controller
eth show Displays network (Ethernet) port information for the selected NAS
controller
power-supply show Displays power supply information for the selected NAS controller
Examples
Display general information about a NAS controller:
Format
nas-cluster select cluster_name controller select controller_name attach
service_tag subcommand
Variables
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
retry Retries the controller attach operation
Examples
Attach a controller with a service tag as a controller to a NAS cluster:
Format
nas-cluster select cluster_name controller select controller_name detach
Example
Detach a controller from a NAS cluster:
Format
nas-cluster select cluster_name controller select controller_name load show
[parameter]
Variables
Variable Description
cluster_name NAS cluster name
Parameter
Parameter Description
period current|day| Specifies the time period. If you do not specify a period, the command
week|month|year displays the current statistics.
Current Data is shown for a one-time interval.
Day Last 24 hours. Data is shown for each hour.
Week Last week. Data is shown every 6 hours in the last 7 days.
Month Last month. Daily for the last month.
Year Last year. Data is shown for every two weeks of the last year.
Example
Display current load statistics for the specified controller:
_______________________________________________________________________________
Period: current Controller: A
Format
nas-cluster select cluster_name controller select controller_name traffic show
[parameter]
Variables
Variable Description
cluster_name NAS cluster name
Parameters
Parameter Description
period current|day| Specifies the time period. If you do not specify a period, the command
week|month|year displays the current statistics.
Current Data is shown for a one-time interval.
Day Last 24 hours. Data is shown for each hour.
Week Last week. Data is shown every 6 hours in the last 7 days.
Month Last month. Daily for the last month.
Year Last year. Data is shown for every 2 weeks of the last year.
Example
Display current traffic statistics for the specified controller:
_______________________________________________________________________________
Period: current Controller: A
Timestamp: 2015-01-15:09:44:06 NFS Read MB/s: 0
NFS Write MB/s: 112 NDMP Read MB/s: 0
NDMP Write MB/s: 0 SMB Read MBs/s: 13
SMB Write MB/s: 5 Replication Read MB/s: 0
Replication Write MB/s: 0 Storage Subsystem Read MB/s: 34
Storage Subsystem Write MB/s: 258 Network Overhead Read MBs/s: 3
Network Overhead Write MBs/s: 13 Network Packet Drops: 0
NFS IOPS Read: 0 NFS IOPS Write: 3593
NFS IOPS Other: 0 SMB IOPS Read: 429
SMB IOPS Write: 208 SMB IOPS Other: 0
Total Primary MB/s: 149 Total Primary MB/s vs average: N/A
Total Secondary MB/s: 0
_______________________________________________________________________________
Format
nas-cluster select cluster_name credentials subcommand
Variable
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
create Configures Active Directory (AD), LDAP, or NIS for authentication
modify Enables you to add the preferred domain controller after joining AD
Format
nas-cluster select cluster_name credentials create AD|LDAP|NIS parameters
Variable
Variable Description
cluster_name NAS cluster name
NOTE: The NAS cluster name must be in the Domain Name Server.
domain-netbiosname (Optional) Specifies the domain NetBIOS to which the user belongs
name
domain-controller name (Optional) Specifies the domain controller running the Active Directory
service
LDAP Parameters
Parameter Description
server_name LDAP server name
For example:
'cn=username,ou=org_unit,dc=company,dc=com
extended-schema Supports extended schema when using LDAP with Active Directory. Also
used by FluidFS to authenticate that the LDAP server is the server to use.
The default is not to use extended schema.
For more information about using distinguished names, see Formatting Distinguished Names.
NIS Parameters
Parameter Description
domain_name NIS domain name. Valid characters include letters, numbers, and
underscores. Names must begin with a letter or an underscore.
Examples
Create Active Directory credentials:
> nas-cluster select NAS1 credentials create AD NAS1 EQLDOM1 AdmJim JiM123456
Formats
nas-cluster select cluster_name credentials delete auth_method
auth_method Authentication method that you want to delete: AD, LDAP, or NIS
Example
Delete the credentials for the LDAP configuration:
Format
nas-cluster select cluster_name credentials modify ad-preferred-dc ?|dc_list
Variables
Variable Description
cluster_name NAS cluster name
dc_list The new list for the Active Directory preferred domain controllers. This
list can consist of IP addresses or host names separated by commas.
The maximum list size is 127 characters.
NOTE: You can include both IP addresses and host names for the
preferred DC list within the same command line.
Parameter
Parameter Description
? Lists the Active Directory preferred domain controllers
Examples
Replace the existing preferred DC list with a new preferred DC list of IP addresses:
Replace the existing preferred DC list with a new preferred DC list of host names:
Formats
nas-cluster select cluster_name credentials select AD enable|disable
Variable
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name data-reduction schedule subcommand
Variable
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
create Creates a data reduction schedule
Format
nas-cluster select cluster_name data-reduction schedule create schedule_name
parameters
Variables
Variable Description
cluster_name NAS cluster name
Parameters
Parameter Description
days Days of the week that the schedule will run. For example: Sat,Sun,Mon
start-time Schedule starting time. For example: 7AM, 08:30AM, 3:30PM, 23:00
end-time End time for the schedule. For example: 7AM, 08:30AM, 3:30PM, 23:00
Example
Create a data reduction schedule that runs once a week.:
> nas-cluster select NAS1 data-reduction schedule create dr1 days Mon start-
time 7AM end-time 9PM
Schedule creation succeeded.
Format
nas-cluster select cluster_name data-reduction schedule delete schedule_name
Variables
Variable Description
cluster_name NAS cluster name
Example
Delete a data reduction schedule:
If command confirmation is enabled, you are prompted to confirm that you want to delete the schedule.
See cli-settings.
Format
nas-cluster select cluster_name data-reduction schedule rename schedule_name
new_name
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name data-reduction schedule select schedule_name
parameters
Variables
Variable Description
cluster_name NAS cluster name
Parameters
Parameter Description
days days Days of the week that the schedule will run. For example: Sat,Sun,Mon
end-time time Ending time for the schedule. For example: 7AM, 08:30AM, 3:30PM,
23:00
start-time time Schedule starting time. For example: 7AM, 08:30AM, 3:30PM, 23:00
Subcommands
Subcommand Description
disable Disables the selected schedule
Examples
Enable a data reduction schedule:
Formats
nas-cluster select cluster_name def-access-security access_type
Variables
Variable Description
cluster_name NAS cluster name
access_type Specifies the default file access security policy. Options are:
mixed
ntfs (default)
unix
Example
Set the default file access security policy for new containers:
Format
nas-cluster select cluster_name def-available-space-warn
container_size_percentage
Variables
Variable Description
cluster_name NAS cluster name
container_size_percent Percentage of the container size. The cluster default value is 10 percent;
age 0 percent means it is disabled.
Format
nas-cluster select cluster_name def-data-reduction parameter
Variable
Variable Description
cluster_name NAS cluster name
Parameters
Parameter Description
access-time-filter nn Excludes files by the last time they were accessed, from 30 to 365 days.
Files that have been accessed between 0 and the specified number of
days are not subject to data reduction.
modify-time-filter nn Excludes files by the last time they were modified, from 30 to 365 days.
Files that have been modified between 0 and the specified number of
days are not subject to data reduction.
Example
Configure the default data reduction policy to exclude files that have been accessed within the past 45
days:
Format
nas-cluster select cluster_name def-dir-permission octal_value
octal_value 3-digit octal permission value for the directory, such as 644 or 755
Example
Set the default directory permission for new containers:
Format
nas-cluster select cluster_name def-file-permission octal_value
Variables
Variable Description
cluster_name NAS cluster name
octal_value 3-digit octal permission value for the files, such as 644 or 755
Example
Set the default file permission for new containers:
Format
nas-cluster select cluster_name def-gateway ip_address
ip_address IP address for the default gateway for the NAS cluster in dotted-quad
notation (for example, 192.0.2.36)
Example
Configure the default gateway for a NAS cluster:
Format
nas-cluster select cluster_name def-nfs-permission permission
Variables
Variable Description
cluster_name NAS cluster name
Example
Set the default permissions for new NFS exports:
Format
nas-cluster select cluster_name def-nfs-trusted-users trusted_users
Example
Set the default trusted users setting for new NFS exports:
Format
nas-cluster select cluster_name def-smb-access-based-enum enable|disable
Variable
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
enable Enables access-based enumeration t during the SMB share create
operations
Formats
nas-cluster select cluster_name def-smb-antivirus enable|disable
Example
Enable the default antivirus service for new containers:
Format
nas-cluster select cluster_name def-smb-avexcludedirs dir_paths
Variables
Variable Description
cluster_name NAS cluster name
Example
Exclude directories from antivirus scanning:
Format
nas-cluster select cluster_name def-smb-avextensions extensions
Example
Add a list of image file extensions to exclude from antivirus scanning:
(To change the list of file extensions to exclude, reenter the command with a new comma-separated list
of extensions.)
Format
nas-cluster select cluster_name def-snap-reserve n%
Variables
Variable Description
cluster_name NAS cluster name
Example
Set the default snapshot space reserve amount for new containers:
Format
nas-cluster select cluster_name def-snap-warn n%
Variables
Variable Description
cluster_name NAS cluster name
Example
Set the default snapshot space warning value for new containers:
Format
nas-cluster select cluster_name def-space-provision thin|thick
Variable
Variable Description
cluster_name NAS cluster name
Parameter
Parameter Description
thick|thin Specifies thin or thick space provisioning
Format
nas-cluster select cluster_name def-space-warn n%
Variables
Variable Description
cluster_name NAS cluster name
Example
Set the default in-use space warning value for new containers:
Format
nas-cluster select cluster_name def-thin-reserve container_size_percentage
Variables
Variable Description
cluster_name NAS cluster name
NOTE: To retrieve the diagnostic data from the NAS cluster, you must enable FTP service. See nas-
cluster select ftp-service.
Format
nas-cluster select cluster_name diagnostics subcommand
Variable
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
show Displays the diagnostic state of the NAS cluster
start-performance Starts NAS container performance diagnostics for the specified NAS
container
Format
nas-cluster select cluster_name diagnostics show
Example
Display the diagnostic state of the NAS cluster:
Format
nas-cluster select cluster_name diagnostics start-client remote_ip_address [NFS|
SMB] case_number
Variables
Variable Description
cluster_name NAS cluster name
Parameter
Parameter Description
NFS|SMB Diagnostics for either NFS protocol or SMB protocol.
Format
nas-cluster select cluster_name diagnostics start-file [case_number]
Format
nas-cluster select name diagnostics start-general [case_number]
Variables
Variable Description
name NAS cluster name
Format
nas-cluster select cluster_name diagnostics start-network ip_address
[case_number]
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name diagnostics start-nfs remote_ip_address
container_name export_name [case_number]
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name diagnostics start-performance container_name
[case_number]
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name diagnostics start-protocols [case_number]
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name diagnostics start-smb remote_ip_address
share_name path case_number
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name diagnostics start-smb-homeshare
remote_ip_address homeshare_user_name file_path case_number
Variables
Variable Description
cluster_name NAS cluster name
homeshare_user_name Home share user name. Identifies which home share user cannot
access files. For example: DOMAIN\edugan
Example
Start diagnostics on an SMB home share from an SMB client, and assign the diagnostics a case number:
Format
nas-cluster select cluster_name failback subcommand [container_name]
Variables
Variable Description
cluster_name NAS cluster name
Formats
nas-cluster select cluster_name fs-scan-rate scan_rate
Variables
Variable Description
cluster_name NAS cluster name
Example
Set the file-system scan rate:
Format
nas-cluster select cluster_name ftp-service enable|disable
Examples
Enable FTP service for a NAS cluster:
Format
nas-cluster select cluster_name initialize-cluster [subcommand]
Variable
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
continue Continues the NAS cluster initialization, ignoring any errors
Format
nas-cluster select cluster_name local-group subcommand
Variable
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name local-group create group_name [gid]
Variables
Variable Description
cluster_name NAS cluster name
Example
Create a local group in a NAS cluster:
Format
nas-cluster select cluster_name local-group delete group_name
Example
Delete a local group in a NAS cluster:
Format
nas-cluster select cluster_name local-group select group_name show
Variables
Variable Description
cluster_name NAS cluster name
Example
Display information about a local group:
Variables
Variable Description
cluster_name NAS cluster name
Example
Display information about a local group:
Format
nas-cluster select cluster_name local-user subcommand
Variable
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
create Creates a local user
Format
nas-cluster select cluster_name local-user create user_name password
primary_group [parameters]
Variables
Variable Description
cluster_name NAS cluster name
password Password for the local user. Local user passwords must contain
between 7 and 239 ASCII characters.
primary_group Primary group for the local user. This group's name can contain up to
16 alphanumeric characters, spaces, periods, underscores, or hyphens.
The first character must be a letter or a number. Consecutive periods
and consecutive spaces are not allowed in the group name.
Parameters
Parameter Description
contact name (Optional) Contact name for the local user, up to 127 ASCII characters
description text (Optional) Description for the local user, up to 127 ASCII characters
group-list list (Optional) List of additional groups for the local user, up to five (5) group
names. Group names can contain up to 16 alphanumeric characters,
spaces, periods, underscores, or hyphens. The first character must be a
letter or a number. A name cannot contain consecutive spaces or
consecutive periods.
If any group name includes a space, all of the group names must be
enclosed in quotation marks and separated by commas but not spaces
(for example: Lab-Users,Lab,Local Users).
uid user_id (Optional) User ID for the local user. Use this parameter to recreate a
local user from a previously defined user ID (if the original was
accidentally deleted). User IDs are generated automatically by the
system.
> nas-cluster select spark2 local-user create Ravi QA contact "Ravi Prasad"
group-list "Lab-Users,Lab,Local Users"
Format
nas-cluster select cluster_name local-user delete user_name
Variables
Variable Description
cluster_name NAS cluster name
Example
Delete a local user in a NAS cluster:
Format
nas-cluster select cluster_name local-user modify user_name parameters
Variables
Variable Description
cluster_name NAS cluster name
group-list list Modifies the list of groups for the local user. The list can include up to
five (5) group names, separated by commas and no spaces.
Example
Change the password, primary group, contact information, description, and list of groups for a user:
Format
nas-cluster select cluster_name local-user select user_name show
Variables
Variable Description
cluster_name NAS cluster name
Example
Display information about a local user in a NAS cluster:
Format
nas-cluster select cluster_name local-user show user_name
Variables
Variable Description
cluster_name NAS cluster name
Example
Display information about a local user in a NAS cluster:
This command is effective only if it is used within 10 minutes of restoring a controller. The command
disconnects any clients that were previously connected to the failed controller but have since
reconnected to other controllers after the failure. When those clients reconnect to the NAS cluster, the
automatic balancer distributes them evenly among all the functioning controllers.
If two controllers in different controller pairs fail, this command will disconnect all the clients that were
previously connected to each of the failed controllers.
NOTE: If both controllers in a pair fail, the entire NAS cluster is down. This command does not
restore the NAS cluster.
Format
nas-cluster select cluster_name mass-failback
Variable
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name mass-rebalance
Variable
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name max-supported-nfs-version nfs-v3|nfs-v4|nfs-v41
Variable
Variable Description
cluster_name NAS cluster name
Example
Upgrade from the default NFS protocol version to the maximum supported NFS version:
Format
nas-cluster select cluster_name ndmp subcommand
Variable
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
dma-server-list Lists IP addresses for the DMA servers
username Configures the NDMP service user name to enable the NAS cluster to
support backups
Format
nas-cluster select cluster_name ndmp dma-server-list ip_address,...
Variables
Variable Description
cluster_name NAS cluster name
ip_address One to three IP addresses for DMA servers, separated by commas and
no spaces
Format
nas-cluster select cluster_name ndmp passwd
Variable
Variable Description
cluster_name NAS cluster name
Example
Enter a password for an NDMP service:
Format
nas-cluster select cluster_name ndmp port port_number
Variables
Variable Description
cluster_name NAS cluster name
port_number Port number (up to five digits) for the NDMP service.
Use the port number configured by your IT personnel for the firewall.
Format
nas-cluster select cluster_name ndmp show
Variable
Variable Description
cluster_name NAS cluster name
Example
Display the NDMP service configuration for a NAS cluster:
Format
nas-cluster select cluster_name ndmp start
Variable
Variable Description
cluster_name NAS cluster name
Example
Start NDMP service for a NAS cluster:
Format
nas-cluster select cluster_name ndmp stop
Variable
Variable Description
cluster_name NAS cluster name
Example
Stop NDMP service for a NAS cluster:
Format
nas-cluster select cluster_name ndmp username user_name
Variables
Variable Description
cluster_name NAS cluster name
user_name User name for the NDMP service, up to 63 ASCII characters and
underscores
Example
Configure a user name for the NDMP service:
Format
nas-cluster select cluster_name network subcommand
Variable
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
create Configures the client and SAN networks in the NAS cluster
create client- Configures a secondary client subnet for the NAS cluster
secondary
Format
nas-cluster select cluster_name network create network_type parameters
Variables
Variable Description
cluster_name NAS cluster name
NOTE: You must create client and SAN networks, but a secondary
client network is not mandatory.
netmask Specifies the netmask for the client network. For example, to specify
255 addresses in the 192.0.2.23 network, enter a netmask of
255.255.255.0.
Examples
Create a client network for the NAS cluster:
Format
nas-cluster select cluster_name network create client-secondary
client_secondary_name cluster_ip_list netmask controller_ip_list [vlan]
netmask Netmask
vlan (Optional) Configures the VLAN to the subnet. The default value is zero.
Format
nas-cluster select cluster_name network delete client_secondary_name
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name network select network_type parameters
subcommand
Variables
Variable Description
cluster_name NAS cluster name
bonding-mode mode Bonding mode for the client network, either alb or lacp
cluster-ip-list Management IP address for the SAN network, or the list of NAS cluster
cluster_ip_list IP addresses for the client network
mtu mtu_size Maximum transfer unit (MTU) size for the selected network, either 1500
or 9000
Subcommands
Subcommand Description
apply-changes Applies the network modifications to the NAS cluster. If you use this
subcommand with any other subcommands, this subcommand must be
the last one specified for the modifications to take effect.
cancel-changes Cancels the network modifications that were not applied using the
apply-changes subcommand.
show Displays information about the selected network. Use this subcommand
alone in the command line.
Example
Select a client network and set the bonding mode and the MTU size:
> nas-cluster select NAS_1 network select client bonding-mode lacp 1500
Format
nas-cluster select cluster_name network select client_secondary_name apply-
changes
Format
nas-cluster select cluster_name network select cancel-changes
Variable
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name network select client_secondary_name cluster-ip-
list cluster_ip_list
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name network select network_type controller select
controller_name subcommand
Subcommands
Subcommand Description
controller-ip-addr- For the selected network, specifies a comma-separated list of IP
list addresses for the selected NAS controller
Example
The following commands configure the controller IP address list for both controllers in the client network
for a NAS cluster:
> nas-cluster select NAS_1 network select client controller select controller0
controller-ip-addr-list 192.0.2.28
> nas-cluster select NAS_1 network select client controller select controller1
controller-ip-addr-list 192.0.2.33
Format
nas-cluster select cluster_name network select client_secondary_name controller
select controller_name controller-ip-addr-list controller_ip_address-list
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name network select client_secondary_name controller
select controller_name show
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name network select client_secondary_name netmask
netmask_name
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name network select client_secondary_name show
If your network has multiple subnets, and more than one of them is routed.
To gain efficiency if your network has multiple routers and you can access different subnets through
different gateways. In this case, use this command to prevent routers from redirecting packets by
defining which subnets are behind the different gateways.
To load balance the network traffic when all subnets are accessible from all gateways.
Only the default group administration account, grpadmin, can add or delete static routes. Use of this
command is recorded in the audit logs and the output of the save-config command for the group.
This command is available only in the CLI, and only on PS Series groups running firmware version 7.0 or
higher, with FluidFS firmware version 3.0 or higher.
NOTE: Under normal circumstances, you will not need to create static routes. This command is
provided to help you resolve topology problems in your network.
Format
nas-cluster select cluster_name network select network_type static-route
subcommand
Variables
Variable Description
cluster_name NAS cluster name
network_type Type of network that you are selecting. Options are san and client.
Subcommands
Subcommand Description
add Adds a static route to the client interface route table
delete Deletes a static route from the client interface route table. To change an
entry, delete the route and then re-add it.
Format
nas-cluster select cluster_name network select network_type static-route add
destination mask gateway
Variables
Variable Description
cluster_name NAS cluster name
network_type Type of network to which you are adding a static route. Options are san
and client.
Example
Adds a static route for the SAN network for a NAS cluster:
> nas-cluster select NAS_1 network select san static-route add 192.0.2.40
255.255.255.0 192.0.2.51
Format
nas-cluster select cluster_name network select network_type static-route delete
destination
Variables
Variable Description
cluster_name NAS cluster name
network_type Type of network from which you are deleting a static route. Options are san
and client.
Example
Deletes the destination IP address from the static route for the SAN network for a NAS cluster:
> nas-cluster select NAS_1 network select san static-route delete 192.0.2.50
Format
nas-cluster select cluster_name network select network_type static-route show
Variables
Variable Description
cluster_name NAS cluster name
network_type Type of network you are selecting to display. Options are san and
client.
Example
Displays the static route entry table for the SAN network for a NAS cluster:
Format
nas-cluster select cluster_name network select client_secondary_name vlan vlan
vlan VLAN associated with the specified secondary client subnet. Valid values
are 0 to 4094. Use 0 for untagged traffic.
Format
nas-cluster select cluster_name nfsv4-mode enable|disable
Variable
Variable Description
cluster_name NAS cluster name
Examples
Enable NFS v4 mode for the NAS cluster:
Format
nas-cluster select cluster_name operation subcommand
Variable
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name replicate-to-partner subcommand
Variable
Variable Description
cluster_name NAS cluster name
Subcommands
Subcommand Description
retry Retries a replication operation for a specified container
Examples
Display all in-progess container replication operations for a NAS cluster:
Formats
nas-cluster select cluster_name resize nas_reserve
nas-cluster select cluster_name resize retry
Variables
Variable Description
cluster_name NAS cluster name
Subcommand
Subcommand Description
retry Retries the NAS reserve resize operation
NOTE: Use this command only with a PS Series group running firmware version 7.0 or higher with a
NAS cluster running FluidFS version 3.0 or higher.
Formats
nas-cluster select cluster_name service-mode parameter
Variable
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name show parameter
Variable
Variable Description
cluster_name NAS cluster name
Parameters
Parameter Description
AD Displays the Active Directory configuration
credentials Displays the credentials that are configured in the NAS cluster
Examples
Display information about the NAS cluster:
Critical conditions::
Warning conditions::
NAS controller power supply status is not redundant.
______________________ NAS Antivirus Server Information _______________________
_______________________________________________________________________________
Antivirus Hosts::
Eqlspartan11>
Format
nas-cluster select cluster_name show credentials
Variable
Variable Description
cluster_name NAS cluster name
Example
Display the credential database information for the specified cluster:
Format
nas-cluster select cluster_name smb-home-share create container_name
path_prefix parameters
Variables
Variable Descriptions
cluster_name NAS cluster name
Parameters
Parameter Description
path-template The domain-user option specifies that the share is automatically
domain_user|user generated for users on one or more Windows domains. This option is
the default setting.
The user option can be used for either a single Windows domain or
when the users are in a Windows Workgroup.
antivirus enable| Specifies whether or the home share will be set for antivirus scanning
disable
avlargefilesize size Specifies an unsigned integer value to exclude files that are larger than
this size from being scanned for viruses. The value is a number of
megabytes that must fit within 4 bytes (that is, it must be a 4-digit
number). The default value is 1500.
Example
Create an SMB home share for users that are in a Windows Workgroup or for a single window domain:
> nas-cluster select NAS_1 smb-home-share create s10fs1 /home path-template user
NOTE: The default antivirus exclude path is no longer available. Directory paths must already exist in
the SMB home share before they can be excluded.
To exclude directory paths from antivirus scanning:
avexcludedirs extension_list
avextensions directory_list
avlargefilesize size
Format
nas-cluster select cluster_name smb-home-share delete
Variable
Variable Desription
cluster_name NAS cluster name
Example
Disable SMB home shares for the specified cluster:
Format
nas-cluster select cluster_name smb-home-share modify parameter
Variable
Variable Description
cluster_name NAS cluster name
Parameters
Parameter Description
accessbasedenum Specifies whether or not access-based enumeration will display only
enable|disable the files and folders that a user has permission to access in the shared
folder
antivirus enable| Specifies whether or not the home share will be set for antivirus
disable scanning
avlargefilesize size Specifies an unsigned integer value to exclude files that are larger than
this size from being scanned for viruses. The value is a number of
megabytes that must fit within 4 bytes (that is, it must be a 4-digit
number). The default value is 1500MB.
avlargefileopen deny| Enables or disables user access to files that are larger than the size of
allow the files specified by avlargefilesize and were not scanned.
homefolderautocreate Enables or disables automatic creation of the home folder. The default
enable|disable is disable.
Examples
Modify an SMB home share to enable automatic home folder creation:
Modify an SMB home share to exclude files larger than 1750MB from being scanned for viruses.
avexcludedirs extension_list
avextensions directory_list
avlargefilesize size
Format
nas-cluster select cluster_name smb-home-share show
Variable
Variable Description
cluster_name NAS cluster name
Example
Display the SMB home share details for a NAS cluster:
If SMB home shares are not enabled, the following text is displayed:
Format
nas-cluster select cluster_name smb-protocol maxsupportedversion smb-v1|smb-v2|
smb-v3
Variable
Variable Description
cluster_name NAS cluster name
Example
Set the SMB protocol:
Format
nas-cluster select cluster_name smb-protocol message-encryption enable|disable
Variable
Variable Description
cluster_name NAS cluster name
Example
Require encryption for traffic while connected to a share on a NAS cluster:
Format
nas-cluster select cluster_name smb-protocol message-signing enable|disable
Variable
Variable Description
cluster_name NAS cluster name
Example
Require signing for traffic while connected to a share on a NAS cluster:
Format
nas-cluster select cluster_name smb-protocol ntlm-config ntlm-set-name
cluster_name|controller_name|
Variables
Variable Description
cluster_name NAS cluster name to use as the NetBIOS server name
Example
Set the cluster name as the NetBIOS server name:
Format
nas-cluster select cluster_name smb-protocol ntlm-config show
Variable
Variable Description
cluster_name NAS cluster name
Example
Display the current NTLM configuration:
Format
nas-cluster select cluster_name smb-protocol show
Variable
Variable Description
cluster_name NAS cluster name
Example
Display the current configuration for the SMB maximum supported version.
Format
nas-cluster select cluster_name traffic show [parameter]
Variable
Variable Description
cluster_name NAS cluster name
Parameter
Parameter Description
period current|day| Specifies the time period. If you do not specify the period, the
week|month|year command displays the current statistics.
Current Data is shown for a one-time interval.
Day Last 24 hours. Data is shown for each hour.
Week Last week. Data is shown every 6 hours in the last 7 days.
Month Last month. Daily for the last month.
Year Last year. Data is shown for every 2 weeks of the last year.
Example
Display current traffic statistics for the specified cluster:
_______________________________________________________________________________
Period: current Timestamp: 2015-01-15:09:42:45
NFS Read MB/s: 0 NFS Write MB/s: 112
NDMP Read MB/s: 0 NDMP Write MB/s: 0
SMB Read MBs/s: 56 SMB Write MB/s: 36
Replication Read MB/s: 0 Replication Write MB/s: 21
Storage Subsystem Read MB/s: 279 Storage Subsystem Write MB/s: 368
Network Overhead Read MBs/s: 2 Network Overhead Write MBs/s: 16
Network Packet Drops: 0 NFS IOPS Read: 0
NFS IOPS Write: 3593 NFS IOPS Other: 10
SMB IOPS Read: 1763 SMB IOPS Write: 928
SMB IOPS Other: 4 Total Primary MB/s: 251
Total Secondary MB/s: 0
_______________________________________________________________________________
Variables
Variable Description
cluster_name NAS cluster name
search_string Terms to use for searching for users in the NIS database
Example
Search for specific users in the NIS database for a NAS cluster:
The Dell FluidFS firmware kit is available on the support site. To download it to the NAS cluster
controllers, you must enable FTP service on the NAS cluster (see nas-cluster select ftp-service).
Download the NAS service pack to all the appliances or controllers in the NAS cluster.
Formats
nas-cluster select cluster_name update start service_pack
Variables
Variable Description
cluster_name NAS cluster name
service_pack File name of the NAS service pack update script. For example:
DellFluidFS-3.0.7862-SP.sh
Example
This example shows all the steps involved in updating the FluidFS firmware on all controllers in a NAS
cluster.
1. Enable FTP service on the cluster so that you can download the service pack to the controllers:
> nas-cluster select NASCLU1 ftp-service enable
a. Open a telnet window and log in to the NAS cluster management IP address that you identified
in step 2, specifying port 44421:
#ftp 192.0.2.35 44421
Connected to 192.0.2.35.
220-This is system maintenance FTP service
220-======================================
220-
220-Use this service to download diagnostic files and to upload signed
220-service-pack packages.
220-
220
b. When promtped, enter the grpadmin account name and password:
Name (192.0.2.35:user): grpadmin
331 Please specify the password.
Password:
c. Change to the servicepack directory:
ftp> cd servicepack
d. Use FTP to put the service pack in the servicepack directory:
ftp> put DellFluidFS-3.0.7862-SP.sh
local: DellFluidFS-3.0.7862-SP.sh remote: DellFluidFS-3.0.7862-SP.sh
200 PORT command successful. Consider using PASV.
150 Ok to send data.
1830647467 bytes sent in 266.15 secs (6717.0 kB/s)
e. Exit the FTP utility.
4. In the Group Manager CLI session, start the update:
> nas-cluster select NASCLU1 update start DellFluidFS-3.0.7862-SP.sh
5. Monitor the update status:
> nas-cluster select NASCLU1 operation show
6. When the update is complete, run the mass rebalance command to rebalance all the SMB
connections between the NAS controllers:
> nas-cluster select NASCLU1 mass-rebalance
See Also
nas-cluster select ftp-service
nas-cluster select mass-rebalance
Formats
nas-cluster select cluster_name user-mapping subcommand
Subcommands
Subcommand Description
automatic Enables or disables user mapping
show Displays all the user mappings or the specified user mapping
Format
nas-cluster select cluster_name user-mapping automatic enable|disable
[guestmapping enable|disable]
Variable
Variable Description
cluster_name NAS cluster name
Subcommand
Subcommand Description
guestmapping enable| (Optional) Enables or disables guest mapping for unmapped users
disable
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name user-mapping delete mapping_source_username
Variables
Variable Description
cluster_name NAS cluster name
Format
nas-cluster select cluster_name user-mapping show [mapping_source_username]
nas-cluster show
Displays all NAS clusters in the group or details about a specific NAS cluster.
Format
nas-cluster select cluster_name show
Variable
Variable Description
cluster_name NAS cluster name
Examples
Display basic information about the NAS cluster in the group:
Format
nfs-export select nfs_export_name access subcommand
Variable
Variable Description
nfs_export_name Name of the NFS export
Subcommands
Subcommand Description
create Creates the user access to the NFS export
show Displays a list of all the ACLs on the specified NFS export
Formats
nfs-export select nfs_export_name access create netgroup netgroup_name trusted-
user trusted_user
nfs-export select nfs_export_name access create client-ip ip_netmask trusted-
user trusted_user
Parameters
Parameter Description
netgroup netgroup_name Name of the netgroup
Format
nfs-export select nfs_export_name access delete access_number
Variables
Variable Description
nfs_export_name Name of the NFS that the ACL number is assigned to
Formats
nfs-export select nfs_export_name access select access_number client-ip
ip_netmask trusted-user trusted_user
nfs-export select nfs_export_name access select access_number netgroup
netgroup_name trusted-user trusted_user
Parameters
Parameter Description
client-ip ip_netmask IP netmask
Format
nfs-export select nfs_export_name access show
Variable
Variable Description
nfs_export_name NFS export name
nsfv4-mode
Enables or disables nsfv4-mode for NAS clusters.
Format
nsfv4-mode [enable|disable]
Example
Enable or disable nsfv4-mode for NAS clusters:
> nfsv4-mode
enable - Enables NFSv4 mode.
disable - Disables NFSv4 mode.
> nfsv4-mode enable
> nfsv4-mode disable
To replicate volume data, you must configure two groups as replication partners. Each group plays a role
in the replication operation:
The group where the original volume is stored is the primary group. The direction of the replication is
outbound from the primary group.
The group where the volume replicas are stored is the secondary group. The direction of the
replication is inbound to the secondary group. If a disaster occurs on the primary group, you can
recover data from the replica set on the secondary group.
NOTE: This command does not apply when configuring synchronous replication for a volume.
Synchronous replication is the process of replicating a volume to a different pool in the same group.
For more information, see the Dell EqualLogic Group Manager Administrator's Guide.
1. Set up a replication partnership between two groups. Log in to each group and configure the other
group as a replication partner. The secondary group (the group that will be storing replicas) must
delegate space to the primary group.
See partner create.
2. Enable a volume for replication.Select each volume to replicate and specify the replication partner
that will store the replicas, the portion of delegated space to reserve for storing the replicas (replica
reserve), and the amount of space on the primary group to reserve for use during replication and,
optionally, to store the failback snapshot (local replication reserve).
See volume select replication.
3. Create a replica at the current time (or set up a replica schedule). Specify how to transfer the volume
data: either over the network (default) or by using manual transfer replication. The first replica is a
complete copy of the volume data. Subsequent replicas contain only the data that changed since
the previous replica.
See volume select replication create-replica.
For detailed information about replication, see the Dell EqualLogic Group Manager Administrator's Guide.
Format
partner subcommand
Subcommands
Subcommand Description
create Creates a partner
partner create
Sets up a replication partnership between two groups. You can configure volume replication (the default),
NAS replication, or both, to the same partner.
Before configuring a partner, make sure that all members of both groups have network connectivity.
NOTE: The partner create command must be run on both the primary group and the secondary
group.
Partner group name and group IP address, in either IPv4 or IPv6 format, as appropriate.
Passwords for mutual authentication. Replication between groups cannot occur until the reciprocal
passwords are set on both groups.
An inbound password is required, which allows the partner to replicate to the primary group. The
inbound password for the secondary group is the outbound password from the primary group. If the
secondary group will also replicate back to the primary group, you must enter the outbound
password (which is the inbound password on the primary group).
For volume replication, amount of space to delegate to the partner. Delegated space is automatically
taken from free pool space and can only be used to store replica sets from the partner.
When you configure a volume to replicate to a partner, you specify the portion of delegated space to
store the volumes replica sets (the replica reserve). See the Dell EqualLogic Group Manager
Administrator's Guide for more information about calculating the appropriate amount of delegated
space and replica reserve.
Replication is supported between partners as long as they use a common Internet Protocol, as follows:
If both partners are using only IPv4 addressing or only IPv6 addressing, replication is supported. This
setup means that each partner has only one group IP address configured and their addresses use the
same protocol.
The two groups configured as replication partners do not communicate until replication is enabled on a
volume or NAS container, or a replication operation is attempted. Therefore:
You will not know about password or configuration problems until replication is enabled on a volume
or NAS container. If you receive a login error message, make sure the reciprocal passwords on the
partners agree.
Delegated space will not be shown in the CLI output until a volume replication starts.
If you increase the size of a replicated volume, the secondary group will not update the information
until the next replication starts.
After creating a replication partnership between two groups, you can log in to the group where the
volume or NAS container is stored (the primary group) and enable replication on the volume or container.
See volume select replication enable and nas-cluster select container select replication. Then, you can
create replicas.
Formats
partner create partner_name ipaddress ipv4address parameters...
partner create partner_name ipv6address ipv6address parameters...
Variable
Variable Description
partner_name Partner group name
Parameters
Parameter Description
ipaddress ipv4address Group IP address of the partner in IPv4 format
contact name (Optional) Name of the person responsible for the partner, up to 63
ASCII characters. If the name contains spaces, enclose it in quotation
marks (for example, M Chenille).
email email_address (Optional) Email address, up to 63 ASCII characters, for the person
responsible for the partner group
mobile number (Optional) Mobile phone number (up to 31 ASCII characters) for the
person responsible for the partner. Note: If you use a #, make sure it is
inside quotation marks (for example: "test#test"). Otherwise, characters
that follow the # will be ignored.
phone number (Optional) Telephone number (up to 31 ASCII characters) for the person
responsible for the partner. Note: If you use a #, make sure it is inside
quotation marks (for example: "test#test"). Otherwise, characters that
follow the # will be ignored.
description text (Optional) Description for the partner, up to 63 ASCII characters. If the
text contains spaces, enclose it in quotation marks.
pool-delegated pool (Optional; applies to volume replication only) Pool from which
delegated space will be taken. The default pool is the default.
space-delegated size (Applies to volume replication only) Specifies the amount of delegated
space for storing partner replica sets. Size is in megabytes unless you
specify gigabytes. You can specify size with any of the following
suffixes: m, mb, MB, g, gb, GB.
Delegated space is immediately taken from free space either in the
default pool or in the pool specified.
nas-replication Enables replication for NAS containers between this group and another
enable|disable group that also has a NAS cluster configured
volume-replication (Default) You do not need to explicitly specify this parameter unless you
enable|disable are also configuring NAS replication to the same partner.
Enables replication for iSCSI volumes between this group and another
group that you are specifying as the replication partner.
In the output for the example, the passwords are readable to show that the inbound password for one
group is the outbound password on the partner, and vice versa. On an actual system, passwords are
encrypted for security.
On AGroup:
On CGroup:
In the output for the example, the passwords are readable to show that the inbound password for one
group is the outbound password on the partner, and vice versa. On an actual system, passwords are
encrypted for security.
On group Alpha:
On group Beta:
You do not specify a pool for delegated space with NAS replication, but you must specify the inbound
and outbound passwords, just as for volume replication.
Additionally, although volume replication is the default, when you configure NAS replication you must
explicitly specify whether to enable volume replication also to the same partner.
partner delete
Breaks the relationship between the group and a replication partner.
Before you can delete a partner, you must pause inbound replication from the partner to the group. See
partner select inbound-pause and nas-cluster select container select replication to pause NAS container
replication.
For example, if you are on Group-B and you delete the partner Group-A, the following results occur:
If Group-B is storing replicas from Group-A, those replica sets are deleted.
If Group-A is storing replicas from Group-B, those replica sets are not deleted.
Format
partner delete partner_name
Variable
Variable Description
partner_name Partner group name
Example
Delete a replication partner:
partner rename
Renames a replication partner.
NOTE: You can rename a replication partner only if the partners group name has changed.
Variables
Variable Description
current_name Current partner group name
Example
Rename a partner:
partner select
Selects a replication partner for additional operations.
Format
partner select partner_name subcommand | parameter
Variable
Variable Description
partner_name Partner group name
Subcommands
Subcommand Description
cancel-operation Cancels in-progress operation for the specified ID number. To display
id_number the ID number of all in-process replications, see partner select show.
failback-replicaset Manages a failback replica set in the group. You can promote a failback
replica set to a volume, move it to another pool, convert it to an
inbound replica set, cancel an operation, create and delete basic access
points (to support manual transfer replication), or show details.
inbound-pause Pauses (temporarily suspends) replication from the partner to the group
inbound-repcol Manages the partner replica collections stored in the group, including
deleting replica collections and showing replicas in a collection
inbound-replicaset Manages the partner replica sets stored in the group, including showing,
deleting, and cloning replicas and promoting replica sets
outbound-pause Pauses (temporarily suspends) all replication from the group to the
partner
outbound-repcol Manages the group replica collections stored on the partner, including
deleting replica collections and showing replicas in a collection
outbound-repcolset Manages the group replica collection sets stored on the partner,
including deleting replica collection sets and showing replica
collections in a replica collection set
outbound-replicaset Manages the group replica sets stored on the partner, including
showing and deleting replicas
pool-map Manages the mapping between the storage pool of the primary volume
on the primary group and the storage pool of the replica set on the
secondary group
show [-poolinfo] Shows partner configuration information. With -poolinfo, shows the
name of the pool in which space is delegated for this partner.
email email_address Email address, up to 31 characters, for the person responsible for the
partner
mobile number Mobile phone number, up to 31 ASCII characters, for the person
responsible for the partner. Note: If you use a #, make sure it is inside
quotation marks (for example: "test#test"). Otherwise, characters that
follow the # will be ignored.
phone number Telephone number, up to 31 characters, for the person responsible for
the partner. Note: If you use a #, make sure it is inside quotation marks
(for example: "test#test"). Otherwise, characters that follow the # will be
ignored.
pool-delegated pool (Applies to volume replication only) Moves the delegated space and all
the replica sets and recovery volumes for the partner from the original
pool into the specified pool
space-delegated size (Applies to volume replication only) Specifies the amount of delegated
space for storing partner replicas. Size is in megabytes by default. You
can specify size with any of the following suffixes: m, mb, MB, g, gb, GB,
t, tb, or TB.
Examples
Change the partners inbound password:
Format
partner select cancel-operation id_number
Variable
Variable Description
id_number ID number of the in-progress operation
Example
Cancel an in-progress operation:
Format
partner select partner_name failback-replicaset subcommand
Subcommands
Subcommand Description
select Selects a failback replica set for additional operations
Format
partner select partner_name failback-replicaset select set_name subcommand
Variables
Variable Description
partner_name Name of the partner to which you replicated the volume
Subcommands
Subcommand Description
access Creates, displays, or deletes a basic access point for a failback replica
set, to support manual transfer replication using the CLI
delete-failback Converts a failback replica set to an inbound replica set, making the
operation permanent. You can no longer return to the original volume.
You cannot delete a failback replica set until you change it.
promote Promotes the failback replica set to a volume, returning it to its original
state.
NOTE: If the replication partners are configured to use only the IPv6 protocol, you must create a
basic access point for the failback replica set using either the initiator name or a CHAP account.
Basic access points for IPv6 initiator client system addresses are not currently supported.
Format
partner select partner_name failback-replicaset select set_name access
subcommand
Variables
Variable Description
partner_name Group name of the partner to which the volume was replicated
Subcommands
Subcommand Description
create Creates a basic access point for a failback replica set
select show Shows information about the basic access points for the failback replica
set
NOTE: If the replication partners are configured to use only the IPv6 protocol, you must create a
basic access point for the failback replica set using either the initiator name or a CHAP account.
Basic access points for IPv6 initiator client system addresses are not currently supported.
Format
partner select partner_name failback-replicaset select set_name access create
parameter
Variables
Variable Description
partner_name Partner group name
Parameters
Parameter Description
ipaddress address IPv4 address to which access is restricted. An asterisk (*) in any of the
four parts of an IP address is interpreted as a wildcard character; that is,
any value is accepted for that 8-bit field.
For example, specify *.*.*.* for unrestricted host access (not
recommended except for testing).
initiator name Name of the iSCSI initiator to which access is restricted. For example:
iqn.2002-10.com.companyA.qla-4000.sn00044
authmethod chap|none Specifies whether the record uses CHAP authentication (chap) to
restrict access to the failback replica set. The default is none; CHAP
authentication is not used.
You must also specify the username chap_name parameter for CHAP
authentication.
username chap_name Specifies the CHAP user name (up to 63 ASCII characters) to which
access is limited. The name must match a local CHAP account or an
account on an external RADIUS server that is known to the group.
Create a basic access point for a specific IP address (supported only for IPv4 addresses):
Format
partner select partner_name failback-replicaset select set_name access delete
access_entry_id
Variables
Variable Description
partner_name Partner group name
access_entry_id Basic access point identification number (from the output of the show
subcommand; see partner select failback-replicaset select show)
Example
Delete a basic access point:
Format
partner select partner_name failback-replicaset select set_name access select
access_entry_id parameter
Variables
Variable Description
partner_name Partner group name
access_entry_id Basic access point identification number (from the output of the show
subcommand; see partner select inbound-replicaset select access
select show)
Parameters
Parameter Description
authmethod chap|none Specifies whether the record uses CHAP authentication (chap) to
restrict access to the volume. The default is none; CHAP authentication
is not used.
You must also specify the username chap_name parameter for CHAP
authentication.
username chap_name Specifies the CHAP user name (up to 63 ASCII characters) to which
access is limited. The name must match a local CHAP account or an
account on an external RADIUS server that is known to the group.
initiator name Name of the iSCSI initiator to which access is restricted. For example:
iqn.2002-10.com.companyA.qla-4000.sn00044
ipaddress address IP address to which access is restricted. An asterisk (*) in any of the four
parts of an IP address is interpreted as a wildcard character; that is, any
value is accepted for that 8-bit field.
For example, specify *.*.*.* for unrestricted host access (not
recommended except for testing).
> partner select Group2 failback-replicaset select db2vol access select 2 show
__________________________________________________________________
primary> partner select Group2 failback-replicaset select db2vol access select
2 username dbuser
primary> partner select Group2 failback-replicaset select db2vol access select
2 show
_______________________ Access Information _______________________
Initiator: Ipaddress: *.*.*.*
AuthMethod: chap UserName: dbuser
Apply-To: both
Format
partner select partner_name failback-replicaset select set_name access select
access_entry_id show
Variables
Variable Description
partner_name Partner group name
access_entry_id Basic access point identification number (from the output of the show
subcommand; see partner select inbound-replicaset select access)
Example
Show detailed information about a basic access point for a failback replica set:
> partner select Group2 failback-replicaset select db2vol access select 1 show
Format
partner select partner_name failback-replicaset select set_name assign
volume_admin
Variables
Variable Description
partner_name Name of the partner to which you replicated the volume
Example
Assign a failback replica set to a volume administrator:
Format
partner select partner_name failback-replicaset select set_name cancel-
operation op_id
Variables
Variable Description
partner_name Group name of the partner to which the volume was replicated
Example
The following commands show the identification number of a pool move operation in progress and then
cancel the operation:
Format
partner select partner_name failback-replicaset select set_name delete-failback
Variables
Variable Description
partner_name Group name of the partner to which the volume was replicated
Example
Change a failback replica set to an inbound replica set:
Failback replica set 'vol3' has been successfully converted to a replica set
with failback deleted.
Format
partner select partner_name failback-replicaset select set_name pool pool_name
Variables
Variable Description
partner_name Group name of the partner to which the volume was replicated
pool_name Name of the pool to which to move the failback replica set
To maintain failback on the volume, after you promote it you must replicate the volume to set the new
failback baseline.
Format
partner select partner_name failback-replicaset select set_name promote
Variables
Variable Description
partner_name Group name of the partner to which the volume was replicated
Example
The following commands pause inbound replication from the partner and promote a failback replica set
to its original volume:
The promoted volume is offline. You must set it online to use it. See volume select.
To set the new failback baseline, replicate the volume immediately. See volume select replication create-
replica.
Format
partner select partner_name failback-replicaset select set_name show
Example
Show detailed information about a failback replica set:
Format
partner select partner_name failback-replicaset select set_name unassign
volume_admin
Variables
Variable Description
partner_name Name of the partner to which you replicated the volume
Example
Unassign a failback replica set from a volume administrator:
Format
partner select partner_name failback-replicaset show [parameter]
Variable
Variable Description
partner_name Name of the replication partner
Example
Show the failback replica sets in the group:
Format
partner select partner_name inbound-nas-replication subcommand
Variable
Variable Description
partner_name Partner group name
Subcommands
Subcommand Description
delete Deletes a partners inbound NAS replica container stored in the group
Format
partner select partner_name inbound-nas-replication delete container_name
Example
Delete an inbound NAS replica container for a partner:
Format
partner select partner_name inbound-nas-replication select container_name
subcommand
Variables
Variable Description
partner_name Partner group name
Subcommands
Subcommand Description
pause Pauses inbound replication to the NAS container
Format
partner select partner_name inbound-nas-replication select container_name pause
Example
Pause replication for an inbound NAS replica container for a partner:
If you are using an external server (such as Active Directory, LDAP, or NIS) to authenticate users and
groups on the destination cluster, quotas will be applied to the recovery container.
If you are using only local users and groups, quotas will not be applied.
If you are using both local users and groups and externally authenticated users and groups, user and
group quotas are applied for the externally authenticated accounts. Quotas will also be applied for the
local users and groups, but they might not be applied correctly.
For more information about this behavior, see the Dell EqualLogic Group Manager Administrator's Guide.
Format
partner select partner_name inbound-nas-replication select container_name
promote parameters
Variables
Variable Description
partner_name Partner group name
Parameters
Parameter Description
keep-demote Applies the configuration from the source container to this container
Promote an inbound NAS replica container for a partner and specify that it keep its current configuration:
Format
partner select partner_name inbound-nas-replication select container_name read-
only-access enable|disable
Variables
Variable Description
partner_name Partner group name
Example
Set read-only access on an inbound NAS replica container for a partner:
Format
partner select partner_name inbound-nas-replication select container_name resume
Example
Resume replication for an inbound NAS replica container for a partner:
Format
partner select partner_name inbound-nas-replication show
Variable
Variable Description
partner_name Partner group name
Example
Show all the inbound NAS replica containers on the group:
Format
partner select partner_name inbound-pause
Example
Pause replication data transfer from the partner to the group:
Format
partner select partner_name inbound-repcol subcommand
Variable
Variable Description
partner_name Partner group name
Subcommands
Subcommand Description
delete repcol Deletes an inbound replica collection stored in the group (the replicas
in the collection). You must pause inbound replication from the partner
before deleting an inbound replica collection. See partner select
inbound-pause.
select repcol Selects a partners replica collection and shows the replicas in the
collection
show [custom] Shows the partners replica collections stored in the group. Specify
custom to display custom replica collections.
Examples
Show a partners replica collections stored in the group:
Format
partner select partner_name inbound-repcolset subcommand
Variable
Variable Description
partner_name Partner group name
Subcommands
Subcommand Description
delete repcolset Deletes an inbound replica collection set from the group
select repcolset Selects a partners replica collection set and shows the replica
collections in the set
show Shows the partners replica collection sets stored in the group
Examples
Show a partners replica collection sets stored in the group:
It is strongly recommended that you perform this operation with caution and
only in the event of a disaster at the group where the original volume
collection resides. Are you sure you want to delete the inbound-replica
collection set? (y/n) [n] y
Format
partner select partner_name inbound-replicaset subcommand
Variable
Variable Description
partner_name Partner group name
Subcommands
Subcommand Description
delete Deletes a partners inbound replica set stored in the group
Before deleting an inbound replica set, you must pause inbound replication from the partner. See partner
select inbound-pause.
Format
partner select partner_name inbound-replicaset delete set_name
Variables
Variable Description
partner_name Partner group name
Format
partner select partner_name inbound-replicaset select set_name subcommand
Variables
Variable Description
partner_name Partner group name
Subcommands
Subcommand Description
access Manages basic access points for a replica placeholder used in a manual
transfer replication operation
lost-blocks mark-valid Sets the replica online and marks the lost cached blocks as valid
pool Moves the replica set to the specified pool, if this pool has delegated
space for the partner
You can create, modify, and delete basic access points only for the replica placeholder created for a
volume that is configured to use manual transfer replication. After the manual transfer of the volume data
is complete, you can delete the basic access point.
By default, the inbound replica set has a basic access point inherited from the original replicated volume.
This basic access point only sets up communication between the partner groups.
Format
partner select partner_name inbound-replicaset select set_name access subcommand
Variables
Variable Description
partner_name Partner group name
Subcommands
Subcommand Description
create Creates a basic access point
Format
partner select partner_name inbound-replicaset select set_name access create
parameter
Variables
Variable Description
partner_name Partner group name
Parameters
Parameter Description
ipaddress address IPv4 address to which access is restricted. An asterisk (*) in any of the
four parts of an IP address is interpreted as a wildcard character; that is,
any value is accepted for that 8-bit field.
For example, specify *.*.*.* for unrestricted host access (not
recommended except for testing).
initiator name Name of the iSCSI initiator to which access is restricted. For example:
iqn.2002-10.com.companyA.qla-4000.sn00044
authmethod chap|none Specifies whether the record uses CHAP authentication (chap) to
restrict access to the volume. The default is none; CHAP authentication
is not used.
You must also specify the username chap_name parameter for CHAP
authentication.
username chap_name Specifies the CHAP user name to which access is limited. The name
must match a local CHAP account or an account on an external RADIUS
server that is known to the group.
Examples
Create a basic access point that sets the authentication method to CHAP and grants access to a specific
CHAP user:
Format
partner select partner_name inbound-replicaset select set_name access delete
access_entry_id
Variables
Variable Description
partner_name Partner group name
access_entry_id Basic access point identification number (from the output of the show
subcommand; see partner select inbound-replicaset select access)
Example
Delete a basic access point:
Variables
Variable Description
partner_name Partner group name
access_entry_id Basic access point identification number (from the output of the show
subcommand; see partner select inbound-replicaset select access)
Subcommand
Subcommand Description
show Shows detailed information about the specified basic access point
number
Parameters
Parameter Description
authmethod chap|none Specifies whether the record uses CHAP authentication (chap) to
restrict access to the volume. The default is none; CHAP authentication
is not used.
You must also specify the username chap_name parameter for CHAP
authentication.
username chap_name Specifies the CHAP user name to which access is limited. The name
must match a local CHAP account or an account on an external RADIUS
server that is known to the group.
initiator name Name of the iSCSI initiator to which access is restricted. For example:
iqn.2005-07.com.companyA.qla-4000.sn00044
ipaddress address IP address to which access is restricted. An asterisk (*) in any of the four
parts of an IP address is interpreted as a wildcard character; that is, any
value is accepted for that 8-bit field.
For example, specify *.*.*.* for unrestricted host access (not
recommended except for testing).
Examples
Show detailed information about a particular basic access point for an inbound replica set:
> partner select GroupB inbound-replicaset select vol-1.1 access select 1 show
The following commands modify the CHAP user name for a basic access point and show the detail
information for the record before and after the change:
> partner select GroupB inbound-replicaset select vol-1.1 access select 2 show
> partner select GroupB inbound-replicaset select vol-1.1 access select 2 show
Format
partner select partner_name inbound-replicaset select set_name access show
Variables
Variable Description
partner_name Partner group name
Example
Show the basic access point for the replica placeholder for a volume that is configured to use manual
transfer replication:
Format
partner select partner_name inbound-replicaset select set_name cancel-operation
op_id
Variables
Variable Description
partner_name Partner group name
Example
Cancel an in-progress operation for a replica set:
In all cases, the new volume has a different iSCSI target name, but the same contents as the volume
when the replica was created and will be available immediately through the IP address of the secondary
group (not the primary group, where the original volume resides). You can use and modify the new
volume as you would any other volume, within the restrictions for the volume type.
By default, the new volume will be set online, have read-write permission, and use the groupwide
snapshot space and iSCSI settings, unless you override them.
You can clone complete replicas only. The replica is still available after the cloning operation completes.
Format
partner select partner_name inbound-replicaset select set_name clone
replica_name new_volume [parameter...]
Variables
Variable Description
partner_name Partner group name
Parameters
Parameter Description
description text Description for the new volume. If the text contains spaces, enclose it in
quotation marks.
snap-warn n% Threshold at which an alarm occurs because the amount of free space
reserved for snapshots of the new volume has fallen below this value, as
a percentage of the total reserved snapshot space. You must include
the percent sign (%).
The default setting is groupwide (see grpparams def-snap-warn).
snap-depletion action Specifies the default snapshot space recovery policy, either delete-
oldest (delete the oldest snapshots, the default) or volume-offline
(set the volume and its snapshots offline).
The default setting is groupwide (see grpparams def-snap-depletion).
iscsi-alias alias iSCSI target alias for the new volume. Some iSCSI initiators can see the
alias.
The default setting is groupwide (see grpparams def-iscsi-alias.
unrestricted Grants unrestricted host access to the new volume. Unrestricted access
is not recommended. Instead, after cloning the replica, you should
bind member Binds the new volume to the specified member. Volume data will be
restricted to this member.
Binding a volume to a member will override any RAID preference and
will disable performance load balancing for the volume.
Example
Clone an inbound replica to create a volume:
Before deleting an inbound replica, pause inbound replication from the partner to the group. See partner
select inbound-pause.
If possible, manage replicas and replica sets from the primary group (where the original volume is stored).
Format
partner select partner_name inbound-replicaset select set_name delete
replica_name
Variables
Variable Description
partner_name Partner group name
Example
> partner select psarray11 inbound-replicaset select dbvol.1 delete dbvol.
1-2015-01-24-16:17:32.9
NOTE: This option might present a security risk, and the blocks might contain old data.
Format
partner select partner_name inbound-replicaset select set_name lost-blocks mark-
valid
Variables
Variable Description
partner_name Partner group name
Example
Set a replica set online and mark any lost cached blocks as valid:
The primary group periodically polls the secondary group for the status of replication transfers. This
command sends a confirmation status back to the primary group and changes the volume and replica
status on both groups.
Format
partner select partner_name inbound-replicaset select set_name manual-xfer done
set_name Name of an inbound replica set that represents the replica placeholder
Example
Configure a confirmation message for a manual transfer replication for a volume that originated on
group2:
Format
partner select partner_name inbound-replicaset select set_name pool pool_name
Variables
Variable Description
partner_name Partner group name
Example
Move a replica set to a different pool:
Temporary promotion to a recovery volume, recovery template volume, or recovery thin clone
volume
To fail back the changes to the primary group, you must demote the volume on the primary group to
a failback replica set and replicate the changes. You can then demote the recovery volume and
promote the failback replica set to return to the original replication configuration. You cannot fail
back a template volume.
Permanent promotion to a volume, template volume, or thin clone volume
Replication of the original volume stops and the replica set is deleted from the group. This promotion
is permanent; the volume cannot later be demoted to the original inbound replica set (although it can
be demoted to a failback replica set).
By default when you promote permanently, the volume will have a new, unique iSCSI target name,
and hosts must access the volume through the IP address of the current group. Optionally, you can
specify that the new volume retain the iSCSI target name (and SCSI identification number) of the
original volume. However, only one volume can be associated with a particular target name and SCSI
ID.
To permanently promote a template volume, you must first permanently promote all its thin clones.
See the Dell EqualLogic Group Manager Administrator's Guide for detailed information about failback
procedures.
NOTE: Promoting a replica set will fail if replication is in progress for the replica set that you are
trying to promote. You must pause inbound replication before promoting a replica set, then resume
it after the promotion. See partner select inbound-pause.
Promoting a replica set does not consume additional pool space on the secondary group. The volume
and its snapshot reserve will use exactly the amount of space that was allocated to the replica set in its
storage pool, and the delegated space on the recovery group will be reduced by that same amount.
Formats
For permanent promotion:
Variables
Variable Description
partner_name Partner group name
snap-warn n% Threshold at which an alarm occurs because the amount of free space
reserved for snapshots of the new volume has fallen below this value, as
a percentage of the total reserved snapshot space. You must include
the percent sign (%).
The default is the groupwide setting (see grpparams def-snap-warn).
snap-depletion action Specifies the default snapshot space recovery policy, either delete-
oldest (delete the oldest snapshots; the default) or volume-offline
(set the volume and its snapshots offline).
The default is the groupwide setting (see grpparams def-snap-
depletion).
retain-iscsi-name Sets the new volume target iSCSI name identical to the iSCSI target
name (and SCSI ID) of the original volume
Examples
Permanently promote an inbound replica set to a volume:
Replica set promoted to recovery volume. You can demote the original volume and
then configure replication to the primary group.
Format
partner select partner_name inbound-replicaset select set_name show
Variables
Variable Description
partner_name Partner group name
Example
Show information about an inbound replica set:
Format
partner select partner_name inbound-replicaset show [-template|
-volume]
Parameters
Parameter Description
-template Displays only inbound template replica sets stored on the partner
Example
Show the inbound replica sets from a partner:
Format
partner select partner_name inbound-resume
Variable
Variable Description
partner_name Partner group name
Example
Resume replication from the partner to the group:
Variables
Variable Description
partner_name Name of the partner on which the storage pools reside
pool_source Name of the pool from which delegated space is being transferred
Example
Transfer delegated space from one pool to another:
Format
partner select partner_name nas-replication enable|disable
Variable
Variable Description
partner_name Partner group name
Example
Enable NAS replication to a partner:
Format
partner select partner_name nas-replication upgrade-protocol-version [v3]
Variables
Variable Description
partner_name Partner group name
Example
Set the communication protocol to v3 for NAS replication:
Format
partner select partner_name outbound-nas-replication subcommand
Variable
Variable Description
partner_name Partner group name
Subcommands
Subcommand Description
delete Disables (deletes) replication on the source container and deletes any
replica containers stored on the partner
show Displays all the containers on this group that have replica containers on
the specified partner
Examples
Show all the containers on the group that have replica containers on a partner. In the output, the names
under Source Container are the containers on this group (the group on which you run the command).
The output shows the replica containers on the partner.
Format
partner select partner_name outbound-pause
Variable
Variable Description
partner_name Partner group name
Example
Pause outbound replication on a partner:
Format
partner select partner_name outbound-repcol subcommand
Variable
Variable Description
partner_name Partner group name
Subcommands
Subcommand Description
delete repcol Deletes the specified outbound replica collection and all the replicas in
the collection
Examples
Show the replica collections stored on the partner:
Format
partner select partner_name outbound-repcolset subcommand
Variable
Variable Description
partner_name Partner group name
Subcommands
Subcommand Description
delete repcolset Deletes the specified outbound replica collection set and the replicas in
the collection
select repcolset show Displays replica collections in the specified collection set
Examples
Show the group replica collection sets that are stored on the partner:
Format
partner select partner_name outbound-replicaset subcommand
Variable
Variable Description
partner_name Partner group name
Subcommands
Subcommand Description
delete Deletes a replica set
Format
partner select partner_name outbound-replicaset delete set_name
Example
Delete an outbound replica set for a partner:
Format
partner select partner_name outbound-replicaset select set_name subcommand
Variables
Variable Description
partner_name Partner group name
Subcommands
Subcommand Description
delete Deletes a replica set
show Shows information about the replica set and its replicas
Format
partner select partner_name outbound-replicaset select set_name delete
replica_name
Example
Delete an outbound replica in a set:
Format
partner select partner_name outbound-replicaset select set_name show
Variables
Variable Description
partner_name Partner group name
Example
Display details about an outbound replica set for a partner:
Format
partner select partner_name outbound-replicaset show [-template|
-volume]
Variable
Variable Description
partner_name Partner group name
Parameters
Parameter Description
-template Displays only outbound template replica sets stored on the partner
Example
Show the replica sets outbound to a partner:
Format
partner select partner_name outbound-resume
Example
Resume outbound replication to a partner:
Formats
partner select partner_name pool-map add|modify primary_pool_name
secondary_pool_name
Variables
Variable Description
partner_name Name of the partner (the primary group)
Subcommands
Subcommand Description
add Maps the primary pool to the secondary pool for initial placement of the
replica set
modify Changes the mapping entry for the primary pool that is mapped to the
secondary pool for initial placement of the replica set
Formats
partner select partner_name pool-space-delegated add|modify pool_name size
Variables
Variable Description
partner_name Name of the partner (the primary group)
size Size of the delegated space for the specified pool, in either m, mb, g,
gb, t, or tb
Subcommands
Subcommand Description
add Creates delegated space of the specified size in a particular pool
delete Removes delegated space for the partner from the specified pool
Examples
Create delegated space on a pool:
Format
partner select partner_name show [parameter]
Variable
Variable Description
partner_name Partner group name
Parameters
Parameter Description
failback-replicasets Shows the partners failback replica sets stored in the group:
[-template | -volume] Use -template to display only failback template replica sets stored
on the partner.
Use -volume to display only failback replica sets stored on the
partner.
Examples
Show configuration details for a specific partner:
l
mcp-RepSetA3.1 24.02GB 0MB 21.62GB 9 default PartnerAPoo ready
l
mcp-RepSetA1.1 104.5GB 0MB 92.51GB 6 default PartnerAPoo ready
l
A-ReplResvFree. 8.09GB 7.07GB 0MB 1 default PartnerAPoo ready
1
_____________________________ Inbound-repcolsets ______________________________
Format
partner select partner_name volume-replication enable|disable
Example
Disable volume replication to a partner:
partner show
Displays details about the groups replication partners.
This command displays the following details about the partners:
Format
partner show [-poolinfo]
Examples
Show details about the groups replication partner:
Show details about the pool from which delegated space is consumed:
Table 4. Partner Replication Status lists possible replication status values between partners.
Status Description
authfailure Authentication between the partners failed.
completed A replication operation completed over the network or, for manual
replication, the administrator on the secondary group sent a
confirmation message to the primary group.
farenddown The partner group cannot be reached. Make sure the partners have
network connectivity.
pause-max-snaps- Volume replication paused because the partner has reached the
reached maximum number of replicas or snapshots for a group.
To continue the replication, you must delete replicas (or snapshots) on
the partner. If a schedule is being used to create replicas, you can
decrease the maximum number of replicas to keep.
paused-remote-reserve- Volume replication was paused because the replica reserve must be
low increased. An event message will display the amount to which the
replica reserve must be increased in order for the replication to
complete.
remote-disallow- Volume replication was paused because the partner group must be
downgrade-not-set prevented from reverting to a firmware version prior to v3.2. See
grpparams.
remote-partner-needs- Volume replication was paused because the partner is running firmware
upgrade that does not support the latest features.
waiting Volume replication data transfer has not yet started because the
maximum number of in-use replication iSCSI sessions has been
reached.
pool
Manages pools in the group. The storage in a group can be organized into one to four pools. A pool
contains the storage space on the members that belong to the pool.
A member can belong to only one pool at a time. Unless otherwise specified, a member is added to the
default pool (by default, this pool is named default). If you delete a pool, the members in the pool are
automatically moved to the default pool.
Volumes are created in the default pool, unless you specify otherwise.
You can remove a member or volume from a pool and add it to a different pool:
When you move a member from one pool to another, the remaining pool members must have
sufficient free space to store the volume data from the removed member. See member select to
move a member to a different pool.
When you move a volume to a different pool, the new pool must have sufficient free space to store
the volume data. See volume select to move a volume to a different pool.
NOTE: Pool move operations can be slow because the data movement will compete with user I/O
for computational and network bandwidth.
You can merge one pool into another pool, called the destination pool.
Only one member or volume at a time can be moved into or out of a pool, unless you are merging one
pool into another.
Format
pool subcommand
pool create
Creates a pool in the group with an optional description.
Format
pool create pool_name [description]
Variables
Variable Description
pool_name Name for the pool. Name can be up to 63 bytes and is case insensitive.
You can use any printable Unicode character except for ! " # $ % & ' ( ) *
+ , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last characters cannot be a
period, hyphen, or colon. Fewer characters are accepted for this field if
you enter the value as a Unicode character string, which takes up a
variable number of bytes, depending on the specific character.
description Description for the pool, up to 127 characters. Fewer characters are
accepted for this field if you enter the value as a Unicode character
string, which takes up a variable number of bytes, depending on the
specific character. If the description contains spaces, enclose it in
quotation marks.
Example
Create a pool with a description:
Format
pool delete pool_name
Variable
Variable Description
pool_name Name of the pool to delete
Example
Delete a pool (immediately moving the members in this pool to the default pool):
pool merge
Merges one pool into another pool called the destination pool.
The group adds the members and volumes from the merged pool to the destination pool and then
deletes the empty pool.
If the group has more than one pool, delegated space in the deleted pool (along with any replica sets) is
also moved to the destination pool. Any mappings to the deleted pool are updated to point to the
destination pool.
Format
pool merge source_pool destination_pool
Variables
Variable Description
source_pool Pool to merge into the destination pool
destination_pool Destination pool to which the group adds members and volumes from
the merged pool
In this example, merging the source pool (staff) into the destination pool (default) moves the members
and volumes from staff to default and then deletes staff..
pool rename
Renames a pool. You can rename the default pool.
Format
pool rename pool_name new_name
Variables
Variable Description
pool_name Pool to rename
new_name New name for the pool. Name can be up to 63 bytes and is case
insensitive. You can use any printable Unicode character except for ! " #
$ % & ' ( ) * + , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last characters
cannot be a period, hyphen, or colon. Fewer characters are accepted
for this field if you enter the value as a Unicode character string, which
takes up a variable number of bytes, depending on the specific
character.
Example
Rename a pool:
pool select
Selects a pool for additional operations.
Format
pool select pool_name subcommand parameter
Variable
Variable Description
pool_name Pool name
Parameter
Parameter Description
description text Description of the pool, up to 127 characters. If the text contains
spaces, enclose it in quotation marks. To remove a pool description,
type empty quotation marks (). Fewer characters are accepted for this
field if you enter the value as a Unicode character string, which takes up
a variable number of bytes, depending on the specific character.
Examples
Show details about a pool:
Format
pool show
Example
Display all the pools in the group:
recovery-bin
Manages recoverable volumes on the group.
For detailed information about recovering deleted volumes, see the Dell EqualLogic Group Manager
Administrator's Guide
Format
recovery-bin volume subcommand
Subcommands
Subcommand Description
disable Disables recoverable volumes
Examples
Enable volume recovery on the group:
save-config
Saves the group configuration to a file. You can use the information in this file to restore a group in the
event of a complete group failure.
Restrictions
The save-config command does not save or allow you to restore the following information:
Volume dataYou must have backups of your data, and restore the data from backups after restoring
the group configuration.
Partner inbound or outbound passwordsYou must reenter the partner passwords to restore
replication between groups.
The groups IPsec certificate configurationThe save-config command saves the CLI commands that
were used to configure IPsec, but it does not save certificates that have been transferred to the array
using FTP. Therefore, when you restore a configuration, you must manually restore any configuration
options set using the ipsec certificate load and ipsec security-params create certificate commands.
Command Behavior
The save-config command creates a restoration file on the array, which contains the CLI commands
needed to re-create the group and its objects (such as pools and volumes). For safekeeping, use FTP or
SCP to copy the file from the array (specify the group IP address in the ftpopen or scp command) to a
host. For more information about using FTP or SCP commands to copy data off of an array, see diag.
By default, the restoration file is named config.cli, but you can specify a different name. For example, you
can name the file for the date or group on which it was created. If you have several PS Series groups, you
can give each groups file a unique name to prevent confusion.
Group information and customization, including lists of servers and all IP security settings
Local CHAP account configuration
Member information (RAID level, pool, and network interface configuration data are saved as
comments in -grouponly mode)
Replication partner configuration (partner names, IP addresses, and delegated space settings)
Modes of Operation
The save-config command can be run in the following modes:
The default mode saves the configuration as a set of commands that you can run to restore the
configuration.
The group-only mode saves some of the information as commands and some as commented text,
which you must edit manually.
Use Cases
Whenever any group configuration information changes, run the save-config command again to create
an updated restoration file. For example, run the command again after you:
Format
save-config [-verbose] [-grouponly] [file_name]
Parameters
Parameter Description
-verbose Specifies verbose mode; commands saved in the file are also shown on-
screen
Examples
Save the group configuration to a specified file name:
Save the group configuration to the default file name, but omit the member and pool configuration:
Restrictions
The following restrictions apply when restoring a group:
If the group does not have the same number of members as it had before the failure, or if the member
names have changed, manually edit the restoration file to reflect the new group configuration.
If the group members are not running the same firmware version that they were running when you
created the restoration file, the restoration might not succeed.
Before restoring a group, make sure the groups replication partners still have the group configured as
a replication partner.
If a replication between the group being restored and any partner occurred before the restoration, the
partner will have replica sets. The save-config command does not restore the relationship between
restored volumes and any preexisting replica sets on partner groups.
If the replica sets are empty (contain no actual replicas), delete the replica sets on the partner.
If the replica sets contain replicas, you can either delete them (and the replica sets) and reenable
replication from the restored volumes to the partner, or manually edit the save-config file so that
the replicated volumes are not re-created. Instead, after the group is completely restored and
running, replicate those volumes back to the restored group. This method will reestablish the
relationship between the original volumes and their replica sets on the partner.
The default path is /mgtdb/update/usr. If your file is in that directory, you do not need to specify the
path.
For example:
For example:
show
Shows a summary of the group configuration or detailed information about a specific group component.
Format
show parameter | -poolinfo
Option
Option Description
-poolinfo When used by itself or following certain parameters, displays the pool
name in the output sections for members, volumes, and partners
alerts Shows the priorities for the event notification methods. The output is
the same as for the alerts show command.
audit-log [name] Shows the audit logs for the group, or for a specific account, optionally
[number number] limiting the display to a specified number of log records
chapuser Shows local CHAP accounts, including the account name, password,
and status
collections Shows the volume collections in the group. The output is the same as
for the collections show command.
grpparams Shows all the group parameters and their values. The output is the same
as for the grpparams show command.
member member_name| Shows the group members or details about a specific member. The
-poolinfo output is the same as for the member show command.
With the -poolinfo option, shows pool information for the members.
nas-cluster Shows information about the NAS cluster (if configured) for the group
[cluster_name]
partners [-poolinfo] Shows information about configured replication partners. The output is
the same as for the partner show command.
With the -poolinfo option, also shows pool information, but not the
amount of space used on the partners.
pool Shows the pools in the group and the number of members in each
pool. The output is the same as for the pool show command.
recentevents Shows event messages in the group, starting with the most recent
snapcol Shows the snapshot collections in the group. The output is the same as
for the snapcol show command.
usersessions Shows a list of accounts that are currently logged in to the group. The
output is the same as for the show accounts active and account show
active commands.
volume volume_name| Shows the volumes or details about a specific volume in the group. The
-options output is the same as for the volume show command.
See show volume for the list of options.
Format
show account [active]
Examples
Show information about group administration accounts:
show alerts
Shows the event priorities (info, warning, error, fatal, or audit) for email and syslog notification, if
notification is enabled.
Format
show alerts
Example
Show the priorities for email and syslog notification:
Format
show audit-log [account-name name number n]
Variables
Variable Description
name Administrator account name
Parameters
Parameter Description
account-name name (Optional) Filters the log output to include events for the specified
administrator account.
If you do not specify an account name, the audit log for the account
logged in to the CLI is shown. If you are logged in with a volume
administrator account, you cannot see log entries for other accounts. If
you are logged in with a pool administrator account, you can see log
entries for other accounts only if your account has group-read access.
All accounts can always view their own audit log information, and new
accounts with previously used account names will be able to view audit
records for the old account. Therefore, as a security precaution, Dell
recommends that administrator account names not be reused after
they have been deleted.
Example
Display the three most recent audit log entries for the grpadmin account:
show chapuser
Shows the local CHAP accounts in the group that are configured for iSCSI initiator authentication.
Format
show chapuser
Example
Show the local CHAP accounts:
show collections
Shows information about the volume collections in the group.
Format
show collections
Example
Show the volume collections in the group:
show-devices
Displays available, uninitialized NAS devices on the network.
For more information about NAS, see nas-cluster.
Format
show-devices
Example
Display all the available, uninitialized NAS devices on the network:
> show-devices
show grpparams
Shows the group parameters and their current values.
Format
show grpparams
Example
Display the current values for all the group parameters:
show member
Shows the members in the group or details about a specific member. This information includes any in-
progress member operation, such as removing a member from a pool.
Format
show member [member_name | -poolinfo]
Variable
Variable Description
member_name Name of a member
Option
Option Description
-poolinfo Includes the pool information for the group members in the command
output
Examples
Show a summary of the group members:
show nas-cluster
Shows information about the NAS cluster configured in the group (if applicable).
Format
show nas-cluster [name]
Variable
Variable Description
name (Optional) Name of a NAS cluster. The name is optional because a PS
Series group can have only one NAS cluster.
Examples
Display basic information about NAS clusters in the group:
show partners
Shows information about the groups replication partners.
This command displays the following information:
Format
show partners [-poolinfo]
Example
Display the partners for the group (the output wraps onto subsequent lines of the display):
show pool
Shows information about the pools in the group.
Format
show pool
Example
Show information about the pools in the group:
show recentevents
Shows event messages in the group, starting with the most recent.
When an event occurs (such as the creation of a volume or the removal of a power supply), a message is
sent. These messages help you monitor normal operations, and identify and correct problems before
they disrupt operations.
The show recentevents command shows one screen of information at a time, unless paging has been
turned off with the cli-settings paging off command. If paging has been turned off, the command shows
all events.
Each event has a priority. See alerts for a list of event priorities and descriptions.
Format
show recentevents
Example
Show event messages for the group, starting with the most recent:
See Also
For more information about group and NAS cluster events, see the Dell EqualLogic Events Guide.
show snapcol
Shows information about the snapshot collections in the group.
Format
show snapcol [custom]
Examples
Display all snapshot collections in the group:
Format
show usersessions
Example
Show the accounts that are currently logged in to the group:
show volume
Shows the group volumes or information about a specific volume. This information includes replication
partners (if replication is enabled), basic access points, and in-progress operations for the volume (for
example, replication, bind, or pool move operations).
You can also display pool information for all the volumes, restrict the output to show only template
volumes, or exclude template volumes from the output.
Format
show volume [volume_name] | [-poolinfo|-template|-volume]
Variable
Variable Description
volume_name Name of a volume
Examples
Show all the volumes in the group and their status, including whether the volume has thin provisioning
enabled (in the column labeled T):
Format
snapcol subcommand
Subcommands
Subcommand Description
create Creates a snapshot collection
delete Deletes a snapshot collection and all the snapshots in the collection
snapcol create
Creates a collection of simultaneous snapshots of the volumes in a volume collection, or volumes that
you specify individually.
Format
snapcol create {collection_name|volume_name} [snapcol_name] [description text]
Variables
Variable Description
collection_name Name of a volume collection. Name can be up to 63 bytes and is case
insensitive. You can use any printable Unicode character except for ! " #
$ % & ' ( ) * + , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last characters
cannot be a period, hyphen, or colon. Fewer characters are accepted
for this field if you enter the value as a Unicode character string, which
takes up a variable number of bytes, depending on the specific
character.
Parameter
Parameter Description
description text Description of a snapshot collection, up to 127 characters. Fewer
characters are accepted for this field if you enter the value as a Unicode
character string, which takes up a variable number of bytes, depending
on the specific character.
If the text contains spaces, enclose it in quotation marks.
Examples
Create a snapshot collection from a volume collection that contains two volumes:
The actual snapshot collection name will have a timestamp appended (for example,
sc23monday-2015-06-15-13:28:54.49). If the name with the timestamp is longer than 30 characters,
the name wraps in the output of the snapcol show command.
The timestamp portion of the name is always 23 characters long, and includes the leading hyphen, year,
month, day, and hour (separated by hyphens), then the minute and second (separated by colons), a
period, and an incremental number. Seven (7) characters remain available on the output line for the user-
defined part of the name.
Create a snapshot collection from the specified volumes (the snapshot collection name is created
automatically):
For this example, the snapshot collection name is snapcol followed by a hyphen and the timestamp. For
example: snapcol-2015-05-01-09:36:42.149
snapcol delete
Deletes a snapshot collection and all the snapshots in the collection.
Format
snapcol delete snapshot_collection
Example
Delete a specified snapshot collection:
snapcol rename
Renames a snapshot collection. The new name is not automatically appended with a timestamp.
Format
snapcol rename current_name new_name
Variables
Variable Description
current_name Current name of a snapshot collection
NOTE: Names are not case sensitive. For example, snap-01 and
SNAP-01 are the same.
Example
Rename a snapshot collection:
snapcol select
Selects a snapshot collection for additional operations.
Format
snapcol select snapcol_name [description text]|show
Parameter
Parameter Description
description text Description for the snapshot collection, up to 127 characters. Fewer
characters are accepted for this field if you enter the value as a Unicode
character string, which takes up a variable number of bytes, depending
on the specific character.
If the text contains spaces, enclose it in quotation marks. To remove a
description, enter empty quotation marks ().
Example
> snapcol select staff2-2015-03-09-14:52:16.52 show
snapcol show
Shows all snapshot collections or all custom snapshot collections in the group.
Format
snapcol show [custom]
Examples
Show the snapshot collections in the group:
storage-container
Manages storage containers on the group.
Format
storage-container subcommand
storage-container create
Creates a storage container.
Format
storage-container create container_name parameters
Variables
Variable Description
container_name Name of a new storage container, up to 42 characters. The container
name is not case-sensitive.
Parameters
Parameter Description
description text Description for the storage container, up to 127 characters. If the text
contains spaces, enclose it in quotation marks.
pool pool_name Identifies the pool on the group where the storage container will be
placed
physical-size size Specifies the physical size for the storage container. The size is in
megabytes unless you specify otherwise. You can specify the size with
any of the following suffixes: m, mb, MB, g, gb, or GB, t, tb, or TB.
Because of rounding algorithms, the groups actual capacity might be
less than the capacity shown in the CLI or GUI. If you try to create a
storage container larger than the available space on the group, the
command fails, and an error message shows the actual amount of
available space.
logical-size size Specifies the logical size for the storage container.
storage-container delete
Deletes a storage container.
Format
storage-container delete container_name
Variable
Variable Description
container_name Name of the storage container
Example
Delete a storage container:
storage-container rename
Renames a storage container.
Format
storage-container rename container_name new_name
Variables
Variable Description
container_name Current name of the storage container
Example
Rename a storage container:
Format
storage-container select container_name [description text]
[free-warn-threshold threshold] [pool select pool_name physical-size size] |
show
Variable
Variable Description
container_name Name of a storage container
Parameters
Parameter Description
description text Description for the storage container, up to 127 characters. If the text
contains spaces, enclose it in quotation marks.
free-warn-threshold Specifies the value of the threshold for a warning about free space
threshold% available.
You must include the percent sign (%).
physical-size size Specifies the physical size for the storage container. The size is in
megabytes unless you specify otherwise. You can specify the size with
any of the following suffixes: m, mb, MB, g, gb, or GB, t, tb, or TB.
Because of rounding algorithms, the groups actual capacity might be
less than the capacity shown in the CLI or GUI. If you try to create a
volume larger than the available space on the group, the command
fails, and an error message shows the actual amount of available space.
show Displays the values that are set for the storage container
Examples
Set the physical size for a storage container:
storage-container show
Shows the properties of existing storage containers.
Format
storage-container show
Example
Display the properties of all storage containers:
tag
Manages tags for volumes.
Format
tag subcommand
Subcommands
Subcommand Description
create Creates a new tag
tag create
Creates a new tag. The tag value is optional; if not provided, the tag will be a simple tag.
Format
tag create tag_name[=tag_value]
Variable
Variable Description
tag_name[=tag_value] Name of the tag and the value of the tag that you want to create. If you
do not specify a value, the tag becomes a simple tag.
Example
Create a new name for a tag:
tag delete
Deletes the tag and all uses of the tag.
Format
tag delete tag_name
Variable
Variable Description
tag_name Name of the tag that you want to delete
Example
Delete an existing tag:
Deleting this tag type will unassign it from any volumes as well as delete all
tag values for this tag type. Do you still want to delete it? (y/n) y
Format
tag rename tag_name new_name
Variables
Variable Description
tag_name Name of the current tag that you want to rename
Example
Rename an existing tag:
Format
tag select tag_name show
Variable
Variable Description
tag_name Name of the tag
Example
Display information about a tag:
Format
tag select tag_name value add tag_value
NOTE: A simple tag can be converted to a tag with values only if the simple tag is not assigned to
any volume.
Variables
Variables Description
tag_name Name of the selected tag
Example
Add a new value for a tag:
Format
tag select tag_name value delete tag_value
Variables
Variables Description
tag_name Name of the selected tag
Deleting this tag value will unassign it from any volumes. Do you still want to
delete it? (y/n) y
Format
tag select tag_name value rename tag_value new_tag_value
Variables
Variables Description
tag_name Name of the selected tag
Example
Rename a tag:
tag show
Displays all tag names and values that can be filtered using a combination of comma-delimited pairs.
Format
tag show [tag_name_1=tag_value_1, tag_value_2,...>; <tag_name_2=tag_value_1,
tag_value_2,...]
Variable
Variable Description
tag_name[=tag_value] Tag name and optional value that you want to show
Desktops;
Tag Name Tag Value Uses
------------------------- ----------------- --------
Applications Database-Server 0
Desktops 0
tagtest tag1 1
unix-groups search
Searches in the defined UNIX group for the specified search string.
Format
unix-groups search search_string
Variable
Variable Description
search_string Searches for users in the Active Directory database that match the terms
in the search string
Example
> unix-groups search a
volume
Manages the volumes in a group.
Format
volume subcommand
volume create
Creates a volume in the group.
You must specify the volume name and the reported volume size. All other attributes are set from the
groupwide defaults, unless otherwise specified.
The reported volume size is seen by iSCSI initiators. The volume reserve is the actual amount of space
allocated to the volume. Snapshot reserve is based on a percentage of the volume reserve.
NOTE: The actual amount of volume space is rounded up to the nearest multiple of 15MB.
You can also optionally enable thin provisioning on the volume. Thin provisioning can provide you with a
more efficient method of allocating storage space to users. However, it should be used only in
environments with administrators who can closely monitor disk space usage. When you enable thin
provisioning on a volume, you can change the default minimum and maximum volume reserve values, in
addition to the in-use space warning threshold. See the Dell EqualLogic Group Manager Administrator's
Guide for more information about thin-provisioned volumes.
When you create a volume, the group creates an iSCSI target name. iSCSI initiators use this name to
access the volume through TCP/IP port 3260 (the standard iSCSI port). The iSCSI target name starts with
the iSCSI target prefix (iqn.2002-10.com.companyA), followed by a string, followed by the volume
name.
iqn.2002-10.com.companyA:6-4b0200-062460afe-13000011cd5c1-dbvol
Format
volume create volume_name size [parameter...]
Variables
Variable Description
volume_name Volume name is unique in the group. Name can be up to 63 bytes and is
case insensitive. You can use any printable Unicode character except
Parameters
Parameter Description
description text Description for the volume, up to 127 characters. Fewer characters are
accepted for this field if you enter the value as a Unicode character
string, which takes up a variable number of bytes, depending on the
specific character. If the text contains spaces, enclose it in quotation
marks.
iscsi-alias alias iSCSI target alias, up to 63 ASCII characters, for the volume. Some iSCSI
initiators can see the alias.
The default alias is the groupwide setting (see grpparams def-iscsi-
alias).
unrestricted (Not recommended) Grants unrestricted host access to the volume and
its snapshots.
Dell recommends that, instead, you create basic access points to limit
host access.
snap-depletion action Specifies the default snapshot space recovery policy. Either:
delete-oldest (default) Deletes the oldest snapshot
volume-offline Sets the volume and its snapshots offline
bind member Binds the new volume to the specified member. Volume data is
restricted to this member.
Binding a volume to a member overrides any RAID preference and
automatically performs load balancing for the volume.
pool pool_name Pool in which the volume data will reside. The default is the default
pool.
thin-min-reserve n% Minimum volume reserve (default is 10% of the reported volume size)
for a thin-provisioned volume. This percentage is the amount of
immediately writeable, guaranteed space reserved for the volume.
thin-growth-max n% When in-use space for a thin-provisioned volume reaches this limit, as a
percentage of the reported volume size:
If the maximum in-use space value is less than 100% and an initiator
write will exceed this limit, the write fails, and the group sets the
volume offline and generates event messages.
If the maximum in-use space value is 100% and an initiator write will
exceed this limit, the volume is not set offline. However, the write
fails and the group generates event messages.
thin-warn-soft- Specifies whether to send a warning when the volume passes the in-use
threshold enable| warning threshold
disable
thin-warn-hard- Specifies whether the volume will remain online after it reashes the
threshold enable| thin-growth-max threshold
disable
Examples
Create a volume in a pool:
This example shows the error that is displayed when you try to create a volume that is larger than the free
space in the default pool. The error message shows the actual amount of free pool space.
This example shows the error that is displayed when you try to create a volume in a pool that has enough
space for the volume, but not enough space for the specified snapshot reserve:
volume delete
Deletes a volume, which returns free space to the group.
Deleting a volume also deletes all its snapshots (if any). If a template volume has thin clones associated
with it, you must first delete the thin clones before you can delete the template volume.
Deleting a volume moves the volume but not its snapshots to the groups recovery bin, if the
recovery bin feature is enabled. Deleted volumes are subject to permanent deletion after 1 (one) week if
they are not restored.
The volume must be offline before you can delete it. Either set it offline or make sure that it is.
Format
volume delete volume_name
Variable
Variable Description
volume_name Name of a volume
Example
Delete a volume (and all its snapshots):
One of the following messages is displayed, depending on whether or not the recovery bin feature is
enabled.
volume rename
Renames a volume.
The iSCSI target name does not change if you rename the volume, so no host modifications are needed.
However, if the iSCSI target alias for the volume is set to the volume name, the alias will change to match
the new volume name.
Format
volume rename volume_name new_name
Variables
Variable Description
volume_name Current name of a volume
new_name New name for the volume. Name can be up to 63 bytes and is case
insensitive. You can use any printable Unicode character except for ! " #
Example
Rename a volume:
volume select
Selects a volume for additional operations.
NOTE: You can perform only the following operations on a NAS volume:
Format
volume select volume_name subcommand | parameters
Variable
Variable Description
volume_name Name of a volume
Subcommands
Subcommand Description
access Manages basic access points for the volume
assign admin_name Assigns the volume to the specified volume administrator. A volume
cannot be assigned to more than one volume administrator.
bind member Binds the volume to the specified member. Volume data will be
restricted to this member.
cancel-operation op_id Cancels an in-progress operation for the volume. For example, you can
cancel an in-progress replication, bind, or pool move operation.
Use the volume select show command to obtain the operations ID
number.
create-thin-clone name Creates a thin clone volume with the specified name from the selected
template volume
delete-failback Makes an inbound replica set promotion permanent. (Used only with a
new_volume recovery volume, which is created by promoting an inbound replica
set.)
The resulting volume will no longer be flagged as a recovery volume
and cannot be demoted to the original inbound replica set.
detach-thin-clone Detaches the selected thin clone from its template volume
show Shows details about the volume or iSCSI connections to the volume
shrink [no-snap] Decreases the volume to the specified size. Size is in megabytes unless
[no-adjust-snap- you specify otherwise. You can specify size with any of the following
resv] size
suffixes: m, mb, MB, g, gb, or GB.
See volume.
size [no-snap] size Increases the (reported) volume size. Size is in megabytes unless you
specify otherwise. You can specify size with any of the following
suffixes: m, mb, MB, g, gb, or GB.
The new size will not be recognized by hosts currently connected to
the volume unless they support container expansion. Before increasing
the volume size, understand the possible effect on the operating
system, container, or application using the volume, and set the volume
offline first if necessary for your environment.
See volume.
unassign Unassigns the volume from its volume administrator. The volume can
now be managed by any administrator with management privilege for
the group or the pool that contains the volume.
Parameters
Parameter Description
description text Description for the volume, up to 127 characters. Fewer characters are
accepted for this field if you enter the value as a Unicode character
string, which takes up a variable number of bytes, depending on the
specific character.
If the text variable contains spaces, surround it with quotation marks. To
remove a description, enter two quotation marks ().
iscsi-alias alias iSCSI target alias for the volume, up to 63 alphanumeric characters.
Some iSCSI initiators can see the alias
lost-blocks action Default policy when a volume has lost cache blocks:
return-error Sets the volume online, but keeps the lost cached
block state. If an application tries to read a lost block, an error will
occur. If the block is rewritten, no error will occur, and the volume
status will be changed to online-lost-cached-blocks.
mark-valid Sets the volume online and marks the lost cached
blocks as valid. This action might present a security risk, and the
blocks might contain old data.
NOTE: Lost cached blocks can occur if a power failure lasts longer
than 72 hours.
If a template volume has thin clones associated with it, all the thin
clones move to the target pool with the template volume.
pref-raid-policy RAID policy preference for the volume data. The group will try to place
policy the volume data on a pool member with the specified RAID policy.
Policy options include:
raid5
raid6 raid6-accelerated
raid10
raid50
none (default; allows the group to identify the optimal RAID policy
for the volume data)
snap-borrowing enable| Enables or disables snapshot borrowing for the volume. This option
disable allows or prevents the volume from borrowing from free pool space to
create snapshots if the volume does not have enough snapshot reserve.
snap-depletion action Specifies the default snapshot space recovery policy, either delete-
oldest (default; deletes the oldest snapshots until enough space is
recovered) or volume-offline (sets the volume and its snapshots
offline)
snap-warn n% Threshold at which an alarm occurs because the amount of free space
reserved for snapshots has fallen below the specified value, as a
percentage of the total reserved snapshot space. You must include the
percent sign (for example, 20%).
thin-min-reserve n% Minimum volume reserve (default is 10% of the total volume size) for a
thin-provisioned volume. This percentage is the amount of guaranteed
space (volume reserve) for the volume.
thin-growth-max n% When in-use space for a thin-provisioned volume reaches this limit, as a
percentage of the reported volume size:
If the maximum in-use space value is less than 100% and an initiator
write will exceed this limit, the write fails, and the group sets the
volume offline and generates event messages.
If the maximum in-use space value is 100% and an initiator write will
exceed this limit, the volume is not set offline. However, the write
fails and the group generates event messages.
Examples
Set a volume offline and change its permission to read-only:
Display detailed information about a NAS volume. The output shows that it is used for a NAS container.
Each basic access point can restrict host access according to IP address, iSCSI initiator name, CHAP
(Challenge Handshake Authentication Protocol) account name, or any combination of these methods. A
host must match all the requirements specified in one record in order to access the volume or snapshot.
For testing purposes only, you can set up a basic access point that grants unrestricted host access to the
volume and snapshots.
Format
volume select volume_name access subcommand
Variable
Variable Description
volume_name Name of a volume
Subcommands
Subcommand Description
create Creates a basic access point
CHAP user name To use CHAP for initiator authentication, you must set up local CHAP accounts or
specify an external RADIUS server. See chapuser and grpparams cliaccess-ssh. You can allow or
prevent (default) unauthorized hosts from discovering targets that are authenticated only with CHAP.
See grpparams discovery-use-chap.
IP address Create a basic access point for each IP address presented by an authorized host
iSCSI initiator name Create a basic access point for each iSCSI initiator name presented by an
authorized host
When you create a basic access point, the record is automatically given an identification number. Use this
number to manage the record with the CLI.
Variable
Variable Description
volume_name Name of a volume
Parameters
Parameter Description
apply-to type Specifies whether the record restricts access to the volume, its
snapshots, or both the volume and its snapshots (default). Type can be:
volume
snapshot
both
authmethod chap|none Specifies whether the record uses CHAP authentication to restrict
access to the volume. The default is none; CHAP authentication is not
used.
For CHAP authentication, you must also specify the username
chap_name parameter.
username chap_name CHAP account name to which access is restricted. The name must
match one of the local CHAP accounts or an account on an external
RADIUS server.
For CHAP authentication, you must also specify the authmethod chap
parameter.
initiator name Name of the iSCSI initiator to which access is restricted. For example:
iqn.2002-10.com.companyA.qla-4000.sn00044
ipaddress address IP address to which access is restricted. An asterisk (*) in any of the four
parts of an IP address is interpreted as a wildcard character; that is, any
value is accepted for that 8-bit field.
For example, specify *.*.*.* for unrestricted host access (not
recommended except for testing).
Example
Create a basic access point that restricts volume access to a host with the specified IP address:
Format
volume select volume_name access delete n
Variables
Variable Description
volume_name Name of a volume
Example
Delete a basic access point for the specified volume:
Format
volume select volume_name access select n show | parameter...
Variables
Variable Description
volume_name Name of a volume
Parameters
Parameter Description
apply-to type Specifies whether the record restricts access to the volume, its
snapshots, or both the volume and its snapshots (default). Type variable
can be:
volume
authmethod chap|none Specifies whether the record uses CHAP authentication to restrict
access to the volume.
For CHAP authentication, you must also specify the username
chap_name parameter.
username chap_name CHAP account name to which access is restricted. The name must
match one of the local CHAP accounts or an account on an external
RADIUS server.
See chapuser and grpparams discovery-use-chap for information about
configuring CHAP authentication in the group.
initiator name Name of the iSCSI initiator to which access is restricted. For example:
iqn.2002-10.com.companyA.qla-4000.sn00044
ipaddress address IP address to which access is restricted. An asterisk (*) in any of the four
parts of an IP address is interpreted as a wildcard character; that is, any
value is accepted for that 8-bit field.
For example, specify *.*.*.* for unrestricted host access (not
recommended except for testing).
Examples
Show information about a basic access point for the specified volume:
Change the basic access point in the previous example so that it includes only the specified IP address:
Format
volume select volume_name access show
Variable
Variable Description
volume_name Name of a volume
Cloning a standard or template volume consumes 100 percent of the original volume reserve from free
pool space. Cloned volumes inherit the original volumes size and thin-provision status. If the original
volume has thin provisioning enabled, so will the clone, with all the same attributes as the original.
However, a volume clone does not inherit the RAID preference policy of the parent volume; the RAID
policy for the clone is set to none by default.
The new volume does not inherit the original volumes snapshot reserve settings; the new volume is
created with the groupwide default value for snapshot reserve. The new volume also does not inherit the
original volumes replication space settings or configuration. To create replicas of the new volume, you
must configure replication on the new volume.
The new volume is available immediately. You can use and modify it as you would any other volume.
The cloned volume will reside in the same pool as the original volume. To change the pool, modify the
new volume. The original volume is still available after the cloning operation completes.
Format
volume select volume_name clone new_name parameter...
Variables
Variable Description
volume_name Name of a volume to clone
new_name New name for the cloned volume. Name can be up to 63 bytes and is
case insensitive. You can use any printable Unicode character except
for ! " # $ % & ' ( ) * + , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last
characters cannot be a period, hyphen, or colon. Fewer characters are
accepted for this field if you enter the value as a Unicode character
string, which takes up a variable number of bytes, depending on the
specific character.
description text Description for the new volume, up to 127 characters. Fewer characters
are accepted for this field if you enter the value as a Unicode character
string, which takes up a variable number of bytes, depending on the
specific character.
If the text contains spaces, enclose it in quotation marks.
iscsi-alias alias iSCSI target alias, up to 63 ASCII characters, for the new volume. Some
iSCSI initiators can see the alias.
The default alias is the groupwide setting (see grpparams def-iscsi-
alias).
snap-depletion action Specifies the default snapshot space recovery policy, either delete-
oldest (delete the oldest snapshots; the default) or volume-offline
(set the volume and its snapshots offline).
The default policy is the groupwide setting (see grpparams def-snap-
depletion).
snap-warn n% Threshold at which an alarm occurs because the amount of free space
reserved for snapshots of the new volume has fallen below this value, as
a percentage of the total reserved snapshot space. You must include
the percent sign (%).
The default threshold is the groupwide setting (see grpparams def-
snap-warn).
Selects a standard volume (must be thin-provisioned and have read-only permission) and converts it
to a template volume
Selects a template volume and converts it to a standard volume
Before converting a standard volume to a template volume, you must set the volume offline and change
the access type to read-only. However, you can convert a template volume to a volume while it is online.
(Changing the access type is not applicable; template volumes are always read-only.)
You cannot convert a volume if replication is active on the volume or template volume, and you cannot
convert a template volume to a standard volume if the template volume still has thin clones attached.
If you convert a volume that is part of a volume collection to a template volume, the template volume is
automatically deleted from the collection.
Format
volume select volume_name convert-to template|volume
Variable
Variable Description
volume_name Name of a volume to convert
Parameters
Parameter Description
template Converts a standard volume to a template volume
Convert a template volume to a volume. The volume can be online at the time.
Format
volume select volume_name create-thin-clone new_name
Variables
Variable Description
volume_name Name of a template volume
Example
Create a thin clone from a template volume:
To replicate the volume, you must configure replication on the volume. The first replication requires a
complete transfer of the volume data.
Format
volume select volume_name delete-failback new_name
Example
Make a promotion permanent for a recovery volume:
Deleting failback for a recovery volume will break the replication relationship
between the partners. Are you sure you want to delete failback? (y/n) [n] y
When an initiator tries to log in to a target, the group uses basic access points to determine if access
should be authorized. However, basic access points do not prevent multiple initiators, either on the same
computer or different computers, from accessing the same target.
By default, the group disables multihost access to a target; therefore, only one iSCSI qualified name (IQN)
can connect to a target at one time. However, if you have a certain environment, you might want to
enable multihost access to a target.
If all group members are not running PS Series firmware version 5.0 or higher, the group allows multihost
access to targets.
You can enable multihost access to a target if you meet any of the following conditions:
Your cluster environment assigns the initiators on each cluster computer a different IQN, and the
environment can manage multiple connections to a target. For example, the environment uses a
Distributed Lock Manager or SCSI reservations.
Your multipathing solution does not use the same IQN on all initiators, and you cannot modify the
names to be the same.
You use an environment, such as a virtual server, that can manage multiple connections to the same
iSCSI target (for example, through SCSI reservations).
Initiators on a single computer do not use the same IQN.
In all cases, use basic access points as the primary method of protecting targets in a group.
Format
volume select volume_name multihost-access enable|disable
Examples
Enable multihost access for a volume:
Formats
volume select volume_name pool pool_name
volume select volume_name pool source source_pool destination destination_pool
Variables
Variable Description
volume_name Name of a volume
pool_name Name of the pool to which you want to move a volume from the
default pool
source_pool Name of the pool that the volume currently resides in, if other than the
default pool
destination_pool Name of the pool that you want to move the volume into from the
source pool
Examples
Move a volume from the default pool to another pool:
Move a volume from one pool (not the default pool) to another pool:
This replication operation is the second step in the manual failover and failback process. See failback.
Format
volume select volume_name replicate-to-primary subcommand
Variable
Variable Description
volume_name Name of a volume
Subcommands
Subcommand Description
start [manual-replica] Starts the replication, optionally using manual transfer replication
Examples
Retry a replication operation for a recovery volume to the primary group:
Start a manual transfer replication operation for a recovery volume to the primary group:
NOTE: You must replicate a template volume before you can replicate any thin clones of that
template volume.
Variable
Variable Description
volume_name Name of a volume
Subcommands
Subcommand Description
cancel Cancels an in-progress replication to a partner
Format
volume select volume_name replication cancel partner_name
Variables
Variable Description
volume_name Name of a volume
A replica set is the set of replicas for a volume. The replica set name is based on the volume name. The
names of individual replicas are based on the volume name and a timestamp.
NOTE: If you plan to use manual transfer replication, do not create the first replica until you are
ready to start the transfer process.
Format
volume select volume_name replication create-replica [manual] partner_name
Variables
Variable Description
volume_name Name of a volume
Parameter
Parameter Description
manual Specifies using manual transfer replication for the replication operation.
See the Dell EqualLogic Manual Transfer Utility Installation and Users
Guide for more information.
Examples
Create a replica of a volume on a partner:
Create a replica of a volume, specifying manual replication for the data transfer:
Format
volume select volume_name replication demote [partner_name]
Variables
Variable Description
volume_name Name of a volume
partner_name Partner group name (required only if you are demoting a volume to a
failback replica set)
Examples
The following commands set a recovery volume offline and demote it to an inbound replica set:
The following commands set a volume offline and demote it to a failback replica set:
If you disable replication to a partner and then later reenable replication to the partner, the initial replica
will be a complete transfer of the volume data. To stop replication temporarily, pause the replication
instead of disabling it.
Format
volume select volume_name replication disable partner_name
Variables
Variable Description
volume_name Name of a volume
Example
Disable replication of a volume to a partner:
Enabling replication on a volume does not create replicas. See volume select replication create-replica
and volume select schedule create for information about creating replicas.
You must replicate a template volume before you can replicate any of its thin clones.
The local replication reserve percentage. This space stores the data that changes while replication is
in progress, and stores the failback snapshot. You can also allow the volume to borrow pool space
temporarily if the local replication reserve is not big enough to store all the changes.
The partner that will store the replica set
The remote reserve percentage
Whether to keep the failback snapshot (most recent complete replica) in the local replication reserve.
If you choose to keep the failback snapshot, you will need more local replication reserve space. If you
have a failback snapshot, you might be able to synchronize the groups upon failback by replicating
volume changes only.
See the Dell EqualLogic Group Manager Administrator's Guide for more information about failback.
Variables
Variable Description
volume_name Name of a volume
Parameters
Parameter Description
remote-rep-reserve n% Specifies the replica reserve for the volume, which is the portion of
delegated space allocated for storing the volumes replica set. The
replica reserve is based on a percentage of the replica volume reserve.
The default is 200%; the minimum is 105%. You must specify the
percent sign.
See the Dell EqualLogic Group Manager Administrator's Guide for
information about sizing the replica reserve.
local-rep-reserve n% Specifies the local replication reserve, which is used during replication
and, optionally, for storing the failback snapshot. The local replication
reserve is based on a percentage of the volume reserve.
The default is 100%; the minimum is 5%. You must specify the percent
sign.
If you are not keeping the failback snapshot, the recommended value is
100%. If you are keeping the failback snapshot, the recommended value
is 200%.
borrow-space enable| Controls whether to temporarily use free pool space if the local
disable replication reserve is insufficient.
Enable this parameter (the default) if you specify less than the
recommended value for the local replication reserve.
Format
volume select volume_name replication pause partner_name
Variables
Variable Description
volume_name Name of a volume
Example
Pause replication of a volume to a partner:
Format
volume select volume_name replication resume partner_name
Variables
Variable Description
volume_name Name of a volume
You can also choose to keep a failback snapshot in local replication reserve space.
NOTE: When a volume replication data transfer is in progress, you can reduce the local replication
reserve only if the new local replication reserve size is more than what is currently being used to
track volume changes.
When a volume replication data transfer is in progress, you can reduce the replica reserve only if the
new replica reserve size is more than what is currently being used to store the replica set. Or, you
can delete replicas (oldest first) to free up replica reserve space and then reduce the size of the
replica reserve.
Format
volume select volume_name replication select partner_name show | [parameter]
Variables
Variable Description
volume_name Name of a volume
Parameters
Parameter Description
borrow-space enable| Controls whether to temporarily use free pool space if the local
disable replication reserve is not big enough.
Enable this parameter if you specify less than the recommended value
for the local replication reserve.
keep-failback enable| Enables or disables keeping a failback snapshot for the volume.
disable
You must create a replica to set the failback baseline.
local-rep-reserve n% Specifies the local replication reserve, which is used during replication
and, optionally, for storing the failback snapshot. The local replication
reserve is based on a percentage of the volume reserve.
If you are not keeping the failback snapshot, the recommended value is
100%. If you are keeping the failback snapshot, the recommended value
is 200%.
remote-rep-reserve n% Specifies the replica reserve for the volume, which is the portion of
delegated space allocated for storing the volumes replica set. The
replica reserve is based on a percentage of the replica volume reserve.
The minimum is 105%. You must specify the percent sign.
See the Dell EqualLogic Group Manager Administrator's Guide for
information about sizing the replica reserve.
Replication Status
Table 5. Volume Replication Status lists possible replication status values for a volume in the output of the
show subcommand.
Status Description
disabled Replication of the volume has been disabled manually.
Example
Show the replication configuration for a volume on a partner:
Format
volume select volume_name replication show
Variable
Variable Description
volume_name Name of a volume
Schedules can create snapshots or replicas on an hourly, daily, or weekly basis. For example, you can set
up a schedule that creates a snapshot or replica once a day, once a week, or every 2 hours during work
hours.
Do not configure a replication schedule to start before you have completed the first transfer, if using
manual replication. The scheduled replication will be skipped if the first transfer is not complete.
NOTE: Using a schedule can result in the creation of many snapshots or replicas. To control the
number of snapshots or replicas, use the max-keep parameter when creating a schedule. In
addition, the size of the snapshot reserve limits the number of snapshots that you can create for a
volume, and the size of the replica reserve limits the number of replicas you can create for a
volume.
Format
volume select volume_name schedule subcommand
Variable
Variable Description
volume_name Name of a volume
Subcommands
Subcommand Description
create Creates a schedule
To configure a replication schedule on a volume, the volume must already be configured for replication
to the partner you will specify for the schedule. If you are using manual transfer replication for the first
replication, do not configure a replication schedule to start before you have completed the first transfer.
The scheduled replication will be skipped if the first (manual) transfer is not complete.
Schedule name
Schedule type
Time to start creating the snapshots or replicas
Partner name (for replication schedules only)
Optionally, you can specify other parameters, based on the schedule type.
By default, the schedule will be a snapshot schedule unless you specify the partner parameter and a
valid partner name for the volume.
Format
volume select volume_name schedule create schedule_name parameter...
Variables
Variable Description
volume_name Name of a volume. Name can be up to 63 bytes and is case insensitive.
You can use any printable Unicode character except for ! " # $ % & ' ( ) *
+ , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last characters cannot be a
period, hyphen, or colon. Fewer characters are accepted for this field if
you enter the value as a Unicode character string, which takes up a
variable number of bytes, depending on the specific character.
start-time hh:mm[AM| Time when the schedule will start creating snapshots or replicas. Use
PM] 24-hour time or specify AM or PM. You must specify a start time.
end-time hh:mm[AM|PM] Time when the schedule will stop creating a sequence of snapshots or
replicas. Use 24-hour time or specify AM or PM.
Applies only to schedules of type daily.
read-write|read-only Permission for snapshots created from the schedule. The default is
read-write.
start-date mm/dd/yy Month, day, and year that the schedule will start. The default is the day
that the schedule was created (or the following day, if the starting time
has already passed).
end-date mm/dd/yy Month, day, and year that the schedule will stop. The default is no
ending date.
partner partner_name Name of the partner that will store replicas created through the
schedule. You must specify a partner for replication schedules.
Examples
Create a replication schedule that creates a replica of a volume on a partner every day at the same time:
> volume select db1 schedule create dailydb type daily start-time 11:30PM
repeat-interval 1days partner psgroup2
> volume select mail5 schedule create msnap type daily start-time 07:00AM end-
time 20:00 frequency 2hours repeat-interval 1days
Format
volume select volume_name schedule delete schedule_name
Variables
Variable Description
volume_name Name of a volume
Example
Delete a schedule:
Format
volume select volume_name schedule rename schedule_name new_name
Variables
Variable Description
volume_name Name of a volume
Example
Rename a schedule:
Format
volume select volume_name schedule select schedule_name show|parameter ...
Variables
Variable Description
volume_name Name of a volume
schedule_name Name of a schedule. If the schedule name contains spaces, enclose the
name in quotation marks (for example, daily schedule).
Parameters
Parameter Description
enable|disable Enables or disables the schedule
end-date mm/dd/yy Month, day, and year that the schedule will stop
end-time hh:mm[AM|PM] Time when the schedule will stop creating a sequence of snapshots or
replicas. Use 24-hour time or specify AM or PM.
Applies only to schedules of type daily.
start-date mm/dd/yy Month, day, and year that the schedule will start
start-time hh:mm[AM| Time when the schedule will start creating snapshots or replicas. Use
PM] 24-hour time or specify AM or PM.
Examples
Change the time that snapshots of a volume are created with a schedule:
Format
volume select volume_name schedule show [schedule_name]
Variables
Variable Description
volume_name Name of a volume
schedule_name Name of a schedule. If the schedule name contains spaces, enclose the
name in quotation marks (for example, schedule for daily backups).
Format
volume select volume_name show | [parameter]
Variable
Variable Description
volume_name Name of a volume
Parameters
Parameter Description
access Basic access points
snapshots Snapshots
Requested status (Table 6. Requested Volume Status), which is set by the administrator and can be
changed using commands
Current status (Table 7. Current Volume Status), which describes the actual status of the volume
Status Description
online Administrator set the volume online. Authorized hosts can access the
volume.
offline Administrator set the volume offline. Hosts cannot access the volume.
online-lost-cached- Administrator set the volume online with lost blocks. Authorized hosts
blocks can access the volume. If an application tries to read a lost block, an
error occurs. If the block is rewritten, no error occurs, and the block no
longer is marked as lost.
offline-lost-cached- Volume was automatically set offline because blocks were lost.
blocks
Solution: Choose how to manage the lost blocks.
offline-max-grow-met Volume was automatically set offline because the in-use volume
reserve reached the maximum in-use value.
Solution: Increase the value of the maximum in-use space level for the
volume. You can also add more space to the pool (by adding a
member).
offline-member-down Volume was automatically set offline because a member that contains
volume data is down or cannot be reached by the other members over
the network.
Solution: Identify and correct the problem that caused the member to
become unreachable.
offline-nospace-auto- Volume was automatically set offline because the pool does not have
grow enough free space for the thin-provisioned volume to increase.
offline-snap-reserve- Volume was automatically set offline because the reserved snapshot
met space was used and the snapshot recovery policy dictates that the
volume be set offline.
Solution: Increase the amount of reserved snapshot space. See volume
select.
Examples
Show detailed information about a volume:
Display the pool-specific information for a volume with synchronous replication enabled:
______________________________________________________________________________
_____________________ Volume syncpool Pool Information _______________________
VolReserveInUse: 0MB Snap-Reserve-Avail: 100% (20GB)
Snapshots: 1 Bind:
Transmitted-Data: 0MB Received-Data: 0MB
ActualMembers: 1 Pref-Raid-Policy-Status: none
______________________________________________________________________________
______________________ Volume default Pool Information _______________________
VolReserveInUse: 0MB Snap-Reserve-Avail: 100% (20GB)
Snapshots: 2 Bind:
Transmitted-Data: 0MB Received-Data: 0MB
ActualMembers: 1 Pref-Raid-Policy-Status: none
______________________________________________________________________________
______________________________ Access Records ________________________________
ID Initiator Ipaddress AuthMethod UserName Apply-To
--- --------------------------- --------------- ---------- ---------- --------
Before you shrink a volume, make sure that the container, host, or application using the volume can
accept changing the size of a volume. Also, stop or quiesce applications using the volume, unmount
containers on the volume, and set the volume offline.
Decreasing the volume size might also decrease the snapshot reserve and local replication reserve,
because they are based on the volume reserve.
NOTE: If decreasing a volume size will result in the deletion of snapshots from the snapshot reserve,
the group will increase the snapshot reserve percentage. For example, if you shrink a 100GB volume
(no thin provisioning), with a 100 percent snapshot reserve that has 80GB in use by snapshots, to
50GB, a 100 percent snapshot reserve now represents only 50GB of snapshot reserve. Therefore,
the group will increase the snapshot reserve percentage to 160 percent to avoid deleting snapshots.
To leave the snapshot reserve percentage unchanged, even if it results in deleted snapshots, specify
the no-adjust-snap-resv parameter.
By default, a snapshot of the volume is created before the volume size is decreased. Specify the no-snap
parameter to skip the creation of a snapshot.
Format
volume select volume_name shrink new_size [parameters]
new_size[unit] New smaller size for the volume. Size is in megabytes unless you specify
otherwise. You can specify size with any of the following suffixes: m,
mb, MB, g, gb, or GB.
Parameters
Parameter Description
no-snap Does not create a snapshot of the volume before reducing its size
no-adjust-snap-resv Maintains the same percentage of snapshot reserve for the volume,
based on the new volume size. Might result in the loss of snapshots.
Example
The following commands set a volume offline and shrink it from 100GB to 50GB, creating a snapshot:
Be sure the container and/or application using the volume supports volumes
getting smaller. Shrinking a volume could result in losing data. Using the no-
adjust-snap-resv option can result in losing old snapshots. Do you really want
to continue? (y/n) [n] y
Creating snapshot.
The new size will not be recognized by hosts currently connected to the volume unless they support
container expansion. Before increasing the volume size, understand the possible effect on the operating
system, container, or application using the volume, and set the volume offline first if necessary for your
environment.
NOTE: Some operating systems cannot support volumes larger than 2TB. A warning message is
displayed when you try to increase a volume beyond 2TB. Make sure your operating system will
recognize the new, larger volume size.
If you specify a size larger than the amount of available pool space, an error message shows the actual
available space.
Format
volume select volume_name size new_size [no-snap]
Variables
Variable Description
volume_name Name of a volume
new_size[unit] New, larger size for the volume. Size is in megabytes unless you specify
otherwise. You can specify size with any of the following suffixes: m,
mb, MB, g, gb, or GB.
Parameter
Parameter Description
[no-snap] (Optional) Prevents a snapshot of the volume from being created before
the size of the volume is increased
Examples
Increase the size of a volume:
Format
volume select volume_name snapshot subcommand
Variable
Variable Description
volume_name Name of a volume
show Shows all the volumes snapshots or details for a specific snapshot
Format
volume select volume_name snapshot create-now [parameter...]
Variable
Variable Description
volume_name Name of a volume
Parameters
Parameter Description
offline|online Snapshot status (default is offline)
Format
volume select volume_name snapshot delete snapshot_name
Variables
Variable Description
volume_name Name of a volume
Example
Delete a snapshot:
Format
volume select volume_name snapshot rename snapshot_name new_name
Example
Rename a snapshot:
Format
volume select volume_name snapshot select snapshot_name subcommand |
parameter...
Variables
Variable Description
volume_name Name of a volume
Subcommands
Subcommand Description
clone Clones a snapshot to create a new volume
iscsi-alias alias iSCSI target alias for the snapshot, up to 63 ASCII characters. Some
iSCSI initiators can see this alias.
lost-blocks action Default policy when a snapshot has lost cache blocks. Either:
return-errorSets the snapshot online but retains the lost
cached block state. If an application tries to read a lost block, an
error occurs. If the block is rewritten, no error occurs, and the
snapshot state is changed to online-lost-cached-blocks.
mark-validMarks the lost blocks as valid and sets the snapshot
online. This action might present a security risk, and the blocks
might contain old data.
NOTE: Lost cached blocks can occur if a power failure lasts longer
than 72 hours.
read-only|read-write Makes the snapshot readable only, or both readable and writable
Examples
Set a snapshot online:
By default, new standard volumes are set online with read-write permission, and use the groupwide
snapshot space and iSCSI settings.
The new volume is in the same pool as the original volume. The snapshot remains available.
Format
volume select volume_name snapshot select snapshot_name clone new_volume
[parameters]
Variables
Variable Description
volume_name Name of a volume
Parameters
Parameter Description
bind member Binds the new volume to the specified member. Volume data will be
restricted to this member.
Binding a volume to a member overrides any RAID preference for the
volume.
iscsi-alias alias iSCSI target alias for the snapshot, up to 63 ASCII characters. Some
iSCSI initiators can see the alias.
The default alias is the groupwide setting (see grpparams def-iscsi-
alias).
snap-depletion action Specifies the default snapshot space recovery policy, either delete-
oldest (delete the oldest snapshots; the default) or volume-offline
(set the volume and its snapshots offline).
The default policy is the groupwide setting (see grpparams def-snap-
depletion).
snap-warn n% Threshold at which an alarm occurs because the amount of free space
reserved for snapshots of the new volume has fallen below this value, as
a percentage of the snapshot reserve. You must include the percent
sign (%).
The default threshold is the groupwide setting (see grpparams def-
snap-warn).
unrestricted Grants unrestricted host access to the new volume. Unrestricted access
is not recommended. Instead, after cloning the snapshot, you should
create one or more basic access points for the volume to restrict host
access. See volume select access create.
Example
Clone a snapshot, creating a new volume:
The restored volume contains the data that was in the volume at the time the snapshot was created and
has the original volume name and iSCSI target name.
NOTE: Before restoring a volume from a snapshot, disconnect any iSCSI initiators from the volume.
Follow the instructions for your operating system and initiator. Otherwise, the restored volume
might be corrupted when initiators reconnect to it.
The restored volume belongs to the same pool as the original volume.
Format
volume select volume_name snapshot select snapshot_name restore
Variables
Variable Description
volume_name Name of a volume
Example
Restore a volume from a snapshot:
Format
volume select volume_name snapshot select snapshot_name show [connections]
Variables
Variable Description
volume_name Name of a volume
Example
Show detailed information about a snapshot:
Table 8. Current Snapshot Status lists the possible values for the current status of a snapshot (Status
field).
offline Administrator set the snapshot offline. Hosts cannot access the
snapshot, but no failures have occurred.
offline-lost-cached- Snapshot was automatically set offline because lost blocks have
blocks occurred. Hosts cannot access the snapshot.
Solution: Choose how to manage the lost blocks. See volume select
snapshot select.
offline-member-down Snapshot was automatically set offline because a member that contains
snapshot data is down or cannot be accessed by the other members
over the network. Hosts cannot access the snapshot.
Solution: Identify and correct the problem that caused the member to
become unreachable.
offline-snap-reserve- Snapshot was automatically set offline because the reserved snapshot
met space has been used and the snapshot recovery policy dictates that the
snapshots be set offline. Hosts cannot access the snapshot.
Solution: Increase the amount of reserved snapshot space. See volume
select.
offline-max-grow-met Volume and its snapshots were set offline because the in-use volume
reserve reached the maximum in-use value.
Solution: Increase the value of the maximum in-use space level for the
volume (see volume select) or increase the volume size.
Table 9. Requested Snapshot Status lists the possible values for the requested status of a snapshot, which
is set by an administrator (DesiredStatus field).
Status Description
online Administrator set the snapshot online. Authorized hosts can access the
snapshot.
offline Administrator set the snapshot offline. Hosts cannot access the
snapshot.
Format
volume select volume_name snapshot show [snapshot_name]
Variables
Variable Description
volume_name Name of a volume
Example
Display information about a snapshot:
Format
volume select volume_name snap-borrowing enable|disable [no-adjust-snap-reserve]
Variable
Variable Description
volume_name Name of a volume
no-adjust-snap-reserve (Optional) Maintains the same percentage of snapshot reserve for the
volume, based on the new volume size. Might result in the loss of
snapshots.
Examples
Enable snapshot space borrowing for a volume:
Enable snapshot space borrowing for a volume, without changing the existing snapshot reserve value:
Format
volume select volume_name sync-rep subcommand | parameter
Variable
Variable Description
volume_name Name of a volume
Parameter
Parameter Description
sync-active-offline Sets the volume offline and prevents new connections to the
pool_name SyncActive pool
Subcommands
Subcommand Description
disable Disables synchronous replication
switch pool_name Changes the SyncActive pool for the volume to the specified pool
Examples
Enable synchronous replication on a volume in the specified pool:
Set the volume offline and prevent access to the SyncActive pool:
Show summary information about synchronous replication for the specified volume:
Show detailed information about the SyncActive and SyncAlternate pools for the specified volume:
Format
volume select volume_name sync-rep failover pool_name [force]
Variables
Variable Description
volume_name Name of a volume
pool_name Name of the storage pool that will become the new SyncActive pool
Parameter
Parameter Description
force Force failover even if no members in the current SyncActive pool are
online
Format
volume select volume_name tag assign tag_name[=tag_value]
Variables
Variables Description
volume_name Name of the volume to which you want to assign a tag
tag_name[=tag_value] Name of the selected tag and an optional value. If you do not specify a
value, the tag becomes a simple tag.
Format
volume select volume_name tag create tag_name[=tag_value]
Variables
Variables Description
volume_name Name of the volume for which you want to create a tag
tag_name[=tag_value] Name of the new tag and an optional value. If you do not specify a
value, the tag becomes a simple tag and has no value associated to it.
Example
Create a tag for a volume:
Format
volume select volume_name tag show
Variable
Variable Description
volume_name Name of the volume for which you want to show tag information
Example
Show the tags associated to a volume:
Format
volume select volume_name tag unassign tag_name
Variables
Variables Description
volume_name Name of the volume that you want to unassign a tag from
Example
Disassociate a tag from a volume:
Format
volume show -tag [tag_name_1=tag_value_1,
tag_value_2, ...>;<tag_name_2=tag_value_1, tag_value_2,...]
Variable
Variable Description
tag_name[=tag_value] Name of the simple tag or tag with values that you want to show
Example
> volume show -tag tagtest=tag1;Marketing=Technical
Formats
volume show volume_name
volume show [-poolinfo] [-template] [-volume]
Variable
Variable Description
volume_name Name of a volume
Parameters
NOTE: Parameters can be specified in any order and any combination. However, if you specify both
-template and -volume, all volumes are displayed (-volume takes precedence).
Parameter Description
-poolinfo Includes the pool information in the command output. Cannot be used
when specifying a volume name.
-template Displays only the template volumes in the group. Cannot be used when
specifying a volume name.
When used with -poolinfo, shows the pool information for the
template volumes.
-volume Displays only regular volumes in the group (does not include template
volume information). Cannot be used when specifying a volume name.
When used with -poolinfo, shows the pool information for the
volumes.
Examples
Display all volumes on the group:
If you do not have a network connection, connect the serial cable that was shipped with the array to the
serial port on the active control module (ACT LED is lit and green) and to a console or computer running
a terminal emulator.
9600 baud
1 STOP bit
No parity
8 data bits
No hardware flow control
clearlostdata
Clears lost data blocks on an array.
CAUTION: Before using the clearlostdata command, contact your support provider.
You use the clearlostdata command when blocks have been lost, but the array does not know which
blocks have been lost. In this case, the array is not able to boot or is no longer accessible from the
network.
To access the CLI to run the clearlostdata command, see Running Array Management Commands.
After connecting to the array (either through a serial connection or a network connection to an IP
address for a network interface), press the Enter key and log in to a group administration account that has
The clearlostdata command might or might not be able to correct the entire lost blocks problem. In
some cases, the problem might be corrected enough to boot the array. If volumes remain offline, you
might not be able to recover the data on them. In these cases, you must delete the volumes, recreate
them, and recover the data from a backup or replica.
If the array is a member of a group and the clearlostdata command does not resolve the problem, the
array will not boot and you might have to delete the member from the group. If you delete the member,
the array will be reset and returned to its factory defaults. Delete an offline member only in extreme
circumstances, because resetting the array will remove any data on the array. See member delete.
Format
clearlostdata
Example
Log in to the grpadmin account from a console terminal and run the clearlostdata command on the
array:
login: grpadmin
Password:
Welcome to Group Manager
Copyright 2001-2013 Dell Inc.
Data loss has occurred. The array will not initialize until the error condition
has been cleared.
> clearlostdata
cleaning luns
raid firing scan complete
.
.
.
>
diag
Collects diagnostic information from an array and sends it in an email message to your support provider.
Run the diag command only if instructed by your support provider.
NOTE: The diag output does not contain any data from user volumes in any form. This command
also does not collect any diagnostic data for a NAS cluster, if configured.
You can retrieve data collected from the diag command as follows:
Email If email event notification is enabled, and if at least one Ethernet interface on the array is up
and operational, the diag command output is automatically mailed to the email addresses configured
for notification or to those you specify with the -e option. The output is sent in one to eight separate
email messages, which are encoded for efficient transmission and are not human-readable. See
grpparams email-notify for information about configuring email event notification.
If a problem occurs between the SMTP server and the destination email client, the messages might
not be sent.
FTP or SCP If email notification is not enabled, or if the messages are not sent, you can log in to the
array with FTP or SCP and retrieve the files manually. However, this method relies on having at least
To access the CLI to run the diag command, see Running Array Management Commands.
After connecting to the array (either through a serial connection or a network connection to an IP
address for a network interface), press the Enter key and log in to a group administration account that has
read-write permission (for example, the grpadmin account). At the CLI prompt, enter the diag command.
Format
diag [support_arguments]
The available arguments will be explained by your support provider, who will guide you in using this
command. All options used must be enclosed in one set of quotation marks.
Examples
When prompted, enter the grpadmin account and password. Specify the diag output file with the mget
command.
$ ftp
ftp> open 192.0.2.46
Connected to 192.0.2.46.
220 192.0.2.46 FTP server ready.
User: grpadmin
331 Password required for grpadmin.
Password:
230 User grpadmin logged in.
Using binary mode to transfer files.
ftp> mget Seg_*.dgo
mget Seg_1.dgo? y
227 Entering Passive Mode (192,0,2,46,255,102)
150 Opening BINARY mode data connection for 'Seg_1.dgo' (614247 bytes).
226 Transfer complete.
614247 bytes received in 1.33 secs (4.5e+02 Kbytes/sec)
mget Seg_2.dgo? y
227 Entering Passive Mode (192,0,2,46,255,101)
150 Opening BINARY mode data connection for 'Seg_2.dgo' (880243 bytes).
226 Transfer complete.
ping
Verifies connectivity from an array to other hosts on the network.
For example, you can use the ping command to test connectivity from an array to the host bus adapters
(HBAs) or NICs on a server. The command is also useful for verifying connectivity to the groups SMTP
server, NTP server, or default gateway.
If multiple network interfaces are configured on an array, you can specify the network interface from
which you want to test connectivity. If you do not specify a network interface on the array, any
configured interface will be used.
To access the CLI to run the ping command, see Running Array Management Commands.
After connecting to the array (either through a serial connection or a network connection to an IP
address for a network interface), press the Enter key and log in to a group administration account that has
read-write permission (for example, the grpadmin account). At the CLI prompt, enter the ping command.
Format
ping [arguments]
Variable
Variable Description
arguments String consisting of arguments to the command enclosed in quotation
marks ().
To see all the valid arguments, run ping with no arguments.
Example
The following ping commands test connectivity from an array to a server and from a specific network
interface on an array to a server:
^C
----192.0.2.26 PING Statistics----
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 0.000/0.000/0.000/0.000 ms
ping6
Verifies connectivity from an array to other hosts on the IPv6 network.
For example, you can use the ping6 command to test connectivity from an array to the host bus adapters
(HBAs) or NICs on a server. The command is also useful for verifying connectivity to the groups SMTP
server, NTP server, or default gateway.
If multiple network interfaces are configured on an array, you can specify the network interface from
which you want to test connectivity. If you do not specify a network interface on the array, any
configured interface will be used.
To access the CLI to run the ping6 command, see Running Array Management Commands.
After connecting to the array (either through a serial connection or a network connection to an IPv6
address for a network interface), press the Enter key and log in to a group administration account that has
read-write permission (for example, the grpadmin account). At the CLI prompt, enter the ping6
command.
Format
ping6 [arguments]
Variable
Variable Description
arguments String consisting of arguments to the command enclosed in quotation
marks ().
To see all the valid arguments, run ping6 with no arguments.
Examples
The following command tests connectivity between an array and an IPv6 host address on the network:
reset
Resets an array to the factory defaults (original condition).
The reset command shows a confirmation message to which you must agree before it starts the
operation and, in a multimember group, logs an event message on the remaining members.
CAUTION: Before resetting an array, call your PS Series support provider. The reset command
irretrievably removes all group, member, and volume configuration information and any volume
data on the array. The array will not be able to connect to a group until you add it to the group.
If an array is a member of a multimember group, use the member delete command to remove the
member from the group, which automatically runs the reset command. Volume data on the array is
automatically moved to the remaining group members if possible. See member delete.
If the array is the only remaining member of a group, run the reset command. (You cannot use the
member delete command on the last member of a group.)
To access the CLI to run the reset command, see Running Array Management Commands.
When you are connected to the array (either through a serial connection or a network connection to an
IP address for a network interface), press the Enter key and log in to a group administration account that
has read-write permission (for example, the grpadmin account). At the CLI prompt, enter the reset
command. When you agree to reset the array, network connections are closed.
Format
reset
Example
When you run the reset command and agree to the operation, the network connection closes:
login: grpadmin
restart
Shuts down and restarts an array.
Restarting an array has no effect on member, volume, or group configuration information or volume
data. When the restart completes, the member rejoins the group automatically. Volumes with data
located on the member will be unavailable until the restart completes.
NOTE: Restart an array only when you are updating the array firmware. Do not restart an array
repeatedly.
To access the CLI to run the restart command, see Running Array Management Commands.
When you are connected to the array (either through a serial connection or a network connection to an
IP address for a network interface), press the Enter key and log in to a group administration account that
has read-write permission (for example, the grpadmin account). At the CLI prompt, enter the restart
command.
When you restart an array, network connections are closed and the array is shut down. Then, the array
restarts automatically.
NOTE: If you physically connect a serial cable to the secondary control module and run the restart
command, only the secondary control module will be restarted.
To restart both control modules, connect the cable to the active control module (ACT LED will be
green) and run the restart command. Then, connect the cable to the other control module (now the
active control module) and run the restart command again.
Format
restart
login: grpadmin
Password:
psg22> restart
Do you really want to restart the system? (yes/no) [no] yes
Connection closed by foreign host.$
setup
Configures an array as either the first member of a new group or as an additional member to an existing
group.
NOTE: If you are adding multiple members to an existing group, or creating a new group with
multiple members, run the setup command on one array at a time. Wait until the new group is
created with one member or until each new member is added to an existing group before adding
the next member.
Format
setup [ipv6] [def_dcb_vlan_id] [show-version]
Options
Option Description
ipv6 Sets up a group to use IPv6 addresses
def_dcb_vlan_id Sets up a group to use data center bridging (DCB) or adds a member to
a group already using DCB. Enter an ID in the range of 0 to 4095. The
default is 2.
When adding a member to an existing group, the new member must use the same protocol as the group.
If the member is joining an IPv6 group, specify the ipv6 option with the command.
Both groups must use a common protocol for replication to succeed. For example, if one group uses
only IPv4 and the other group can use either IPv4 or IPv6, replication is supported. If one group uses only
IPv4 and the other uses only IPv6, replication is not supported.
For more information about the supported protocol configurations on replication partners, see partner
create.
IPsec is not enabled automatically when creating a new group. It must be enabled manually after the
group has been created.
If you attempt to add a member that does not support IPsec to an existing group in which IPsec is used,
setup will be unable to add the member to the group. See the Dell EqualLogic PS Series Storage Arrays
Release Notes for information about which array models support IPsec.
During the setup process, you might see a series of repeating error messages. For example:
# 3255:1361:quicksecpm:17-May-2015
13:37:22.431122:util_render.c:254:ERROR::65.4.1:IPsec (IKEv2) negotiation
failed as responder to remote identity: '192.0.2.37: (null)', using local
identity: '192.0.2.37: (null)'.
3257:1363:quicksecpm:17-May-2015
13:37:22.431124:util_render.c:323:ERROR::65.4.7:The IPsec or IKE protocols or
algorithms proposed by the peer do not match what is available on the array.
You can safely ignore these messages. The member is being added to the group successfully. These error
messages will be removed in a future release.
To find the DCB VLAN ID of an existing group, log in to the Group Manager GUI or CLI.
In the GUI, click Group Group Configuration Advanced. The DCB VLAN ID is displayed in the
Network Management pane.
In the CLI, enter grpparams show. The DCB VLAN ID is displayed in the output.
By default, when you log in to an unconfigured array, the array prompts you to set it up. If you enter y,
the array starts the default setup operation. You must enter Ctrl-C to cancel out of the setup, and then
type the following command line at the prompt to enable DCB, specifying a number from to 4094,
inclusive:
Examples
> setup
Group Manager Setup Utility
The setup utility establishes the initial network and storage configuration for
a storage array and then configures the array as a member of a new or existing
group of arrays.
Enter the IP address and name of the group that the array will join.
Searching to see if the group exists. This may take a few minutes.
The group does not exist or currently cannot be reached. Make sure
you have entered the correct group IP address and group name.
v4group>
> setup
login: grpadmin
Password:
Enter the IP address and name of the group that the array will join.
Searching to see if the group exists. This may take a few minutes.
The specified group exists with IPSec enabled. Will attempt to connect with
IPSec, which requires the membership password.
Do you want to add this array to group gigan38-grp (yes | no ) [yes]: yes
Synchronizing configuration data with the group. This may take several
minutes.--
Done
The first time you log in to an uninitialized array (when creating a new group or when adding a
member to a group),setup starts automatically and, by default, uses the IPv4 protocol. Cancel the
setup (enter n at the prompt that asks if you want to set up the array) and enter the command: setup
ipv6.
You do not have to enter an IP address for the network interface (eth0). Your router broadcasts
available addresses (shown during the setup) and the network interface uses one of those addresses.
No subnet mask is required or applicable for IPv6.
When creating a new group or specifying the group that a member will join, enter the group IP
address in IPv6 format (for example, fc00::abc1:def2:cba3:fed4) instead of IPv4 format (for
example, 192.0.2.33).
The following example shows how to set up a new group using the IPv6 protocol for the Ethernet 0
network interface and the group address. Note that you do not have to enter an IP address for the
Ethernet 0 interface. Press Enter at the prompt to let the interface use one of the broadcast addresses.
The group does not exist or currently cannot be reached. Make sure you have
entered the correct group IP address and group name.
Do you want to use the group settings shown above (yes | no) [yes]:
Do you want to use the group settings shown above (yes | no) [yes]: yes
Password for managing group membership:**********
Retype password for verification:**********
v6group>
shutdown
Cleanly shuts down an array.
Format
shutdown
NOTE: The shutdown command does not power off the array. To power off the array, you must
turn off both power supplies after the array shuts down.
When you are connected to the array (either through a serial connection to the active control module or
a network connection to an IP address for a network interface), press the Enter key and log in to a group
administration account that has read-write permission (for example, the grpadmin account). At the CLI
prompt, enter the shutdown command. After you agree to shut down the array, network connections are
closed and the array is shut down.
The shutdown procedure differs depending on the type of connection that you are using:
Network connections
The session will be disconnected before the array is shut down. Make sure that the ACT LED on each
control module is off (not lit) before turning off power to both power supplies.
Serial connections
The shutdown procedure differs depending on the type of controller that you are using:
Types 78, 1014, and 17 (for example, on PS6110 arrays)
When it is safe to turn off power to both power supplies, the system displays the following
message on the console:
Press any key to reboot.
To fully restart the array, turn power off, and then on, to both power supplies. When the array
restart completes, volumes will be set online.
NOTE: If you physically connect a serial cable to the secondary control module and run the
shutdown command, only the secondary control module will be shut down. To shut down both
control modules, connect the serial cable to the active control module (ACT LED will be green)
and run the shutdown command.
Example
When you run the shutdown command and agree to the operation, the network connection closes.
login: grpadmin
Password:
update
Updates array firmware.
A storage array includes single or dual control modules, each with a compact flash or microSD card
running the firmware. You should always run the latest storage array firmware to take advantage of new
product features, enhancements, and fixes. All group members must be running the current firmware
version for the latest features and fixes to known issues for the update to take effect.
NOTE: If the group has the Email Home feature enabled, email is sent to customer support when
you update the group members. To prevent this action, temporarily disable the Email Home feature
(either in the GUI or with the grpparams email-contact command) or, during the update, respond
with no to the prompt asking whether to send email to customer support. See the example below.
Requirements
Read Updating Firmware for Dell EqualLogic PS Series Storage Arrays and FS Series Appliances on the Dell
support site for prerequisites, instructions, limitations, and supported upgrade paths for updating array
firmware. Also read the current Dell EqualLogic PS Series Storage Arrays Release Notes before starting the
update.
Format
update
Example
The following example shows the update process.
glasgow> update
13:36:51 Updating from kit file "kit_V6.0.0-R257672_1974509013.tgz"
This command will update the firmware on the array's flash card memory
using the update kit file that was copied to the array.
If you choose to proceed, you will be shown the current firmware version
and the version to which you will update. You will then be given the
choice to proceed again.
Brief description
Command format
Variables, subcommands, and parameters
Examples
alias
Performs text substitution.
Format
alias alias_name original_text
Variables
Variable Description
alias_name Text to use as the alias
Example
Create an alias to select member1:
clear
Clears the screen.
Format
clear
Format
cli-settings show|parameter
Parameters
Parameter Description
confirmation on|off Prompts (default) or does not prompt for confirmation for all
commands.
displayinMB on|off Shows group, volume, and member sizes in megabytes (default) or
gigabytes
events on|off Shows (default) or does not show events on the console
formatoutput on|off Formats (default) or does not format command output for show
commands
idlelogout on|off Enables or disables automatic logout of a CLI session that has been
inactive for 60 minutes
paging on|off Shows one screen (page) of output at a time and prompts you to show
the next screen (default) or shows all the output at once
reprintBadInput on|off Specifies whether or not to reprint erroneous command-line input back
to the CLI during telnet sessions to the group. Default is on (bad input
will be reprinted).
Examples
Turn on displayinMB:
exec
Runs the commands contained in a CLI script file (a file containing other CLI commands). A script can
change terminal settings, perform basic group administration tasks, and collect system information.
NOTE: Make sure you are in the usr subdirectory when you put the script file on the array, as shown
in the example below, whether using the ftp command line or Windows Explorer.
Format
exec [parameter] [path]/filename
Parameters
Parameter Description
-echo Echoes contents of the file during execution
Variables
Variable Description
filename Name of the file to execute.
Examples
C:\Users\george>ftp 192.0.2.45
Connected to 192.0.2.45.
220 192.0.2.45 FTP server (NetBSD-ftpd 20040809) ready.
User (192.0.2.45:(none)): grpadmin
331 Password required for grpadmin.
Password:
230 User grpadmin logged in.
ftp> dir
200 PORT command successful.
150 Opening ASCII mode data connection for '/bin/ls'.
total 90
-rw------- 1 0 0 67 Feb 18 15:45 .bash_history
-rw-r--r-- 1 0 0 10944 Feb 18 17:50 gigan-grp-config
-rw-r--r-- 1 0 0 10944 Feb 18 17:50 gigan-grp-config.cfg
-rw-r--r-- 1 0 0 9559 Feb 18 17:50 index.html
-rw-r--r-- 1 0 0 10944 Feb 18 17:49 mrtg.cfg
drwxrwxrwx 2 0 0 512 Feb 9 11:22 usr
226 Transfer complete.
ftp: 326 bytes received in 0.00Seconds 108.67Kbytes/sec.
ftp> cd usr <-- Make sure you change to the usr directory.
250 CWD command successful.
ftp> put script.txt
200 PORT command successful.
150 Opening BINARY mode data connection for 'script.txt'.
226 Transfer complete.
ftp: 34 bytes sent in 0.20Seconds 0.17Kbytes/sec.
ftp> dir
200 PORT command successful.
150 Opening ASCII mode data connection for '/bin/ls'.
total 2
-rw-r----- 1 1001 0 34 Mar 3 14:59 script.txt
226 Transfer complete.
ftp: 60 bytes received in 0.00Seconds 60.00Kbytes/sec.
ftp> bye
221-
Data traffic for this session was 34 bytes in 1 file.
Total traffic for this session was 1211 bytes in 3 transfers.
221 Thank you for using the FTP service on 192.0.2.45.
C:\Users\george>
Running a Script
Run the script myScript.txt, which displays the following information:
exit
Moves the user up one or all command levels from subcommand mode.
Format
exit [all]
help
Shows information about CLI commands.
You can obtain help on any of the group administration, array management, or global commands. You
can also get information about the available editing keystrokes.
Format
help command [commands|edit]
Variable
Variable Description
command Name of command for which to show help
Subcommands
Subcommand Description
commands Shows the global CLI commands with help text
Examples
Show help on the account CLI command:
history
Shows the CLI command history for the current user since the current login session began.
Format
history
Example
> history
1 tree -syntax grpparams session-banner
2 pool show
3 show collections
4 show chapuser
5 show grpparams
6 show account
7 show account active
8 show alerts
9 show audit-log
10 show mem
11 show member -poolinfo
12 show member panda31
13 show nas-cluster
14 show pool
15 show pool default
16 pool select default show
17 show recentevents
18 show snapcol
19 show usersessions
20 vol show
21 vol sel cwreptest replication select capecodshow
22 vol sel cranberry replication select capecod show
23 volume show
logout
Logs out an administration account user from the group.
Format
logout
stty
Shows or changes the terminal settings.
Format
stty parameter ...
Parameters
Parameter Description
rows n Sets the screen height. The n variable indicates the number of rows and
must be an integer from 10 to 254, inclusive.
columns n Sets the screen width. The n variable indicates the number of columns
and must be an integer from 20 to 255, inclusive.
hardwrap on|off Turns on (default) or off wrapping the output at the screen width
Example
Show the current terminal settings:
tree
Shows the CLI command syntax in a tree structure, optionally showing the complete command syntax.
Format
tree [-syntax] [command]
Examples
The following example shows part of the output from a tree -syntax command:
The following example shows only the basic syntax of the failback command:
failback
|
+---retry
|
+---show
|
+---start
|
+---stop
whoami
Shows the account name of the logged-in user.
NOTE: This command shows only the name of the account, not the account type. For information
about displaying all account names and their types (privilege levels), see the account show
command.
Format
whoami
> whoami
grpadmin
Basic FluidFS cluster information (site configuration information, client network parameters, and
Ethernet connections)
System version information (model, version, and date)
BIOS version for each controller
FluidFS system health status
Services that appear to have problems
General diagnostic information Provides a brief summary of the system
Quick diagnostics Runs multiple commands at one time
Network tools Verify network settings and NIC information
Disk tools Provide the following information:
NOTE: Run this tool only under the supervision of your support provider.
1. Using ssh, log in to the support account on the FluidFS system. The password is the grpadmin
password. For example:
ssh support@TestSys
The main menu appears with the options shown in the following table.
To use a menu option, select the menu item, click the OK button, and press the Enter key.
If you are directly connected to the FluidFS system and have a mouse, or if you are connected
remotely and your terminal emulator program and connection protocol support mouse control, you
might be able to choose menu items and action buttons by using the mouse to point and click.
Mouse support depends on your particular configuration. (Try using your mouse to determine if it is
supported by your configuration.) To execute a menu option using the mouse, click the menu item
to select it and then click the OK button.
NOTE: Double-clicking is not supported. It has the same effect as a single click.
system-version Displays system model and file system information, along with the s
date of installation
1. Select basic_cluster_info from the Cluster menu, click OK, and press Enter.
2. When you are done viewing the information, click OK and then press Enter to return to the Cluster
menu.
1. Select system-version from the Cluster menu, click OK, and press Enter.
2. When you are done viewing the information, click OK and then press Enter to return to the Cluster
menu.
1. Select bios-version from the Cluster menu, click OK, and press Enter.
2. To view the BIOS version information for a specific node, click OK and then press Enter.
The BIOS Version window appears. You can select a specific node from this window or return to the
Cluster or main menu. When you are done viewing the information, click OK and then press Enter to
return to the Cluster menu.
1. Select system-status from the Cluster menu, click OK, and press Enter.
2. When you are done viewing the information, click OK, and then press Enter to return to the Cluster
menu.
1. Select problem-services from the Cluster menu, click OK, and press Enter.
2. When you are done viewing the information, click OK and then press Enter to return to the Cluster
menu.
After running diagnostic tests, you can also upload the log file using FTP to a local machine.
The Diagnostics menu includes the options shown in the following table.
1. Select Ftp_SystemDiags from the Diagnostics menu, click OK, and press Enter.
2. Enter the IP address of an FTP server, click OK, and press Enter.
3. Enter the name of the remote folder for the FTP upload, click OK, and press Enter.
4. Enter an FTP user name, click OK, and press Enter.
5. Enter the password for the FTP user, click OK, and press Enter.
6. The FTP Status screen shows whether the FTP operation connected or not. If it connected, the
success / fail status appears.
Current status
Last run (date and time the diagnostics were last run)
General system diagnostics file (file name for the diagnostics file)
File size (size of the diagnostics file)
Log diagnostics file
File size (size of the log diagnostic file)
1. Select General Diagnostics from the Diagnostics menu, click OK, and press Enter.
2. In the General System Diagnostics Results window, select YES.
An information message appears, stating that the operation might take up to 10 minutes.
1. Select QuickDiagnostics from the Diagnostics menu, click OK, and press Enter.
2. In the Quick Diagnostics window, select the node on which to run quick diagnostics (node 0 or 1),
click OK, and press Enter.
An information message appears, stating that the operation might take up to 5 minutes. The exact
name of the log file that is created is displayed along with the FTP address where you can download
the log file.
3. The Quick Diagnostic tool returns the following results:
Product name
Product version
System status for both nodes
General system status:
1. From the Network menu, select network_verification, click OK, and press Enter.
The verification results are displayed.
2. When you are done viewing the information, click OK and then press Enter to return to the Network
menu.
To ping an IP address:
1. From the Network Ping menu, select ping, click OK, and press Enter.
2. Enter the IP address to ping in the IP address to ping field and click OK.
The ping results and statistics are displayed.
3. When you are done viewing the information, click OK and then press Enter to return to the Ping
menu.
1. From the Network Ping menu, select ping-s, click OK, and press Enter.
2. Enter the IP address to ping in the IP address to ping field and click OK.
The ping results and statistics are displayed.
3. When you are done viewing the information, click OK and then press Enter to return to the Ping
menu.
1. From the Network Ping menu, select ping-I, click OK, and press Enter.
2. Specify which NIC you want to ping from in the Choose one field.
3. Enter one of the NICs displayed above the field and click OK.
4. Enter the IP address to ping in the IP address to ping field and click OK.
The ping results and statistics are displayed.
5. When you are done viewing the information, click OK and then press Enter to return to the Ping
menu.
1. From the Network dialog box, select nic_info, click OK, and press Enter.
2. Select the option you want to view from the menu, click OK, and press Enter.
The results are displayed in a new window.
3. When you are done viewing the information, click OK and then press Enter to return to the Network
NIC menu.
1. From the Network dialog box, select nslookup, click OK, and press Enter.
2. Enter the host name to look up in the Hostname to look up field, click OK, and press Enter.
The results are displayed in a new window.
3. When you are done viewing the information, click OK and then press Enter to return to the Network
menu.
1. From the Network dialog box, select nslookup, click OK, and press Enter.
2. Enter the name of the host to look up in the Hostname to look up field.
The results are displayed in a new dialog box.
3. When you are done viewing the information, click OK and then press Enter to return to the Network
menu.
1. From the Dell Support Diagnostic Tool Disk dialog box, select multipath, click OK, and press
Enter.
2. Select the node to display multipath information about (either node 0 or node 1), click OK, and press
Enter.
The results are displayed in a new window.
3. To return to the Disk Tools menu, select Disk, click OK, and then press Enter.
To return to the main menu, select Main, click OK, and then press Enter.
1. From the Dell Support Diagnostic Tool Disk dialog box, select lsscii, click OK, and press Enter.
2. Select the node to display iSCSI information for (either node 0 or node 1), click OK, and press Enter.
The results are displayed in a new window.
3. To return to the Disk Tools menu, select Disk, click OK, and press Enter.
To return to the main menu, select Main, click OK, and press Enter.
1. From the Dell Support Diagnostic Tool Disk dialog box, select discovery_ip, click OK, and press
Enter.
The results are displayed in a new window.
2. To return to the Disk Tools menu, select Disk, click OK, and press Enter.
To return to the main menu, select Main, click OK, and press Enter.
1. From the Dell Support Diagnostic Tool Disk dialog box, select lsscii, click OK, and press Enter.
2. Select the node to display iSCSI information for (either node 0 or node 1), click OK, and then press
Enter.
The results are displayed in a new window.
3. To return to the Disk Tools menu, select Disk, click OK, and press Enter.
To return to the main menu, select Main, click OK, and press Enter.
1. From the Dell Support Diagnostic Tool Disk dialog box, select iscsi_logins, click OK, and press
Enter.
NOTE: The diagnostics file can be downloaded using the FTP link provided.
1. From the Dell Support Diagnostic Tool Quick Diagnostics dialog box, select the node to run quick
diagnostics on (either node 0 or node 1), click OK, and press Enter.
The diagnostic results appear in a new window.
2. In the dialog box that opens with the name of the tgz file containing the quick diagnostic results,
click OK to display the results.
3. To return to the Quick Diagnostics menu, click OK and then press Enter.
For the most part, the software constituting the NetBSD operating system is not in the public domain; its
authors retain their copyright.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
All advertising materials mentioning features or use of this software must display the following
acknowledgement:This product includes software developed by the NetBSD Foundation, Inc. and its
contributors.
Neither the name of the NetBSD Foundation nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS AS IS' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This code is derived from software contributed to The NetBSD Foundation by Charles M. Hannum and by
Jason R. Thorpe of the Numerical Aerospace Simulation Facility, NASA Ames Research Center.
This code is derived from software contributed to The NetBSD Foundation by John T. Kohl and Charles
M. Hannum.
This code is derived from software contributed to The NetBSD Foundation by Kevin M. Lahey of the
Numerical Aerospace Simulation Facility, NASA Ames Research Center.
This product includes software developed by Christopher G. Demetriou for the NetBSD Project.
This code is derived from software contributed to The NetBSD Foundation by Luke Mewburn.
This code is derived from software contributed to The NetBSD Foundation by Klaus Klein.
This code is derived from software contributed to The NetBSD Foundation by Jonathan Stone.
This code is derived from software contributed to The NetBSD Foundation by Jason R. Thorpe.
This code is derived from software contributed to The NetBSD Foundation by UCHIYAMA Yasushi.
This product includes software developed for the NetBSD Project by Wasabi Systems, Inc.
This product includes software developed by the University of California, Berkeley and its contributors.
This product includes software developed by the University of California, Lawrence Berkeley Laboratory.
This code is derived from software contributed to Berkeley by Paul Borman at Krystal Technologies.
This code is derived from software contributed to Berkeley by Peter McIlroy and by Dan Bernstein at New
York University.
Copyright 1996 The Board of Trustees of The Leland Stanford Junior University.
This product includes software developed by the Computer Systems Laboratory at the University of Utah.
Copyright 1990,1994 The University of Utah and the Computer Systems Laboratory (CSL). All rights
reserved.
This code is derived from software contributed to Berkeley by the Systems Programming Group of the
University of Utah Computer Science Department.
All or some portions of this file are derived from material licensed to the University of California by
American Telephone and Telegraph Co. or UNIX System Laboratories, Inc. and are reproduced herein
with the permission of UNIX System Laboratories, Inc.
Copyright 1990,1994 The University of Utah and the Computer Systems Laboratory (CSL).
Copyright 1992 Simmule Turner and Rich Salz. All rights reserved.
Copyright 1999 - 2001, PADL Software Pty Ltd. All rights reserved.
Copyright 1995, 1999 Berkeley Software Design, Inc. All rights reserved.
Copyright 1993 Carlos Leandro and Rui Salgueiro Dep. Matematica Universidade de Coimbra, Portugal,
Europe.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice
and this paragraph are duplicated in all such forms and that any documentation, advertising materials,
and other materials related to such distribution and use acknowledge that the software was developed by
Carnegie Mellon University. The name of the University may not be used to endorse or promote products
derived from this software without specific prior written permission.