Professional Documents
Culture Documents
Click the Notes tab to view text that corresponds to the audio recording.
Click the Supporting Materials tab to download a PDF version of this eLearning.
Copyright © 1996, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012 EMC Corporation. All Rights Reserved. EMC
believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY
KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY
OR FITNESS FOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC2, EMC, Data Domain, RSA, EMC Centera, EMC ControlCenter, EMC LifeLine, EMC OnCourse, EMC Proven, EMC Snap, EMC SourceOne,
EMC Storage Administrator, Acartus, Access Logix, AdvantEdge, AlphaStor, ApplicationXtender, ArchiveXtender, Atmos, Authentica, Authentic
Problems, Automated Resource Manager, AutoStart, AutoSwap, AVALONidm, Avamar, Captiva, Catalog Solution, C-Clip, Celerra, Celerra
Replicator, Centera, CenterStage, CentraStar, ClaimPack, ClaimsEditor, CLARiiON, ClientPak, Codebook Correlation Technology, Common
Information Model, Configuration Intelligence, Configuresoft, Connectrix, CopyCross, CopyPoint, Dantz, DatabaseXtender, Direct Matrix
Architecture, DiskXtender, DiskXtender 2000, Document Sciences, Documentum, elnput, E-Lab, EmailXaminer, EmailXtender, Enginuity,
eRoom, Event Explorer, FarPoint, FirstPass, FLARE, FormWare, Geosynchrony, Global File Virtualization, Graphic Visualization, Greenplum,
HighRoad, HomeBase, InfoMover, Infoscape, Infra, InputAccel, InputAccel Express, Invista, Ionix, ISIS, Max Retriever, MediaStor, MirrorView,
Navisphere, NetWorker, nLayers, OnAlert, OpenScale, PixTools, Powerlink, PowerPath, PowerSnap, QuickScan, Rainfinity, RepliCare, RepliStor,
ResourcePak, Retrospect, RSA, the RSA logo, SafeLine, SAN Advisor, SAN Copy, SAN Manager, Smarts, SnapImage, SnapSure, SnapView, SRDF,
StorageScope, SupportMate, SymmAPI, SymmEnabler, Symmetrix, Symmetrix DMX, Symmetrix VMAX, TimeFinder, UltraFlex, UltraPoint,
UltraScale, Unisphere, VMAX, Vblock, Viewlets, Virtual Matrix, Virtual Matrix Architecture, Virtual Provisioning, VisualSAN, VisualSRM,
Voyence, VPLEX, VSAM-Assist, WebXtender, xPression, xPresso, YottaYotta, the EMC logo, and where information lives, are registered
trademarks or trademarks of EMC Corporation in the United States and other countries.
All other trademarks used herein are the property of their respective owners.
© Copyright 2012 EMC Corporation. All rights reserved. Published in the USA.
The EMC Data Domain DD OS 5.2 Software Differences training course provides information
necessary to distinguish new DD OS 5.2 features with previous versions, both in terms of
software and hardware changes or updates. This course focuses on new software and related
updates.
This course is intended for EMC internal employees and partners such as EMC Solutions
Architects, Technical Consultants, Implementation Engineers, Technical Support Engineers and
others providing services and support for Data Domain systems.
The content is positioned to compare what’s new or different with existing features, functions,
and software. Due to this, prior experience with Data Domain technology and equipment is
assumed.
Before attending this course, you should have completed the following courses:
• EMC Data Domain Technology and Systems Introduction
• EMC Data Domain System Administration
• EMC Data Domain System Installation
Visit http://education.emc.com
To get credit for completing this course you must pass an online exam with a score of 80% or
higher.
Note the addition of the DD990 storage system for large enterprises and new licenses for Data
Domain software options.
Several enhancements have been made to Data Invulnerability Architecture in the DD OS 5.2
release. Let’s take a closer look.
OCV – Stabilizes containers on the disk platter, releases them from NVRAM, and then fully verifies them later by
reading back from disk.
ICV – Stabilizes containers on the disk platter and fully verifies them before releasing them from NVRAM.
MTrees provide administrators a logical way to group their enterprise data, and with quotas,
administrators can control logical space targeted on a per-MTree basis.
These extended and improved statistics also allow administrators to better understand the NFS
clients’ read/write behavior, easing diagnosis of NFS performance issues.
The Congestion Checker utility analyzes network performance and provides a means to identify
enhancements to reduce the impact of congestion to a system.
• In addition, the utility measures the effectiveness of the congestion avoidance
algorithm being used.
• It runs on a DD system at the customer's site in the customer's environment.
Part of the analysis may require control of programs on both ends of the network
path.
In compliance with the enhanced role-based access control (RBAC) policy, the roles of user,
security, and backup operator can run the following commands. Note that the data-access
role cannot run these commands.
For reset commands, only the admin role can reset other users. The security role cannot
reset other users. Users can reset their own keys.
Refer to the DD OS 5.2 Command Reference Guide from the support portal for details on
how to use these modified DD OS 5.2 CLI commands.
The name is new but the functionality is the same as it was when it was known as DD
Retention Lock.
This is the option to use when your retention locking needs are not as stringent as complying
with federal regulations and standards such as SEC 17a-4f.
Rotating keys and tokens on a regular basis not only is required to meet compliance, but also
increases security by limiting data exposure and allowing Administrators to quickly respond to
events.
Functionality changes:
A centralized key management solution manages all the Data Domain systems and other
devices throughout the enterprise.
Note: These are RSA Key Management (RKM) key state names and are set through the RKM
interface. These names can differ from Data Domain system key state names.
With DD OS 5.2, a DD system with Extended Retention license can provide granular replication
for both NetWorker (via DD Boost) and CommVault (via CIFS) data.
• This allows a customer to send both NetWorker and CommVault data to the same Data
Domain system, providing short-term retention and MTree replication for the
CommVault dataset while also having long-term retention and a catalogue-aware DR
copy for the NetWorker dataset.
• DD OS 5.1 introduced MTree replication support for CIFS and NFS protocols.
• With DD OS 5.2, MTree replication has been extended to support replication of VTL
MTree pools. This enables a single replication type to be used for protecting data
written by all protocols except DD Boost.
For the DD OS 5.2 release, the only supported form of replication for data locked with DD
Retention Lock Compliance is collection replication.
Use the tabs at the top of this window to review each type of command.
Review the information in the table to fully understand the functionality of this release.
Note: ESRS ConnectEMC is not functional for DD OS 5.2 systems with ESRS Gateway
version 2.14:
DD systems aren’t integrated with ESRS’s ConnectEMC functionality yet
DD systems won’t send system-initiated alerts to EMC Support
EMC ESRS can’t actively monitor the health of Data Domain systems
• Solution: Data Domain products must be configured to generate and use their email-
home feature called autosupport (ASUP).
To monitor Data Domain systems using SNMP, you will need to install the Data Domain MIB in
your SNMP Management system.
How To Download the SNMP MIB:
1. Using Enterprise Manager, navigate to the System Settings > General Configuration >
SNMP page, click Download MIB file.
2. In the Opening DATA_DOMAIN.mib dialog box, select Open.
3. Click Browse and select a browser to view the MIB in a browser window.
Note: If using the Microsoft Internet Explorer browser, enable Automatic prompting for file
download.
4. Save the MIB, typically to the location of the SNMP management tool, or exit the
browser.
DD OS also supports the standard MIB-II so you can also query MIB-II statistics for general data
such as network statistics. For full coverage of available data you should utilize both the Data
Domain MIB and the standard MIB-II MIB.
Note: The Offline Diagnostics User's Guide is now generally available to customers.
Additionally, new Knowledge Base articles for technical support are available on the secure
support portal for reference.
This section provides an overview of the key enhancements for DD OS 5.2 release made to
the:
• Memory diagnostic
• NVRAM diagnostic
• SAS diagnostic
• VTL diagnostic
• Head Unit Disk quick test
• PCIe motherboard topology test
On older systems you may need to change system BIOS settings to:
• Boot the system from a USB key
• Use a serial console or laptop with your system
Click through this section to see how to set or edit the BIOS settings, which varies by system.
New BIOS settings for the DD990 are included in this section.
NOTE: The BIOS password and settings procedure is now in an internal Knowledge Base
article on the secure support portal. It has been removed from the DD OS 5.2 Offline
Diagnostics Users Guide.
Warning!
Do not change any other settings in BIOS that are not instructed. This could prevent the
system from booting properly.
• Refer to the EMC Data Domain Operating System USB Installation Guide for instructions
on how to download a bootable DD OS 5.2 USB image, install it onto a USB key, and
then select offline diagnostics from the boot menu.
• If you booted offline diagnostics from a USB key, you can use the same key to store log
files if it has at least 10 MB of free space.
A 1GB key with DDOS will have about 100MB left of free space
• There are two ways to save diagnostic logs to a USB key.
To save log files to a USB key automatically following a diagnostics run, insert the
USB key after the Main Menu appears, but before running diagnostics.
To save the latest log files to a USB key manually, insert the USB key after
diagnostics have been run and select the Save Diagnostic Logs to USB Key option on
the Main Menu before starting another diagnostics run or exiting the Main Menu.
• Remove the USB key before exiting the Main Menu (and rebooting the system). The
USB key is un-mounted automatically.
Note: Running diagnostics a second time will overwrite previous logs. Download any logs you
want to preserve before running another diagnostic. This affects both USB, and infernally saved
logs.
• Log files written to a USB key are stored in the parent log directory /diag_logs.
It is created off the USB root and a subdirectory is created /<log-mm-dd-hh-mm>
(where mm = month,
dd = day, hh = hour, and mm = minute logs were saved).
Individual diagnostic logs and a log of the diagnostic flow are saved in this
subdirectory: /diag_logs /<log-mm-dd-hh-mm>
• These logs are saved in ASCII format for viewing on any Linux or Windows machine.