Dell PowerVault Storage Area Network Dell DR Series System Command Line Refere - Page 8
Data Integrity Checking
View all Dell PowerVault Storage Area Network manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 8 highlights
connection --enable --name --type
connection --enable --name <name> --type <nfs|cifs|ost>
...........................................................................
103
connection --disable --name <name> --type <nfs|cifs|ost>
..........................................................................
103
connection --help
...........................................................................................................................................
104
Container
..............................................................................................................................................................
105
Container Command Usage
...........................................................................................................................
105
container --show
............................................................................................................................................
105
container --show [--name <name>] [--verbose]
............................................................................................
105
container --add --name <name>
....................................................................................................................
106
container --delete --name <name>
................................................................................................................
106
container --delete --name <name> [--delete_files]
.......................................................................................
107
container --marker [--enable <Auto | CommVault | Networker | TSM | ARCserve>] [--disable <Auto |
CommVault | Networker | TSM | ARCserve>] --name <name>
......................................................................
107
container --delete_files --name <name>
.......................................................................................................
108
container --help
..............................................................................................................................................
108
Replication
............................................................................................................................................................
109
Replication Command Usage
........................................................................................................................
109
replication --show [--name <name>] [--role <source | target>] [--verbose] [--limits]
...................................
110
replication --show
..........................................................................................................................................
110
replication --show [--limits]
............................................................................................................................
110
replication --add --name <name> --role <source | target> --peer <ip address | hostname> [--
peer_name <name>] [--username <user name>] [--encryption <none | aes128 | aes256>]
..........................
111
replication --update --name <name> --role <source | target> [--peer <ip address | hostname>] [--
encryption <none | aes128 | aes256>] [--username <user name>]
................................................................
111
replication --delete --name <name> --role <source | target> [--force]
.........................................................
112
replication --start --name <name> --role <source | target>
..........................................................................
113
replication --stop --name <name> --role <source | target>
...........................................................................
113
replication --limit --speed <<num><kbps | mbps | gbps> | default> --target <ip address | hostname>
.........
113
replication --resync --name <name> --role <source | target>
.......................................................................
114
replication --troubleshoot --peer <ip address | hostname>
...........................................................................
114
replication --help
............................................................................................................................................
114
Schedule
...............................................................................................................................................................
116
Schedule Command Usage
............................................................................................................................
116
schedule --show [--cleaner]
..........................................................................................................................
116
schedule --show [--replication]
.....................................................................................................................
116
schedule --show [--name <name>]
................................................................................................................
117
schedule --add --day <day of the week> [--cleaner] [--replication] [--start_time <hh:mm>] [--
stop_time <hh:mm>] [--name <name>]
..........................................................................................................
117
schedule --delete --day <day of the week> [--cleaner] [--name <name>] [--replication]
.............................
118
schedule --help
..............................................................................................................................................
118
6 Data Integrity Checking
..........................................................................................................
121
About Data Check
.................................................................................................................................................
121