ControlCommand Command Reference

Size: px
Start display at page:

Download "ControlCommand Command Reference"

Transcription

1 NEC Storage Software ControlCommand Command Reference IS041-9E

2 NEC Corporation No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents of this book may be modified without notice in the future.

3 Preface This manual explains how to use various types of commands provided for data replication, snapshot, data retention, power saving, and these common functions. For description and operation method on each function, refer to the following manuals. Refer to the NEC Storage Software Manual Guide (IS901) for the overview of NEC Storage and the related manuals. NEC Storage Software Data Replication User s Manual (Function Guide) (IS015): This manual describes comprehensive explanation of the data replication function and how to operate the function from software. NEC Storage Software Data Replication User s Manual (Installation and Operation Guide for Windows) (IS016): This manual describes how to install and operate the data replication function on Windows OS. NEC Storage Software Data Replication User s Manual (Installation and Operation Guide for Linux) (IS020): This manual describes how to install and operate the data replication function on Linux OS. NEC Storage Software Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide) (IS027): This manual describes comprehensive explanation of the data replication function for disaster recovery, how to operate the function from software, and how to install and operate the function. NEC Storage Software Snapshot User s Manual (Function Guide) (IS030): This manual describes comprehensive explanation of the snapshot function and how to operate the function from software. NEC Storage Software Snapshot User s Manual (Installation and Operation Guide for Windows) (IS031): This manual describes how to install and operate the snapshot function on Windows OS. NEC Storage Software Snapshot User s Manual (Installation and Operation Guide for Linux) (IS035): This manual describes how to install and operate the snapshot function on Linux OS. NEC Storage Software Data Retention User s Manual (IS040): This manual describes comprehensive explanation of the data retention function, how to operate the function from software, and how to install and operate the function. NEC Storage Software Power Saving User s Manual (IS042): This manual describes comprehensive explanation of the power saving function, how to operate the function from software, and how to install and operate the function. NEC Storage Software ReplicationControl SQL Option User s Manual (IS006): This manual describes comprehensive explanation of the ReplicationControl SQL Option and how to operate it from software. NEC Storage Software Messages Handbook (IS010): This manual describes messages output by each function of NEC Storage Manager software.

4 Configuration setting for the disk array and how to use various commands to reference the configuration information are not described in this manual. For details on these functions and how to use them, refer to the following manuals: NEC Storage Software NEC Storage Manager User s Manual (UNIX) (IS001): This manual describes how to use the NEC Storage Manager. NEC Storage Software NEC Storage Manager User s Manual (IS004): This manual describes how to use the NEC Storage Manager. Remarks 1. This manual explains functions implemented by the following program products: NEC Storage Manager and NEC Storage BaseProduct NEC Storage ControlCommand (Note) NEC Storage ReplicationControl SQL Option NEC Storage DynamicDataReplication NEC Storage DynamicDataReplication Lite NEC Storage RemoteDataReplication NEC Storage RemoteDataReplication Asynchronous NEC Storage RemoteDataReplication/DisasterRecovery NEC Storage DynamicSnapVolume NEC Storage VolumeProtect NEC Storage StoragePowerConserver Note: NEC Storage ControlCommand is a product in which the following five functions are integrated: ReplicationControl SnapControl ReplicationControl/DisasterRecovery ProtectControl PowerControl 2. This manual is applicable to the program products of the following versions: NEC Storage Manager Ver6.2 NEC Storage BaseProduct Ver6.2 NEC Storage ControlCommand Ver6.2 NEC Storage ReplicationControl SQL Option Ver The NEC Storage Manager is referred to as ism or Storage Manager in this manual unless clearly specified. Also, the following terms refer to the corresponding NEC Storage software products. Term NEC Storage Software Product ControlCommand NEC Storage ControlCommand DynamicDataReplication or DDR NEC Storage DynamicDataReplication DynamicDataReplication Lite NEC Storage DynamicDataReplication Lite DynamicSnapVolume NEC Storage DynamicSnapVolume RemoteDataReplication or RDR NEC Storage RemoteDataReplication NEC Storage RemoteDataReplication/DisasterRecovery RemoteDataReplication Asynchronous NEC Storage RemoteDataReplication Asyncronous ReplicationControl SQL Option NEC Storage ReplicationControl SQL Option

5 Term StoragePowerConserver VolumeProtect NEC Storage Software Product NEC Storage StoragePowerConserver NEC Storage VolumeProtect 4. The NEC Storage series disk array subsystem is referred to as a disk array in this manual unless clearly specified. Also, the following terms refer to the corresponding NEC Storage hardware products. Term NEC Storage Hardware Product D series NEC Storage D series Sxxx or Sxxxx NEC Storage Sxxx or NEC Storage Sxxxx * xxx and xxxx represent the model number. 5. The following terms in this manual refer to the NEC Storage software manuals. Term NEC Storage Software Manual User s Manual (UNIX) NEC Storage Software NEC Storage Manager User s Manual (UNIX) (IS001) User s Manual NEC Storage Software NEC Storage Manager User s Manual (IS004) Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide) NEC Storage Software Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide) (IS027) 6. The description about RemoteDataReplication applies to the RemoteDataReplication Asynchronous unless clearly specified. 7. The term Microsoft SQL Server in this manual refers to any one of Microsoft SQL Server 2000 Enterprise Edition, Microsoft SQL Server 2000 Standard Edition, Microsoft SQL Server 2005 Enterprise Edition, Microsoft SQL Server 2005 Standard Edition, Microsoft SQL Server 2008 Enterprise, or Microsoft SQL Server 2008 Standard. 8. The term data replication functions differs from the replication functions provided by Microsoft SQL Server. 9. The term MSCS in this text refers to the Microsoft Cluster Server. 10. The term MSFC in this text refers to the Microsoft Failover Cluster. 11. The term Hyper-V in this text refers to Windows Server 2008 Hyper-V or later. 12. Trademarks and registered trademarks Microsoft, Windows, Windows Server, and Hyper-V TM are trademarks or registered trademarks of Microsoft Corporation in the United States and other countries. HP-UX is a registered trademark of Hewlett-Packard, Co. in the United States. UNIX is a registered trademark of The Open Group in the United States and other countries. VERITAS, VxVM, VxFS, NetBackup, VERITAS Volume Manager, VERITAS File System, and VERITAS NetBackup are trademarks or registered trademarks of VERITAS Software Corporation in the United States and other countries. Solaris is a trademark or a registered trademark of Sun Microsystems, Inc. in the United States and other countries. Linux is a trademark or registered trademark of Mr. Linus Torvalds in the United States and other countries. Other product names and company names, etc. are trademarks or registered trademarks of the associated companies.

6 13. In this document, the capacity is calculated based on units of 1024 (for example 1 KB = 1024 bytes) unless otherwise specified. 14. In this document, System Volume means Storage System Volume unless otherwise specified. 15. In this document, matters to which careful attention needs to be paid will be described as follows: Be sure to observe the instructions. If the indications are ignored and the system is improperly operated, settings which have been already made might be affected. Type of Indication Type Description Describes information about restrictions on operation. 1st Edition in October th Edition in January 2010

7 Contents Chapter 1 Overview Command List Volume Types Log Output Operation Overview Contents of Output Items...10 Chapter 2 Common Functions Volume List Creation/Display ismvollist (Windows) ismvollist (UNIX) Host Information Collection ismcc_hostinfo (Windows) ismcc_hostinfo (UNIX) Host Information File Logical Disk Information Display ismrc_ldlist ismrc_sense Windows Volume Operation ismrc_flush ismrc_mount ismrc_umount ismrc_signature ismrc_scan Enabling the Issuance of SCSI Pass Through I/O from a Hyper-V Virtual Machine and Displaying the Enabled Status ismpassthrough_enabler...87 Chapter 3 Data Replication Function Replication Operation File Replication Operations ismrc_replicate ismrc_separate ismrc_restore ismrc_change ismrc_wait ismrc_query ismrc_rvmode ismrc_updprevent Pair Operations ismrc_pair ismrc_swap Building ATgroups ismrc_atg Disk Array Operations ismrc_arrayinfo Chapter 4 Snapshot Function Snapshot Operation File Snapshot Operations ismsc_create ismsc_delete ismsc_restore ismsc_wait ismsc_svguard ismsc_query Link Operations i

8 4.3.1 ismsc_link ismsc_unlink ismsc_linkinfo Chapter 5 Data Retention Function Data Retention Operation File Data Retention Operation ismpc_protect ismpc_release Chapter 6 Power Saving Function Power Saving Operation File Power Saving Operation ismec_start ismec_stop ismec_sense Chapter 7 Link Function SQL Server Linkage Database Operation File ismsql_snapshotbkup ismsql_snapshotrst Chapter 8 Operation Settings Operation Option Setting File (Windows) Environment Variables (UNIX) Index ii

9 Chapter 1 Overview Chapter 1 Overview 1..1 Command Liist The following lists commands described in this document. The description of UNIX that appears in this document indicates all the UNIX systems, such as HP-UX, Solaris, and Linux, etc., which ControlCommand supports. The commands described in Tables 1-1 to 1-5 can be used by installing ControlCommand. Table 1-1 Command List for Common Function No. Command Name Operation Description 1 ismvollist Volume list creation/display Associates the logical disk information (disk array side) and the system information (server side) and displays it. Target System Windows UNIX 2 ismcc_hostinfo Host information collection Collects the host information (including OS identification and system configuration information). 3 ismrc_ldlist 4 ismrc_sense Logical disk information display Volume list display, ATgroup setting information display Lists the information on logical disks in the disk array. Displays the information on a specific volume or the setting information of ATgroup. 5 ismrc_flush File system buffer flush Flushes the file system cache buffer. - 6 ismrc_mount Volume mount Mounts the volume (file system). - 7 ismrc_umount Volume unmount Unmounts the volume (file system). - 8 ismrc_signature Disk signature operation Performs an operation on each disk signature. - 9 ismrc_scan Disk scanning Scans for available disks. - : Target -: Non-target Notes: (1) Commands No.1 and No.2 above can be used by installing the volume list command (ismvollist) included in ism. (2) Each command mentioned in the above can be shared among data replication function (ReplicationControl, ReplicationControl/DisasterRecovery), snapshot function (SnapControl), data retention function (ProtectControl), and power saving function (PowerControl). (3) On the Windows system, commands in the above table can be operated only by a user who belongs to the Administrators group. However, in a Windows Server 2008 environment in which User Account Control (UAC) is enabled, to log on as a user other than the user belonging to the OS local system administrators group and perform the operation, elevate to the system administrator in advance. 1

10 Chapter 1 Overview (4) On the UNIX system, operation authority belongs to a super user immediately after the installation. The volume list can be created only by the super user; other operations, however, can be performed by anybody by changing the authority for the command and directory operations. (5) To use control volumes or to operate together with ism, joint operation is possible with regard to commands No.3 and No.4. Commands No.1, No.2, and No.5 to No.9 are not targeted in joint operation with control volumes or ism because those commands operate the system s volumes and collect the system information. Table 1-2 Command List for Data Replication Function No. Command Name Operation Description 1 ismrc_replicate 2 ismrc_separate 3 ismrc_restore 4 ismrc_change 5 ismrc_wait 6 ismrc_query 7 ismrc_rvmode Pair and ATgroup replicate Pair and ATgroup separate Pair and ATgroup restore Pair copy control change, and ATgroup state change Waiting for state transition of pair and ATgroup Pair and ATgroup state display Change RV access restriction Target System Windows UNIX Starts replicating pairs and ATgroups. Separates pairs and ATgroups. Starts restoring pairs and ATgroups. Changes the copy control state of pairs and the state of ATgroups. Waits until replication, restoration, or separation is completed. Displays the state of pairs and ATgroups. Change RV access restriction. 8 ismrc_updprevent Cancels the update prevention state of the specified volume. Cancels the update prevention state of the specified volume. 9 ismrc_pair Pairing/unpairing Sets and cancels the paired volume. 10 ismrc_swap Swap for RDR pair Swaps an RDR pair or resumes a swap. 11 ismrc_atg ATgroup build Creates and deletes ATgroups, updating attributes, and adds pairs to and deletes them from ATgroups. 12 ismrc_arrayinfo Disk array information display Displays information about disk array replication. : Target -: Non-target Notes: (1) Commands mentioned in Table 1-1 Command for Common Function and each command mentioned in the above table can be used for data replication function (ReplicationControl and ReplicationControl/DisasterRecovery). (2) On the Windows system, commands mentioned in the above table can be operated only by users who belong to the Administrators group. 2

11 Chapter 1 Overview However, in a Windows Server 2008 environment in which User Account Control (UAC) is enabled, to log on as a user other than the user belonging to the OS local system administrators group and perform the operation, elevate to the system administrator in advance. (3) On the UNIX system, operation authority belongs to the super user immediately after the installation. It can be performed by anybody by changing the authority for command and directory operations. Table 1-3 Command List for Snapshot Function No. Command Name Operation Description Target System Windows UNIX 1 ismsc_create Snapshot creation Creates a snapshot (SV). 2 ismsc_restore Snapshot restoration Restores from a snapshot (SV). 3 ismsc_delete Snapshot deletion Deletes snapshot (SV) data. 4 ismsc_svguard SV guard classification setting and cancellation Sets or cancels SV guard classification. 5 ismsc_wait Snapshot state wait Waits for the snapshot (SV) state. 6 ismsc_query Snapshot information display 7 ismsc_link Link setting 8 ismsc_unlink Link release Displays snapshot information. Sets a link between a link- volume (LV) and BV/SV. Releases a link between a link- volume (LV) and BV/SV. 9 ismsc_linkinfo Link information display Displays link-related information. : Target -: Non-target Notes: (1) Commands mentioned in Table 1-1 Command for Common Function and each command mentioned in the above table can be used for snapshot function (SnapControl). (2) On the Windows system, commands mentioned in the above table can be operated only by a user who belongs to the Administrators group. However, in a Windows Server 2008 environment in which User Account Control (UAC) is enabled, to log on as a user other than the user belonging to the OS local system administrators group and perform the operation, elevate to the system administrator in advance. (3) On the UNIX system, operation authority belongs to a super user immediately after the installation. It can be performed by any user by changing the authority for the command and directory. 3

12 Chapter 1 Overview Table 1-4 Command List for Data Retention Function No. Command Name Operation Description 1 ismpc_protect 2 ismpc_release Protection setting or protection setting change for volume Protection cancellation for volume : Target -: Non-target *: Only supports the Linux system. Target System Windows UNIX* Performs the protection setting for volume or changes the protection setting for volume. Cancels the protection for volume. Notes: (1) Commands mentioned in Table 1-1 Command for Common Function and each command mentioned in the above table can be used for data retention function (ProtectControl). (2) On the Windows system, commands mentioned in the above table can be operated only by a user who belongs to the Administrators group. However, in a Windows Server 2008 environment in which User Account Control (UAC) is enabled, to log on as a user other than the user belonging to the OS local system administrators group and perform the operation, elevate to the system administrator in advance. (3) On the UNIX system, operation authority belongs to a super user immediately after the installation. It can be performed by anybody by changing the authority for the command and directory operations. (4) Each command mentioned above is not targeted in joint operation with ism. Table 1-5 Command List for Power Saving Function No. Command Name Operation Description 1 ismec_start Starts using volumes or starts rotation of a pool Starts using volumes or starts rotation of a pool. Target System Windows 2 ismec_stop Stops using volumes Stops using volumes. 3 ismec_sense Displays the use state and rotation state Displays the use state and rotation state. UNIX : Target -: Non-target Notes: (1) Commands mentioned in Table 1-1 Command for Common Function and each command mentioned in the above table can be used for power saving function (PowerControl). (2) On the Windows system, commands mentioned in the above table can be operated only by a user who belongs to the Administrators group. However, in a Windows Server 2008 environment in which User Account Control (UAC) is enabled, to log on as a user other than the user belonging to the OS local system administrators group and perform the operation, elevate to the system administrator in advance. (3) On the UNIX system, operation authority belongs to a super user immediately after the installation. It can be performed by anybody by changing the authority for the command and directory operations. (4) Each command mentioned above is not targeted in joint operation with ism. 4

13 Chapter 1 Overview The commands described in Table 1-6 below can be used by installing ReplicationControl SQL Option. These commands are used in combination with the data replication function or snapshot function of ControlCommand. Table 1-6 Command List for Link Function No. Command Name Operation Description 1 ismsql_snapshotbkup Snapshot backup 2 ismsql_snapshotrst Snapshot restoration Creates backups of the Microsoft SQL Server database. Restores the Microsoft SQL Server database from the backup. Target System Windows UNIX - - : Target -: Non-target Notes: (1) On the Windows system, commands mentioned in the above table can be operated only by a user who belongs to the Administrators group. However, in a Windows Server 2008 environment in which User Account Control (UAC) is enabled, to log on as a user other than the user belonging to the OS local system administrators group and perform the operation, elevate to the system administrator in advance. (2) Each command mentioned in the above table is not targeted in joint operation with control volumes or ism because those commands directly operate the system s volumes. 5

14 Chapter 1 Overview 1..2 Vollume Types Types of volumes that are specified as operation targets by each function are as follows: On the Windows system Table 1-7 Volume Types (Windows) No. Type Description Identifier 1 Logical disk Specifies the logical disk name set on the disk array side. name ld 2 Mount point Specifies the mount point volume name assigned by the system to the volume. volume name mvol 3 NTFS folder Specifies the NTFS folder name (path name) set for the volume. name mdir 4 Drive letter Specifies the drive letter set for the volume. drv 5 6 Physical disk number Relative generation name 7 Cyclic generation 8 9 Deleted SV auto selection SV batch operation Specifies the physical disk number of the disk (logical disk) assigned by the system. Specifies a number that is assigned in descending order (as in -2, -3, -4, etc.) relative to the latest generation (-1) to identify an SV corresponding to a BV. Specified when the snapshot of the oldest generation is deleted as a new snapshot is created. Indicates that the SV to be deleted is automatically selected when a snapshot is deleted. Specified at the batch deletion of snapshots in all generations when a snapshot is deleted. Alternatively, specified to cancel all SV guard classifications under a BV together. dskn relgen cyclic auto all Notes: (1) The identifier is a character string that indicates the volume type and is used in the following cases: When specifying a volume type by a command argument. When specifying a volume type in the operation files of individual functions (replication operation file, snapshot operation file, and data retention operation file). (2) Volume types No. 3 and No. 4 that cannot be used by the data retention operation commands. (3) Volume type No. 5 can be used only when using the data retention operation commands. (4) Volume types No. 6 to No.9 can be used only when using the snapshot operation commands and link operation commands. (5) The volume type that can be used in remote operation (operation targeting a pair or volume of the remote disk array) is logical disk name only. (6) The volume type that can be used in the joint operation with ism is logical disk name only. 6

15 Chapter 1 Overview On the UNIX system Table 1-8 Volume Types (UNIX) No. Type Description Identifier 1 Logical disk name Specifies the logical disk name set on the disk array side. ld 2 Special file name 3 Volume group name 4 Disk group name 5 Relative generation name 6 Cyclic generation 7 Deleted SV auto selection 8 SV batch operation Specifies the special file name of the disk (logical disk) assigned by the system. Specifies the volume group name of LVM that contains the disk (logical disk). Specifies the disk group name of VxVM that contains the disk (logical disk). Specifies a number that is assigned in descending order (as in -2, -3, -4, etc.) relative to the latest generation (-1) to identify an SV corresponding to a BV. Specified when the snapshot of the oldest generation is deleted as a new snapshot is created. Indicates that the SV to be deleted is automatically selected when a snapshot is deleted. Specified at the batch deletion of snapshots in all generations when a snapshot is deleted. Alternatively, specified to cancel all SV guard classifications under a BV together. sfn vg dg relgen cyclic auto all Notes: (1) The identifier is a character string that indicates the volume type and is used in the following cases: When specifying a volume type by a command argument. When specifying a volume type in the operation files of individual functions (replication operation file, snapshot operation file, and data retention operation file). (2) To use the volume group, the LVM environment is necessary. (3) To use the disk group, the VxVM environment is necessary. (4) On Solaris version, to specify a special file name (/dev/rdsk/c#t#d#s#), remove the special file name s slice (partition) number (s#). (5) On Linux version, to specify a special file name (/dev/sdx# X is an alphabetic lower-case character), remove the special file name s partition number (#). (6) Volume types No.5 to No.8 can be used only when using the snapshot operation commands and link operation commands. (7) For the data retention operation commands, it is impossible to specify an LVM volume group or a VxVM disk group as the volume type. (8) The pair operation command and ATgroup build command operation are performed on a single logical disk; therefore, it is impossible to specify an LVM volume group or a VxVM disk group. (9) The volume type that can be used in remote operation (operation targeting a pair or volume of the remote disk array) is logical disk name only. (10) The volume type that can be used in the joint operation with ism is logical disk name only. 7

16 Chapter 1 Overview 1..3 Log Output ControlCommand outputs command operation history information to the command trace file. The following describes an overview of command trace file output operation and the contents of output items Operattiion Overviiew The command trace file consists of the file being output and its generation files (backup file). File currently being output New Name of file currently being output ism_log.log Generation files 1 Newest generation file name ism_log1.log 2 Oldest generation file name ism_log5.log... 5 Old Deleted Generation file switching Figure 1-1 Example of Five Generation Files Created in Command Trace File Overview of command trace file Location of command trace file creation Create a command trace file directly in the etc directory (folder) created under the directory (folder) where ControlCommand is installed. Command trace file size Create 200-KB (kilobytes) files of up to five generations by default. In Windows, the file size and the number of generations can be changed by using the operation option setting file. In UNIX, they can be changed by using environment variable settings. For details, refer to Chapter 8 Operation Settings. 8

17 Chapter 1 Overview Command trace file name ism_log.log: Newest command trace file ism_log(n).log: Command trace file of n generations ago Generation file switching Generation file switching of the command trace file takes place when the size set in the operation option setting file (Windows) or in the environment variable (UNIX) is exceeded. At this time, if the maximum number of generations set in the operation option setting file (Windows) or in the environment variable (UNIX) is exceeded, the oldest file is deleted. Generation file switching is transparent to the user because it is automatically performed. 9

18 Chapter 1 Overview Conttentts off Outtputt IIttems The following items are output to the command trace file. Trace information output time and information for identifying commands and processes (common information) For details on common information, refer to Table 1-9. Command execution image The image of the executed command is output. Command output messages and execution result The contents of output messages displayed on a terminal when a command is executed are also output to the command trace file. However, if a command for information display is executed, the display result is not output. 2007/09/12 11:27: host1 VOL-CLI : ( ) Info vollist ism13200: ~ 2007/09/12 11:27: host1 VOL-CLI : ( ) Info vollist ism13247: ~ 2007/09/12 11:28: host1 RPL-CLI : ( ) Info rc_query ism13200: ~ 2007/09/12 11:28: host1 RPL-CLI : ( ) Info rc_query ism13247: ~ 2007/09/12 11:29: host1 SC-CLI : ( ) Info sc_query ism19000: ~ 2007/09/12 11:29: host1 EC-CLI : ( ) Info ec_sense ism25000: ~ 2007/09/12 11:30: host1 PC-CLI : ( ) Info pc_protect ism21000: ~ 2007/09/12 11:30: host1 PC-CLI : ( ) Info pc_protect ism21011: ~ : Figure 1-2 Example of Command Trace File Output Table 1-9 Common Information for Command Trace File Item Description Date Date information is output in the yyyy/mm/dd format. Time Time information is output in the hh:mm:ss.msec format. Host name The host name of server that executed the command is output. Function type A function type is output. Process number (thread number) A command process number is output in a decimal format. For Windows, a thread number is output in decimal. Error level An error level is output. Command type Message ID Message text A command type is output. A message ID is output. A message text is output. 10

19 Chapter 2 Common Functions Chapter 2 Common Functions 2..1 Vollume Liist Creatiion//Diispllay iismvolllliistt ((Wiindows)) [ NAME ] ismvollist - Creates and displays the table of logical disks and related information. [ SYNOPSIS ] ismvollist -cr ismvollist -d ismvollist -dl disk_array [ld_number] ismvollist -de disk_array [ld_name] ismvollist -dd disk_array [drive path] ismvollist -dp disk_array [disk_number] ismvollist -dh disk_array [HBT [LUN]] ismvollist -a ismvollist -al ld_number ismvollist -ae ld_name ismvollist -ad {drive path} ismvollist -ap disk_number ismvollist -av volume_name ismvollist -ah HBT [LUN] ismvollist -ai [-pd pd_type] ismvollist -ctl ismvollist -p ismvollist -ax ismvollist -ver ismvollist -? 11

20 Chapter 2 Common Functions [ DESCRIPTION ] The ismvollist command creates and displays the table of logical disks and related information. The options which start with a display the relations of ld_number/ld_name/vaa/os Type/drive/path/volume_name/HBT/LUN/disk_number/disk_array for all the disk arrays in the Volume List. In addition, the -ai option and the -ax option display information about pd_type. The options which start with d display the relations of ld_number/drive/path HBT/LUN/disk_number/ld_name/OS Type for the specified disk arrays. The Volume List can be created and displayed only by the devices recognized by the system. The Volume List is necessary when using commands of ReplicationControl, SnapControl, and ProtectControl (except for joint operation with ism). OPTIONS The ismvollist command recognizes the following options and arguments. -cr Scans the physical disks connected to the server, and creates or updates the volume information of the target devices. When disk arrays are added or deleted, and when logical disks are bound or unbound, you must perform this command to re-create the Volume List. -d Displays the list of the disk arrays in the Volume List as well as the number of logical drives in each disk array. -dl disk_array [ld_number] Displays the relations for the disk arrays specified by disk_array, sorted by the logical disk number as the key. If ld_number is specified, it displays the relations only for the specified logical disk. -de disk_array [ld_name] Displays the relations for the disk arrays specified by disk_array, sorted by the logical disk name as the key. If ld_name is specified, it displays the relations only for the specified logical disk name. -dd disk_array [drive path] Displays the relations for the disk arrays specified by disk_array, sorted by the drive letter or path name of the NTFS folder as the key. If drive or path is specified, it displays the relations only for the specified drive letter or path name of the NTFS folder. 12

21 Chapter 2 Common Functions -dp disk_array [disk_number] Displays the relations for the disk arrays specified by disk_array, sorted by the physical disk number as the key. If disk_number is specified, it displays the relations only for the specified physical disk. -dh disk_array [HBT [LUN]] Displays the relations for the disk arrays specified by disk_array, sorted by HBT and LUN as the keys. If HBT is specified, it displays the relations only for the specified HBT. Furthermore, if LUN is specified, it displays the relations only for the specified HBT and LUN. -a Displays all volume information in the Volume List. -al ld_number Displays the relations only for the logical disk number specified by ld_number. -ae ld_name Displays the relations only for the logical disk name specified by ld_name. -ad {drive path} Displays the relations only for the drive letter or path name of the NTFS folder specified by drive or path. -ap disk_number Displays the relations only for the physical disk number specified by disk_number. -av volume_name Displays the relations only for the mount point volume name specified in volume_name. -ah HBT [LUN] Displays the relations only for the host numbers, bus numbers, and target IDs specified by HBT. If LUN is specified, it displays the relations only for the specified HBT and LUN. -ai [-pd pd_type] Displays information about configurations of all volumes in the volume list. For pd_type of the -pd option, PD Type of logical disks (attribute of physical disks in the disk arrays) can be specified. Displays only configuration information about a PD Type if pd_type is specified. 13

22 Chapter 2 Common Functions Specify either attribute to pd_type: FC FC attribute ATA ATA attribute SAS SAS attribute SSD SSD attribute -ctl Lists the physical disk number and logical disk number of the control volume, and the corresponding disk array name. The control volume is used in operating data replication and snapshot functions from the business server. For details on control volumes, refer to a manual of individual functions including data replication and snapshot. -p Displays the version and creation time and date of the Volume List property information. -ax Lists disk array information in the Volume List, information about all volumes, and property information of the Volume List. -ver Displays the version information of this command. -? Lists the version information and options of this command. 14

23 Chapter 2 Common Functions [ DISPLAYED INFORMATION ] C:\>iSMvollist -d --- Disk Array List --- Disk Array Name disk_array Number of Drives nnnn C:\> Description of messages: Disk Array Name Disk array name Number of Drives Number of items of volume information for each disk array C:\>iSMvollist -a LDN LD Name VAA OS Type HBT LUN Disk No. Disk Array Volume Name Path ldn ld_name vaa type hbt lun disk_no disk_array volume_name path C:\> Description of messages: LDN Logical disk number LD Name Logical disk name VAA Volume Absolute Address OS Type Type of operating system HBT Host adapter number, bus number, target ID LUN LUN (Logical unit number) Disk No. Physical disk number Disk Array Disk array name Volume Name Mount point volume name Path Drive letters or path name of the NTFS folder 15

24 Chapter 2 Common Functions C:\>iSMvollist -ai Volume List ismvollist Version V.V.VVV LDN LD Name VAA OS Type HBT LUN Disk No. Disk Array PD Type Volume Name Path ldn ld-name vaa type hbt lun disk-no disk_ array pd_type volume-name path C:\> Description of messages: The version of ismvollist is displayed on the first line. LDN Logical disk number LD Name Logical disk name VAA Volume Absolute Address OS Type Type of operating system HBT Host adapter number, bus number, target ID LUN LUN (Logical unit number) Disk No. Physical disk number Disk Array Disk array name PD Type PD Type Volume Name Mount point volume name Path Drive letters or path name of the NTFS folder C:\>iSMvollist -ctl --- Control Volume List --- Disk No. LDN Disk Array Name disk_no ldn disk_array C:\> Description of messages: Disk No. Physical disk number LDN Logical disk number Disk Array Name Disk array name 16

25 Chapter 2 Common Functions C:\>iSMvollist -p --- Property of Volume List File --- Version Created Owner Host Name Disk Array Volume Information v.v.vvv date_time hostname ddd nnn C:\> Description of messages: Version Version of ismvollist used in Volume List creation Created Time and date of Volume List creation Owner Host Name Host name of the server that has the Volume List Disk Array Number of disk arrays in the Volume List Volume Information Number of items of volume information in the Volume List C:\>iSMvollist -ax Volume List ismvollist Version V.V.VVV Date: yyyy/mm/dd HH:MM:SS --- Disk Array List --- Disk Array Name disk_array Number of Drives nnnn --- Volume List --- LDN LD Name VAA OS Type HBT LUN Disk No. Disk Array PD Type Volume Name Path ldn ld_name vaa type hbt lun disk_no disk_array pd_type volume_name path --- Property of Volume List File --- Version Created Owner Host Name Disk Array Volume Information v.v.vvv date_time hostname ddd nnn C:\> Description of messages: The version and execution date and time of ismvollist are displayed on the first line. The information displayed as Disk Array List is the same as when the -d option is specified. The information displayed as Volume List is the same as when the -ai option is specified. The information specified as Property of Volume List File is the same as when the -p option is specified. 17

26 Chapter 2 Common Functions [ USAGE ] The command creates the Volume List. C:\>iSMvollist -cr ismvollist: Info: ismvollist: Info: ism11700: Please wait a minute. ism11701: Volume list is created successfully. C:\> The command displays the Volume List with the logical disk name specified. C:\>iSMvollist -ae dev001 LDN LD Name VAA OS Type HBT LUN Disk No. Disk Array Volume Name Path 030ch dev c WN h4b0t35 000h disk2 Storage4100/1007 \\?\Volume{674de734-ee66-11d5-95d c792133}\ H: C:\> [ NOTES ] While updating or creating a Volume List, you cannot create, update, or display the Volume List or execute ReplicationControl or SnapControl. Create or update the volume list when the OS on the server recognizes the logical disks and volumes. For a replication volume (RV) of the data replication function, the pair must be in the Separated state. For a link-volume (LV) of the snapshot function, a link to a snapshot-volume (SV) must be established. Create or update the volume list when a mount point (drive letter or NTFS folder) to be used has been set for volumes. [ RETURN VALUES ] 0: Normal termination 1: Abnormal termination This command terminates abnormally in the following cases. - A parameter is invalid. - A condition for operation is not satisfied. - An attempt to operate a disk array fails. 18

27 Chapter 2 Common Functions iismvolllliistt ((UNIIX)) [ NAME ] ismvollist - Creates and displays the list of logical disks and related information. [ SYNOPSIS ] ismvollist -r ismvollist -nr ismvollist -or ismvollist -d ismvollist -l [Special File LD Name] ismvollist -vs Disk Array Name [Special File] ismvollist -vl Disk Array Name [LDN] ismvollist -ve Disk Array Name [LD Name] ismvollist -ai [-pd PD Type] ismvollist -ctl ismvollist -p ismvollist -ax ismvollist -ver ismvollist -help [ DESCRIPTION ] The ismvollist command creates and displays the list of logical disks and related information. The Volume List can be created and displayed only by the devices recognized by the system. The Volume List is necessary when using commands of ReplicationControl, SnapControl, and ProtectControl (except for joint operation with ism). OPTIONS The ismvollist command recognizes the following options. -r Creates the list of the logical disks, VAAs, and special files. When a disk array has been added or deleted, or a logical disk has been bound or unbound, be sure to execute this command to re-create the volume list. On HP-UX, the system checks the disk array currently being connected and creates a character special file for the SCSI access. In the environment of HP-UX 11i v3 or later, there are two types of volume lists according to the special file types to be used in operation. Since you must create the volume list according to the operation, refer to the descriptions of the -nr and -or options, too. When a volume list does not exist and this option is specified, a new volume list is created based on the 19

28 Chapter 2 Common Functions persistent special file. When a volume list already exists, a new volume list is created according to the type of the special file based on the existing volume list. -nr In the environment of HP-UX 11i v3 or later, this option creates the volume list based on the persistent special file (Persistent DSF). Specify this option when creating a new environment in the environment of HP-UX 11i v3 or later. This option can be specified only in the environment of HP-UX 11i v3 or later. -or In the environment of HP-UX 11i v3 or later, this option creates the Volume List based on the conventional legacy-type special file (Legacy DSF). Specify this option when performing operation that emphasizes the compatibility, succeeding the existing environment of HP-UX 11i v2 or earlier. This option can be specified only in the environment of HP-UX 11i v3 or later. -d Lists the disk arrays stored in the volume list and displays the number of logical disks located in each disk array. -l [Special File LD Name] Displays the relations for the logical disk names, VAA, and special file names. If Special File or LD Name is specified, the relation only for the specified special file name or logical disk name is displayed. -vs Disk Array Name [Special File] Displays the relations for the disk arrays specified by Disk Array Name, sorted by the special file name as the key. If Special File is specified, the relation only for the specified special file name is displayed. -vl Disk Array Name [LDN] Displays the relations for the disk arrays specified by Disk Array Name, sorted by the logical disk number as the key. If LDN is specified, the relation only for the specified logical disk number is displayed. -ve Disk Array Name [LD Name] Displays the relations for the disk arrays specified by Disk Array Name, sorted by the logical disk name as the key. 20

29 Chapter 2 Common Functions If LD Name is specified, the relation only for the specified logical disk name is displayed. -ai [-pd PD Type] Displays the relations and configuration information for the logical disk names, VAA, and special file names. For PD Type of the -pd option, PD Type of logical disks (attribute of physical disks in the disk arrays) can be specified. Displays only configuration information about a PD Type if PD Type is specified. Specify either attribute to PD Type: FC FC attribute ATA ATA attribute SAS SAS attribute SSD SSD attribute -ctl Lists the special file name, logical disk number, and corresponding disk array name of the control volume. The control volume is used in operating data replication and snapshot functions from the business server. For details on control volumes, refer to a manual of individual functions including data replication and snapshot. -p Displays the version and creation time and date of the Volume List property information. -ax Lists disk array information in the Volume List, volume information about all logical disk names/vaas/special file names, and Volume List property information. -ver Displays the version information of this command. -help Lists the version information and options of this command. [ DISPLAYED INFORMATION ] # ismvollist -d --- Disk Array List --- Disk Array Name disk_array Number of LDN nnn # 21

30 Chapter 2 Common Functions Description of messages: Disk Array Name Disk array name Number of LDN Number of items of volume information for each disk array # ismvollist -l LDN LD NAME VAA TYPE Special File Disk Array Path ldn ld name VAA type special_file_name disk_array path # Description of messages: LDN Logical disk number LD NAME Logical disk name VAA Volume Absolute Address TYPE OS type Special File Special file name Displayed as a 32-byte item on HP-UX and Linux as well as 64-byte item on Solaris. Disk Array Disk array name Path Availability of special file Usually nothing is displayed. In data replication or snapshot operations, B is displayed if an error is detected in access to the relevant special file. # ismvollist -ai Volume List ismvollist Version V.V.VVV LDN LD NAME VAA TYPE Special File Disk Array Path PD Type ldn ld name VAA type special_file_name disk_array path pd_type # Description of messages: The version of ismvollist is displayed on the first line. LDN Logical disk number LD NAME Logical disk name VAA Volume Absolute Address 22

31 Chapter 2 Common Functions TYPE OS type Special File Special file name Displayed as a 32-byte item on HP-UX and Linux as well as 64-byte item on Solaris. Disk Array Disk array name Path Availability of special file Usually nothing is displayed. In data replication or snapshot operations, B is displayed if an error is detected in access to the relevant special file. PD Type PD Type # ismvollist -ctl --- Control Volume List --- Special File LDN Disk Array Name Path special_file_name ldn disk_array path # Description of messages: Special File Special file name Displayed as a 32-byte item on HP-UX and Linux as well as 64-byte item on Solaris. LDN Logical disk number Disk Array Name Disk array name Path Availability of special file Usually nothing is displayed. In data replication or snapshot operations, B is displayed if an error is detected in access to the relevant special file. # ismvollist -p --- Property of Volume List File --- Version v.v.vvv Created date_time Owner Host Name hostname Disk Array ddd Volume Information nnn # 23

32 Chapter 2 Common Functions Description of messages: Version Version of ismvollist used in Volume List creation Created Time and date of Volume List creation Owner Host Name Host name of the server that has the Volume List Disk Array Number of disk arrays in the Volume List Volume Information Number of items of volume information in the Volume List # ismvollist -ax Volume List ismvollist Version V.V.VVV Date: yyyy/mm/dd HH:MM:SS --- Disk Array List --- Disk Array Name disk_array Number of LDN nnnn --- Volume List --- LDN LD NAME VAA TYPE Special File Disk Array Path PD Type ldn ld name VAA type special_file_name disk_array path pd_type --- Property of Volume List File --- Version v.v.vvv Created date_time Owner Host Name hostname Disk Array ddd Volume Information nnn # Description of messages: The version and execution date and time of ismvollist are displayed on the first line. The information displayed as Disk Array List is the same as when the -d option is specified. The information displayed as Volume List is the same as when the -ai option is specified. The information specified as Property of Volume List File is the same as when the -p option is specified. [ USAGE ] (1) The command creates the volume list. # ismvollist -r ismvollist: Info: ism11700: Please wait a minute. ismvollist: Info: ism11100: Command has completed successfully. # 24

33 Chapter 2 Common Functions (2) The command lists the volume list information (example when a Solaris QLC general-purpose driver is used as the HBA driver on Solaris). # ismvollist l LDN LD NAME VAA TYPE Special File Disk Array Path 0002h disk c CX /dev/rdsk/c1t c517634d1 Storage h disk c CX /dev/rdsk/c1t c517634d2 Storage0001 # (3) The command displays the volume list information by specifying the special file name (example of HP-UX). # ismvollist -l /dev/rdsk/c1t2d0 LDN LD NAME VAA TYPE Special File Disk Array Path 0001h disk NX /dev/rdsk/c1t2d0 Storage4100/07 # (4) The command displays the volume list information by specifying the persistent special file name (example of HP-UX). # ismvollist -l /dev/rdisk/disk137 LDN LD NAME VAA TYPE Special File Disk Array Path 0042h disk c7f089c0042 NX /dev/rdisk/disk137 S2800/0108 # 25

34 Chapter 2 Common Functions [ NOTES ] While the volume list is being created or updated, it is not possible to create, update, or display the volume list or to perform the command operations of the ReplicationControl operation or SnapControl operation. Create or update the volume list when the OS on the server recognizes the logical disks and volumes. For a replication volume (RV) of the data replication function, the pair must be in the Separated state. For a link-volume (LV) of the snapshot function, a link to a snapshot-volume (SV) must be established. Create or update the volume list when a mount point (drive letter or NTFS folder) to be used has been set for volumes. For HP-UX or Linux, while the ism Server is running on the same server, the volume list can be displayed, but cannot be created or updated. For Solaris, when a Solaris QLC general-purpose driver is used as the HBA driver on the Solaris server, use the ismvollist command of Ver5.1 or later to create or update a volume list. The vollist command (volume list creation and display) of Ver5.2 and earlier does not support the persistent special file (Persistent DFS) for HP-UX. Therefore, the -nr and -or options of the volume list command cannot be specified. (The -nr and -or options are available only for HP-UX.) The version of the volume list command can be checked by the -ver option. [ RETURN VALUES ] 0: Normal termination 1: Abnormal termination This command terminates abnormally in the following cases. - A parameter is invalid. - A condition for operation is not satisfied. - An attempt to operate a disk array fails. 26

35 Chapter 2 Common Functions 2..2 Host IInformatiion Collllectiion iismcc_hosttiinffo ((Wiindows)) [ NAME ] ismcc_hostinfo - Collects the host information. [ SYNOPSIS ] ismcc_hostinfo export file_name [-arrayname diskarray] ismcc_hostinfo store [-arrayname diskarray] ismcc_hostinfo -ver ismcc_hostinfo -? [ DESCRIPTION ] The ismcc_hostinfo command collects the information including the host name, OS identification information, and HBA (host bus adapter) information of the server on which this command is executed. Additionally, the collected host information can be registered in the disk arrays and exported to a file. The file exported by this command is transferred to the server on which the ism server operates by using the file transfer or USB memory, and then registered to the disk arrays by using the host information store command. Collecting the host information and registering it to the disk array enables the ism client to display the configuration as the host connected to the disk arrays to check and manage the host information. For details on the host information store command and the host information display, refer to the User s Manual or the User s Manual (UNIX). OPTIONS The ismcc_hostinfo command recognizes the following options. -export file_name Acquires the information including the host name, OS identification information, and HBA (host bus adapter) information of the server on which this command is executed, and writes the host information to the host information file. For file_name, specify the path name of the host information file to which the host information is stored. 27

ControlCommand Command Reference

ControlCommand Command Reference NEC Storage Software ControlCommand Command Reference IS041-25E NEC Corporation 2005-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Power Saving User s Manual

Power Saving User s Manual NEC Storage Software Power Saving User s Manual IS042-6E NEC Corporation 2007-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

ReplicationControl FileSystem Option User s Manual (Linux)

ReplicationControl FileSystem Option User s Manual (Linux) NEC Storage Software ReplicationControl FileSystem Option User s Manual (Linux) IS028-15E NEC Corporation 2005-2015 No part of the contents of this book may be reproduced or transmitted in any form without

More information

ReplicationControl SQL Option User s Manual

ReplicationControl SQL Option User s Manual NEC Storage Software ReplicationControl SQL Option User s Manual IS006-17E NEC Corporation 2002-2016 No part of the contents of this book may be reproduced or transmitted in any form without permission

More information

NEC Storage Software. Manual Guide IS901-42E

NEC Storage Software. Manual Guide IS901-42E NEC Storage Software Manual Guide IS901-42E NEC Corporation 2003-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents

More information

NEC Storage Software. Manual Guide IS901-21E

NEC Storage Software. Manual Guide IS901-21E NEC Storage Software Manual Guide IS901-21E NEC Corporation 2003-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents

More information

Data Replication User s Manual (Installation and Operation Guide for Windows)

Data Replication User s Manual (Installation and Operation Guide for Windows) NEC Storage Software Data Replication User s Manual (Installation and Operation Guide for Windows) IS016-22E NEC Corporation 2003-2013 No part of the contents of this book may be reproduced or transmitted

More information

Configuration Setting Tool User s Manual (GUI) for the M Series

Configuration Setting Tool User s Manual (GUI) for the M Series NEC Storage Software Configuration Setting Tool User s Manual (GUI) for the M Series IS051-19E NEC Corporation 2011-2017 No part of the contents of this book may be reproduced or transmitted in any form

More information

Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide)

Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide) NEC Storage Software Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide) IS027-34E NEC Corporation 2004-2017 No part of the contents of this book may be reproduced

More information

NEC Storage Manager Manual Guide

NEC Storage Manager Manual Guide NEC Storage Manager Manual Guide NEC Corporation 2001-2003 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents of this

More information

Cache Partitioning User s Manual

Cache Partitioning User s Manual NEC Storage Software Cache Partitioning User s Manual IS038-10E NEC Corporation 2004-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

ISRXM64LE93-1. NEC Storage ReplicationControl FileSystem Option on Linux Ver9.3 Installation Guide

ISRXM64LE93-1. NEC Storage ReplicationControl FileSystem Option on Linux Ver9.3 Installation Guide NEC Storage ReplicationControl FileSystem Option on Linux Ver9.3 Installation Guide Preface This document describes the installation of the program products in the CD labeled as: NEC Storage ReplicationControl

More information

Thin Provisioning User s Manual

Thin Provisioning User s Manual NEC Storage Software Thin Provisioning User s Manual IS044-16E NEC Corporation 2009-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Thin Provisioning User s Manual

Thin Provisioning User s Manual NEC Storage Software Thin Provisioning User s Manual IS044-2E NEC Corporation 2009-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

NEC Storage ReplicationControl SQL Option User's Manual

NEC Storage ReplicationControl SQL Option User's Manual NEC Storage ReplicationControl SQL Option User's Manual NEC Corporation 2001-2003 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

NEC Storage Manager User s Manual (UNIX)

NEC Storage Manager User s Manual (UNIX) NEC Storage Software NEC Storage Manager User s Manual (UNIX) IS001-11E NEC Corporation 2005-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of

More information

NEC istorage Series Disk Array Guide for Oracle Storage Compatibility Program Snapshot Technologies

NEC istorage Series Disk Array Guide for Oracle Storage Compatibility Program Snapshot Technologies NEC istorage Series Disk Array Guide for Oracle Storage Compatibility Program Snapshot Technologies is-wp-01-002 Rev. 1.00 Aug. 2001 NEC Solutions NEC Corporation Copyright 2001 NEC Corporation. All rights

More information

M-Series Storage Family Comparison

M-Series Storage Family Comparison M-Series Storage Family Comparison Agenda M100/M300 comparison M500/M700 comparison M-Series performance comparison Page 2 M100/M300 Comparison M100/M300 Specification M100 M300 FC 8Gbx4 or 8Gb x 8 8Gb

More information

Virtual Volume User s Manual

Virtual Volume User s Manual NEC Storage Software Virtual Volume User s Manual IS069-5E NEC Corporation 2015-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Partitioning User s Manual

Partitioning User s Manual NEC Storage Software Partitioning User s Manual IS043-4E NEC Corporation 2007-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Performance Monitoring User s Manual

Performance Monitoring User s Manual NEC Storage Software Performance Monitoring User s Manual IS025-32E NEC Corporation 2003-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC

More information

Virtual Volume User s Manual

Virtual Volume User s Manual NEC Storage Software Virtual Volume User s Manual IS069-7E NEC Corporation 2015-2018 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Solaris OE. Softek AdvancedCopy Manager User's Guide 10.2

Solaris OE. Softek AdvancedCopy Manager User's Guide 10.2 Solaris OE Softek AdvancedCopy Manager User's Guide 10.2 Preface ++ Purpose This manual explains how to operate Web-GUI with Softek AdvancedCopy Manager. ++ Reader This manual is intended for system managers

More information

ISRX119E22-1. NEC Storage Replication Navigator ControlCommand for Oracle Ver2.2 Installation Guide

ISRX119E22-1. NEC Storage Replication Navigator ControlCommand for Oracle Ver2.2 Installation Guide NEC Storage Replication Navigator ControlCommand for Oracle Ver2.2 Installation Guide Preface Thank you for purchasing NEC Storage Replication Navigator ControlCommand for Oracle. This installation guide

More information

NEC Storage Manager Installation Guide

NEC Storage Manager Installation Guide NEC Storage Manager Installation Guide 856-128502-002-A Preface NEC Storage Manager English Version VERSION: 6.2 This CD includes the setup programs and the PDF manuals of NEC Storage Manager. For further

More information

ETERNUS SF AdvancedCopy Manager Operator's Guide for Tape Server Option

ETERNUS SF AdvancedCopy Manager Operator's Guide for Tape Server Option ETERNUS SF AdvancedCopy Manager 14.0 Operator's Guide for Tape Server Option J2X1-7453-01ENZ0(00) July 2009 Preface Purpose This manual describes the functionality of ETERNUS SF AdvancedCopy Manager for

More information

NEC Disk Array Unit D1-10/D3-10. Configuration Guide. Revision August, 2008

NEC Disk Array Unit D1-10/D3-10. Configuration Guide. Revision August, 2008 NEC Disk Array Unit D1-10/D3-10 Configuration Guide Revision 3.1 4 August, 2008 Information of disclosure and limitation of usage NEC Corporation has all the rights about this material. You can not use

More information

ETERNUS SF AdvancedCopy Manager Glossary

ETERNUS SF AdvancedCopy Manager Glossary ETERNUS SF AdvancedCopy Manager 14.1 Glossary J2X1-7455-02ENZ0(00) January 2010 Preface Purpose This manual describes the terminology used in the ETERNUS SF AdvancedCopy Manager manuals. Intended Readers

More information

ETERNUS SF AdvancedCopy Manager GUI User's Guide

ETERNUS SF AdvancedCopy Manager GUI User's Guide ETERNUS SF AdvancedCopy Manager 14.0 GUI User's Guide J2X1-7450-01ENZ0(00) July 2009 Preface Purpose of the User's Guide The AdvancedCopy Manager GUI User's Guide provides detailed information relating

More information

ETERNUS SF AdvancedCopy Manager V13.1 Operator's Guide for Tape Backup Option

ETERNUS SF AdvancedCopy Manager V13.1 Operator's Guide for Tape Backup Option J2S2-0560-02ENZ0(A) ETERNUS SF AdvancedCopy Manager V13.1 Operator's Guide for Tape Backup Option Preface ++ Purpose This manual describes the functionality of ETERNUS SF AdvancedCopy Manager for Tape

More information

ETERNUS SF AdvancedCopy Manager V13.1 GUI User s Guide

ETERNUS SF AdvancedCopy Manager V13.1 GUI User s Guide B1WW-8871-02ENZ0(00) ETERNUS SF AdvancedCopy Manager V13.1 GUI User s Guide Preface ++ Purpose This manual explains how to operate the Web-GUI with ETERNUS SF AdvancedCopy Manager. ++ Reader This manual

More information

ETERNUS SF AdvancedCopy Manager Overview

ETERNUS SF AdvancedCopy Manager Overview ETERNUS SF AdvancedCopy Manager 14.2 Overview J2X1-7443-04ENZ0(00) June 2011 Preface Purpose This manual provides an overview of the ETERNUS SF AdvancedCopy Manager. This manual describes the ETERNUS SF

More information

Microsoft Windows NT Microsoft Windows Softek AdvancedCopy Manager Operator's Guide V10.0L30

Microsoft Windows NT Microsoft Windows Softek AdvancedCopy Manager Operator's Guide V10.0L30 Microsoft Windows NT Microsoft Windows 2000 Softek AdvancedCopy Manager Operator's Guide V10.0L30 Preface ++ Purpose This manual describes the operations on Softek AdvancedCopy Manager. ++ Intended Readers

More information

ETERNUS SF AdvancedCopy Manager V13.3 Message Guide

ETERNUS SF AdvancedCopy Manager V13.3 Message Guide B1WW-8881-05ENZ0 (00) ETERNUS SF AdvancedCopy Manager V13.3 Message Guide ii Preface About This Manual This manual explains the messages output by ETERNUS SF AdvancedCopy Manager. Intended Reader This

More information

ETERNUS SF AdvancedCopy Manager V13.2 GUI User s Guide

ETERNUS SF AdvancedCopy Manager V13.2 GUI User s Guide B1WW-8871-03ENZ0(00) ETERNUS SF AdvancedCopy Manager V13.2 GUI User s Guide ii Preface ++ Purpose This manual explains how to operate the Web-GUI with ETERNUS SF AdvancedCopy Manager. ++ Reader This manual

More information

ETERNUS SF AdvancedCopy Manager GUI User's Guide

ETERNUS SF AdvancedCopy Manager GUI User's Guide ETERNUS SF AdvancedCopy Manager 14.1 GUI User's Guide J2X1-7450-02ENZ0(00) January 2010 Preface Purpose of the User's Guide The AdvancedCopy Manager GUI User's Guide provides detailed information relating

More information

Symantec NetBackup PureDisk Compatibility Matrix Created August 26, 2010

Symantec NetBackup PureDisk Compatibility Matrix Created August 26, 2010 Symantec NetBackup PureDisk 6.6.1 Compatibility Matrix Created August 26, 2010 Copyright 2010 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Backup Exec are trademarks or registered

More information

ETERNUS SF AdvancedCopy Manager V15.0. Quick Reference

ETERNUS SF AdvancedCopy Manager V15.0. Quick Reference ETERNUS SF AdvancedCopy Manager V15.0 Quick Reference B1FW-5967-02ENZ0(00) April 2012 Preface Purpose This manual describes the pre-installation requirements, installation procedure, configuration procedure,

More information

ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (HP-UX)

ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (HP-UX) J2SZ-0180-03ENZ0(A) ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (HP-UX) ii Preface ++ Purpose This manual explains how to operate the Web-GUI with ETERNUS SF AdvancedCopy Manager. ++ Reader

More information

SystemWalker/StorageMGR User's Guide Solaris-

SystemWalker/StorageMGR User's Guide Solaris- SystemWalker/StorageMGR User's Guide 10.0 -Solaris- Preface ++ Purpose This manual explains how to operate Web-GUI with SystemWalker/StorageMGR. SystemWalker is a generic name for products for operation

More information

Microsoft Windows NT Microsoft Windows SystemWalker/StorageMGR. User's Guide V10.0L10

Microsoft Windows NT Microsoft Windows SystemWalker/StorageMGR. User's Guide V10.0L10 Microsoft Windows NT Microsoft Windows 2000 SystemWalker/StorageMGR User's Guide V10.0L10 Preface ++ Purpose This manual explains how to operate Web-GUI with SystemWalker/StorageMGR. SystemWalker is a

More information

FC SAN Boot Configuration Guide

FC SAN Boot Configuration Guide White Paper R120d-2M, R120d-1M R120d-2E, R120d-1E FC SAN Boot Configuration Guide Windows Server 2008 (Hyper-V) Windows Server 2008 R2 (Hyper-V 2.0) Red Hat Enterprise Linux 5 Red Hat Enterprise Linux

More information

ETERNUS SF AdvancedCopy Manager Operator's Guide for Cluster Environment

ETERNUS SF AdvancedCopy Manager Operator's Guide for Cluster Environment ETERNUS SF AdvancedCopy Manager 14.2 Operator's Guide for Cluster Environment J2X1-7452-04ENZ0(00) June 2011 Preface Purpose This manual explains the installation and customization of ETERNUS SF AdvancedCopy

More information

HP StorageWorks 4000/6000/8000 Enterprise Virtual Array connectivity for Sun Solaris installation and reference guide

HP StorageWorks 4000/6000/8000 Enterprise Virtual Array connectivity for Sun Solaris installation and reference guide HP StorageWorks 4000/6000/8000 Enterprise Virtual Array connectivity for Sun Solaris installation and reference guide Part number: 5697-5263 First edition: May 2005 Legal and notice information Copyright

More information

Copyright(C) NEC Corporation All rights reserved.

Copyright(C) NEC Corporation All rights reserved. MasterScope MISSION CRITICAL OPERATIONS /SystemManager/Application Navigator Command Reference (Help differences) TopologyCmd LIST TopologyCmd IMPORT TopologyCmd EXPORT Copyright(C) NEC Corporation 2015.

More information

B1FN ENZ0(02) PRIMEQUEST. System Disk Mirror for Windows User's Guide V1.0

B1FN ENZ0(02) PRIMEQUEST. System Disk Mirror for Windows User's Guide V1.0 B1FN-5771-01ENZ0(02) PRIMEQUEST System Disk Mirror for Windows User's Guide V1.0 Preface Purpose of This Manual This manual describes the functions and usage of PRIMEQUEST System Disk Mirror for Windows

More information

FUJITSU Storage ETERNUS SF Storage Cruiser V16.3 / AdvancedCopy Manager V16.3. Cluster Environment Setup Guide

FUJITSU Storage ETERNUS SF Storage Cruiser V16.3 / AdvancedCopy Manager V16.3. Cluster Environment Setup Guide FUJITSU Storage ETERNUS SF Storage Cruiser V16.3 / AdvancedCopy Manager V16.3 Cluster Environment Setup Guide B1FW-6006-04ENZ0(00) October 2015 Preface Purpose This manual provides information on installation

More information

Veritas Storage Foundation In a VMware ESX Environment

Veritas Storage Foundation In a VMware ESX Environment Veritas Storage Foundation In a VMware ESX Environment Linux and Solaris x64 platforms December 2008 TABLE OF CONTENTS Introduction... 3 Executive Summary... 4 Overview... 5 Virtual Machine File System...

More information

Quick recovery for Microsoft Exchange 2003 using VERITAS Storage Foundation for Microsoft Windows and HP storage white paper

Quick recovery for Microsoft Exchange 2003 using VERITAS Storage Foundation for Microsoft Windows and HP storage white paper Quick recovery for Microsoft Exchange 2003 using VERITAS Storage Foundation for Microsoft Windows and HP storage white paper Executive summary...2 Test overview...2 Test environment...2 About the components...3

More information

Hitachi Virtual Storage Platform

Hitachi Virtual Storage Platform Hitachi Virtual Storage Platform Documentation Roadmap FASTFIND LINKS Contents MK-90RD7039-06 2011 Hitachi Ltd, All rights reserved. No part of this publication may be reproduced or transmitted in any

More information

ExpressCluster X 2.0 for Linux

ExpressCluster X 2.0 for Linux ExpressCluster X 2.0 for Linux Installation and Configuration Guide 03/31/2009 3rd Edition Revision History Edition Revised Date Description First 2008/04/25 New manual Second 2008/10/15 This manual has

More information

EXPRESSCLUSTER X 4.0 for Linux

EXPRESSCLUSTER X 4.0 for Linux EXPRESSCLUSTER X 4.0 for Linux Installation and Configuration Guide April 17, 2018 1st Edition Revision History Edition Revised Date Description 1st Apr 17, 2018 New manual. Copyright NEC Corporation 2018.

More information

IBM Spectrum Protect HSM for Windows Version Administration Guide IBM

IBM Spectrum Protect HSM for Windows Version Administration Guide IBM IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM Note: Before you use this information and the product

More information

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 SP1 User Guide P/N 302-000-098 REV 02 Copyright 2007-2014 EMC Corporation. All rights reserved. Published in the

More information

ExpressCluster X SingleServerSafe 3.2 for Windows. Configuration Guide. 2/19/2014 1st Edition

ExpressCluster X SingleServerSafe 3.2 for Windows. Configuration Guide. 2/19/2014 1st Edition ExpressCluster X SingleServerSafe 3.2 for Windows Configuration Guide 2/19/2014 1st Edition Revision History Edition Revised Date Description First 2/19/2014 New manual Copyright NEC Corporation 2014.

More information

Veritas Storage Foundation in a VMware ESX Environment

Veritas Storage Foundation in a VMware ESX Environment Veritas Storage Foundation in a VMware ESX Environment Linux and Solaris x64 platforms January 2011 TABLE OF CONTENTS Introduction... 3 Executive Summary... 4 Overview... 5 Virtual Machine File System...

More information

ETERNUS VSS Hardware Provider Installation Information

ETERNUS VSS Hardware Provider Installation Information ETERNUS VSS Hardware Provider Installation Information May 2017 Contents Abbreviations... 3 About ETERNUS VSS Hardware Provider... 3 Operating System Versions... 4 s... 5 ETERNUS DX60, ETERNUS DX80, ETERNUS

More information

The Contents and Structure of this Manual. This document is composed of the following 12 chapters.

The Contents and Structure of this Manual. This document is composed of the following 12 chapters. Preface This document briefly explains the operations that need to be performed by the user in order to connect an ETERNUS2000 model 100 or 200, ETERNUS4000 model 300, 400, 500, or 600, or ETERNUS8000

More information

ExpressCluster X 3.2 for Linux

ExpressCluster X 3.2 for Linux ExpressCluster X 3.2 for Linux Installation and Configuration Guide 5/23/2014 2nd Edition Revision History Edition Revised Date Description 1st 2/19/2014 New manual 2nd 5/23/2014 Corresponds to the internal

More information

FUJITSU Software Systemwalker Operation Manager. Upgrade Guide. UNIX/Windows(R)

FUJITSU Software Systemwalker Operation Manager. Upgrade Guide. UNIX/Windows(R) FUJITSU Software Systemwalker Operation Manager Upgrade Guide UNIX/Windows(R) J2X1-3150-16ENZ0(00) May 2015 Preface Purpose of This Document This document describes the migration method, and notes when

More information

ExpressCluster for Linux Version 3 Web Manager Reference. Revision 6us

ExpressCluster for Linux Version 3 Web Manager Reference. Revision 6us ExpressCluster for Linux Version 3 Web Manager Reference Revision 6us EXPRESSCLUSTER is a registered trademark of NEC Corporation. Linux is a trademark or registered trademark of Linus Torvalds in the

More information

Command Reference (Help differences) TopologyCmd LIST TopologyCmd IMPORT TopologyCmd EXPORT. Copyright(C) NEC Corporation All rights reserved.

Command Reference (Help differences) TopologyCmd LIST TopologyCmd IMPORT TopologyCmd EXPORT. Copyright(C) NEC Corporation All rights reserved. Command Reference (Help differences) TopologyCmd LIST TopologyCmd IMPORT TopologyCmd EXPORT Copyright(C) NEC Corporation 2017. All rights reserved. Edition Chapter/Section Details First Edition - - Revision

More information

ExpressCluster X for Windows

ExpressCluster X for Windows ExpressCluster X for Windows PP Guide (Virtualization Software) 09/30/2012 5th Edition Revision History Edition Revision Date 1 04/14/2009 Created 2 10/20/2009 Corresponds to Hyper-V 2.0. Modified sample

More information

Dell EMC Unity Family

Dell EMC Unity Family Dell EMC Unity Family Version 4.2 Configuring Hosts to Access Fibre Channel (FC) or iscsi Storage 302-002-568 REV 03 Copyright 2016-2017 Dell Inc. or its subsidiaries. All rights reserved. Published July

More information

HP StorageWorks Continuous Access EVA 2.1 release notes update

HP StorageWorks Continuous Access EVA 2.1 release notes update HP StorageWorks Continuous Access EVA 2.1 release notes update Part number: T3687-96038 Third edition: August 2005 Legal and notice information Copyright 2005 Hewlett-Packard Development Company, L.P.

More information

FUJITSU Storage ETERNUS SF Storage Cruiser V16.5 / AdvancedCopy Manager V16.5. Cluster Environment Setup Guide

FUJITSU Storage ETERNUS SF Storage Cruiser V16.5 / AdvancedCopy Manager V16.5. Cluster Environment Setup Guide FUJITSU Storage ETERNUS SF Storage Cruiser V16.5 / AdvancedCopy Manager V16.5 Cluster Environment Setup Guide B1FW-6006-06ENZ0(00) May 2017 Preface Purpose This manual provides information on installation

More information

ETERNUS SF Express V15.3/ Storage Cruiser V15.3/ AdvancedCopy Manager V15.3. Migration Guide

ETERNUS SF Express V15.3/ Storage Cruiser V15.3/ AdvancedCopy Manager V15.3. Migration Guide ETERNUS SF Express V15.3/ Storage Cruiser V15.3/ AdvancedCopy Manager V15.3 Migration Guide B1FW-5958-06ENZ0(00) June 2013 Preface Purpose This manual describes how to upgrade to this version from the

More information

MapMarker Plus Developer Installation Guide

MapMarker Plus Developer Installation Guide MapMarker Plus 11.1 Developer Installation Guide Information in this document is subject to change without notice and does not represent a commitment on the part of the vendor or its representatives. No

More information

HP Data Protector 7.0 Virtualization Support Matrix

HP Data Protector 7.0 Virtualization Support Matrix HP Data Protector 7.0 Virtualization Support Matrix Version: 3.5 Date: September 2014 The combinations of Data Protector component + operating system and/or application versions listed in this support

More information

FUJITSU Storage ETERNUS SF Express V16.5 / Storage Cruiser V16.5 / AdvancedCopy Manager V16.5. Migration Guide

FUJITSU Storage ETERNUS SF Express V16.5 / Storage Cruiser V16.5 / AdvancedCopy Manager V16.5. Migration Guide FUJITSU Storage ETERNUS SF Express V16.5 / Storage Cruiser V16.5 / AdvancedCopy Manager V16.5 Migration Guide B1FW-6000-06ENZ0(01) June 2017 Preface Purpose This manual describes how to upgrade to this

More information

HA Monitor Kit for Oracle

HA Monitor Kit for Oracle For Linux (R) (x86) Systems HA Monitor Kit for Oracle Description and User's Guide 3000-9-135-10(E) Relevant program products P-F9S2C-E1121 HA Monitor Kit for Oracle 01-01 (for Red Hat Enterprise Linux

More information

VERITAS NetBackup 6.0 Advanced Client

VERITAS NetBackup 6.0 Advanced Client VERITAS NetBackup 6.0 Advanced Client Quick Start Guide for UNIX, Windows, and Linux N15273C September 2005 Disclaimer The information contained in this publication is subject to change without notice.

More information

Data Protector 10.x Express Support Matrix

Data Protector 10.x Express Support Matrix Data Protector 10.x Express Support Matrix Version: 1.1 Date: October 2018 For the following Data Protector components, only those combinations of Data Protector components, applications, and operating

More information

Protecting Hyper-V Environments

Protecting Hyper-V Environments TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING HYPER-V ENVIRONMENTS Backup Exec TM 2014 Technical White Paper Protecting Hyper-V Environments Technical White Papers are designed to introduce Symantec

More information

Systemwalker Software Configuration Manager. Operation Guide. Windows/Linux

Systemwalker Software Configuration Manager. Operation Guide. Windows/Linux Systemwalker Software Configuration Manager Operation Guide Windows/Linux B1X1-0128-04ENZ0(00) January 2013 Preface Purpose of this Document This document explains how to use the different features and

More information

ETERNUS Web GUI User's Guide (Operation)

ETERNUS Web GUI User's Guide (Operation) ETERNUS Web GUI User's Guide (Operation) FUJITSU Storage ETERNUS DX100 S3/DX200 S3, ETERNUS DX500 S3/DX600 S3 Disk storage systems, ETERNUS DX200F All Flash Array This page is intentionally left blank.

More information

EXPRESSCLUSTER X 3.3 for Linux

EXPRESSCLUSTER X 3.3 for Linux EXPRESSCLUSTER X 3.3 for Linux Installation and Configuration Guide 04/10/2017 5th Edition Revision History Edition Revised Date Description 1st 02/09/2015 New manual. 2nd 06/30/2015 Corresponds to the

More information

FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.1. Overview

FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.1. Overview FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.1 Overview B1FW-6009-02ENZ0(00) June 2014 Preface Purpose This manual provides an overview for understanding the FUJITSU Storage ETERNUS SF AdvancedCopy

More information

Interstage Shunsaku Data Manager Using the Shunsaku Manuals

Interstage Shunsaku Data Manager Using the Shunsaku Manuals Interstage Data Manager Using the Manuals Using the Manuals Trademarks Trademarks of other companies are used in this manual only to identify particular products or systems. Product Microsoft, Visual C++,

More information

FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.0. Overview

FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.0. Overview FUJITSU Storage ETERNUS SF AdvancedCopy Manager V16.0 Overview B1FW-6009-01ENZ0(01) May 2014 Preface Purpose This manual provides an overview for understanding the FUJITSU Storage ETERNUS SF AdvancedCopy

More information

Disaster Recovery Guide for Windows 2008 and RHEL 5.x platforms with external disk support

Disaster Recovery Guide for Windows 2008 and RHEL 5.x platforms with external disk support Disaster Recovery Guide for Windows 2008 and RHEL 5.x platforms with external disk support HP Data Protector 6.11 Technical white paper Table of contents 1. Assisted Manual Disaster Recovery... 2 2. Overview

More information

Veritas NetBackup for Microsoft SQL Server Administrator's Guide

Veritas NetBackup for Microsoft SQL Server Administrator's Guide Veritas NetBackup for Microsoft SQL Server Administrator's Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft SQL Server Administrator's Guide Last updated: 2018-04-10 Document version:netbackup

More information

Job Management Partner 1/Automatic Job Management System 3 for Enterprise Applications Description, User's Guide and Reference

Job Management Partner 1/Automatic Job Management System 3 for Enterprise Applications Description, User's Guide and Reference Job Management Partner 1 Version 10 Job Management Partner 1/Automatic Job Management System 3 for Enterprise Applications Description, User's Guide and Reference 3021-3-333-10(E) Notices Relevant program

More information

ETERNUS Veritas Operations Manager Storage Insight Plug-in 1.0 User s Guide P2X ENZ0

ETERNUS Veritas Operations Manager Storage Insight Plug-in 1.0 User s Guide P2X ENZ0 ETERNUS Veritas Operations Manager Storage Insight Plug-in 1.0 User s Guide This page is intentionally left blank. Preface This manual explains how to use and operate the ETERNUS Veritas Operations Manager

More information

HP MSA2000 Family VDS and VSS Hardware Providers installation guide

HP MSA2000 Family VDS and VSS Hardware Providers installation guide HP MSA2000 Family VDS and VSS Hardware Providers installation guide Part number: 485500-003 Second edition: February, 2009 Legal and notice information Copyright 2009 Hewlett-Packard Development Company,

More information

FUJITSU Storage ETERNUS SF Express V16.3 / Storage Cruiser V16.3 / AdvancedCopy Manager V16.3. Migration Guide

FUJITSU Storage ETERNUS SF Express V16.3 / Storage Cruiser V16.3 / AdvancedCopy Manager V16.3. Migration Guide FUJITSU Storage ETERNUS SF Express V16.3 / Storage Cruiser V16.3 / AdvancedCopy Manager V16.3 Migration Guide B1FW-6000-04ENZ0(00) October 2015 Preface Purpose This manual describes how to upgrade to this

More information

Interoperability of Bloombase StoreSafe Security Server, QLogic FC-HBAs and QLogic SAN Switch for Transparent Storage Area Network (SAN) Encryption

Interoperability of Bloombase StoreSafe Security Server, QLogic FC-HBAs and QLogic SAN Switch for Transparent Storage Area Network (SAN) Encryption Bloombase Interoperability Program P1 2012 Bloombase Interoperability of Bloombase StoreSafe Security Server, QLogic FC-HBAs and QLogic SAN Switch for Transparent Storage Area Network (SAN) Encryption

More information

ETERNUS SF Express V15.1/ Storage Cruiser V15.1/ AdvancedCopy Manager V15.1. Migration Guide

ETERNUS SF Express V15.1/ Storage Cruiser V15.1/ AdvancedCopy Manager V15.1. Migration Guide ETERNUS SF Express V15.1/ Storage Cruiser V15.1/ AdvancedCopy Manager V15.1 Migration Guide B1FW-5958-03ENZ0(00) August 2012 Preface Purpose This manual describes how to upgrade to this version from the

More information

P3AM ENZ0. FUJITSU Storage ETERNUS DX S4/S3 series Hybrid Storage Systems. Configuration Guide (NAS)

P3AM ENZ0. FUJITSU Storage ETERNUS DX S4/S3 series Hybrid Storage Systems. Configuration Guide (NAS) FUJITSU Storage ETERNUS DX S4/S3 series Hybrid Storage Systems Configuration Guide (NAS) This page is intentionally left blank. Preface Fujitsu would like to thank you for purchasing the FUJITSU Storage

More information

HP OpenView Storage Data Protector A.05.10

HP OpenView Storage Data Protector A.05.10 HP OpenView Storage Data Protector A.05.10 ZDB for HP StorageWorks Enterprise Virtual Array (EVA) in the CA Configuration White Paper Edition: August 2004 Manufacturing Part Number: n/a August 2004 Copyright

More information

ExpressCluster X 3.1 for Linux

ExpressCluster X 3.1 for Linux ExpressCluster X 3.1 for Linux Installation and Configuration Guide 10/11/2011 First Edition Revision History Edition Revised Date Description First 10/11/2011 New manual Copyright NEC Corporation 2011.

More information

Hitachi Dynamic Link Manager Software User's Guide (for Windows(R)) P35-50(E)

Hitachi Dynamic Link Manager Software User's Guide (for Windows(R)) P35-50(E) Hitachi Dynamic Link Manager Software User's Guide (for Windows(R)) 3020-3-P35-50(E) Relevant program products Hitachi Dynamic Link Manager version 6.6 For details about the supported OSs, see the HDLM

More information

ETERNUS SF Storage Cruiser Message Guide. Windows/Solaris/Linux

ETERNUS SF Storage Cruiser Message Guide. Windows/Solaris/Linux ETERNUS SF Storage Cruiser 14.0 Message Guide Windows/Solaris/Linux J2S2-1548-01ENZ0(00) July 2009 Preface Purpose This manual explains the output messages related to storage management of ETERNUS SF Storage

More information

Technical Note. Dell/EMC Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract

Technical Note. Dell/EMC Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract Technical Note Dell/EMC Solutions for Microsoft SQL Server 2005 Always On Technologies Abstract This technical note provides information on the Dell/EMC storage solutions, based on the Microsoft SQL Server

More information

HP 3PAR Recovery Manager Software for Oracle

HP 3PAR Recovery Manager Software for Oracle HP 3PAR Recovery Manager 4.6.0 Software for Oracle User Guide Abstract This document provides the information needed to install, configure, and use the HP 3PAR Recovery Manager 4.6.0 Software for Oracle

More information

Veritas NetBackup for SQLite Administrator's Guide

Veritas NetBackup for SQLite Administrator's Guide Veritas NetBackup for SQLite Administrator's Guide Windows and Linux Release 8.1.1 Documentation version: 8.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the

More information

CBL Subroutines User's Guide

CBL Subroutines User's Guide FUJITSU Software NetCOBOL V11.1 CBL Subroutines User's Guide Windows(64) B1WD-3297-02ENZ0(00) February 2017 Preface About CBL Routines The CBL routines explained in this manual are functionally compatible

More information

HP EVA Cluster Extension Software Installation Guide

HP EVA Cluster Extension Software Installation Guide HP EVA Cluster Extension Software Installation Guide Abstract This guide contains detailed instructions for installing and removing HP EVA Cluster Extension Software in Windows and Linux environments.

More information

ETERNUS SF Express V15.0. Operation Guide. Windows/Linux

ETERNUS SF Express V15.0. Operation Guide. Windows/Linux ETERNUS SF Express V15.0 Operation Guide Windows/Linux B1FW-5962-01ENZ0(02) March 2012 Preface Purpose This manual gives an overview of ETERNUS SF Express. ETERNUS SF Express is part of the following Storage

More information

Veritas Volume Replicator Option by Symantec

Veritas Volume Replicator Option by Symantec Veritas Volume Replicator Option by Symantec Data replication for disaster recovery The provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable

More information