This publication contains proprietary information which is protected by copyright. No part of this publication can be
reproduced, transcribed, stored in a retrieval system, translated into any language or computer language, or
transmitted in any form whatsoever without the prior written consent of the publisher, American Megatrends, Inc.
American Megatrends, Inc. acknowledges the following trademarks:
Intel and Pentium are registered trademarks of the Intel Corporation.
AMD, Athlon, and Athlon XP are trademarks of the Advanced Micro Devices Corporation.
Sun and NFS are trademarks of the Sun Microsystems Corporation.
Microsoft, Windows, Internet Explorer and MS-DOS are registered trademarks of the Microsoft Corporation and
Active Directory is a trademark of the Microsoft Corporation.
Macromedia Flash is a trademark of the Macromedia Corporation.
IBM, AT, VGA, PS/2, and OS/2 are registered trademarks and XT and CGA are trademarks of the International
Business Machines Corporation.
Digital, DEC, and OpenVMS are trademarks of Digital Equipment Corporation.
Compaq is a registered trademark of the Compaq Corporation.
Hewlett-Packard, HP, and HP-UX are registered trademarks of Hewlett-Packard Company.
Novell, NetWare, IPX, NCP, and NetWare Core Protocol are registered trademarks of the Novell Corporation.
UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open
Company Ltd.
Linux is a registered trademark of Linus Torvalds.
Red Hat is a registered trademark of the Red Hat Corporation.
Apple and AppleTalk are registered trademarks of Apple Computer Corporation.
Yellow Pages is a registered trademark in the United Kingdom of British Telecom.
Ethernet is a registered trademark of the Xerox Corporation.
802 is a registered trademark of the Institute of Electrical and Electronic Engineers, Inc. (IEEE).
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks
and names or their products. American Megatrends, Inc. disclaims any proprietary interest in trademarks and trade
names other than its own.
Revision History
02/16/06 Created iTX 2.1 CLI document.
02/16/06 iSCSI Tape command added.
02/16/06 UPS driver config command added.
02/23/06 Synchronous replication commands added.
06/20/06 Volume and Snapshot commands updated.
06/21/06 Synchronous replication, iSCSI configuration updated.
06/23/06 Document is revised and examples are added.
07/14/06 General Server configuration section updated.
07/27/06 Updated for version 2.5.1011 and above.
08/17/06 Added Error Codes section.
04/26/07 Changed the volume chunk size.
04/26/07 Added the SRM commands.
06/28/07 Removed Tape commands.
01/16/09 Updated document and added journal and cdp commands.
12/11/09 Update the network command usage and CLI error text
01/25/10 Updated the OS Agnostic HA related commands and CLI error text
01/25/10 Updated Network Alias commands
01/25/10 Updated the iSCSI commands and corrected wrong format updation
03/30/10 Corrected the Create Volume usage and Get Eventlog Usage.
04/11/10 Update the create replication commands
06/07/10 Corrected the output of ‘cli main’.
06/07/10 Removed the term apple
06/07/10 Corrected set -t nfs command.
06/07/10 Corrected set raid commands.
06/07/10 Added available cache options for create raid.
06/07/10 Since alarm and cache is supported for set raid; the ‘not supported’ was removed.
06/07/10 Osinfo commands removed.
Preface
iii
Table of Contents
Revision History ......................................................................................................................................... ii
Table of Contents ..................................................................................................................................... iv
Table of Contents ..................................................................................................................................... iv
Limited Warranty ....................................................................................................................................... v
Limitations of Liability ................................................................................................................................ v
Technical Support ...................................................................................................................................... v
Web Site ................................................................................................................................................ v
Disclaimer ................................................................................................................................................. vi
Chapter 1 Overview of CLI ..................................................................................................................... 1
Overview of CLI ......................................................................................................................................... 1
1. RAID Disk Creation ............................................................................................................................ 3
2. Container and Volume Configuration................................................................................................. 4
3. Enabling Share or Target ................................................................................................................... 5
Chapter 2 Command Set ........................................................................................................................ 7
Command Set ............................................................................................................................................ 7
General Server Configuration .................................................................................................................. 13
Health Configuration ................................................................................................................................ 13
The buyer agrees that if this product proves to be defective, American Megatrends is only obligated to repair
or replace this product at American Megatrends’ discretion according to the terms and conditions of the
warranty registration software that accompanies this product. American Megatrends shall not be liable in
tort or contract for any loss or damage, direct, incidental or consequential resulting from the use of this
product. Please see the Warranty Registration Software shipped with this product for full warranty details.
Limitations of Liability
American Megatrends, Inc. shall in no event be held liable for any loss, expenses, or damages of any kind
whatsoever, whether direct, indirect, incidental, or consequential (whether arising from the design or use of
this product or the support materials provided with the product). No action or proceeding against American
Megatrends may be commenced more than two years after the delivery of product to Licensee of Licensed
Software.
Licensee agrees to defend and indemnify American Megatrends from any and all claims, suits, and liabilities
(including attorney’s fees) arising out of or resulting from any actual or alleged act or omission on the part of
Licensee, its authorized third parties, employees, or agents, in connection with the distribution of Licensed
Software to end-users, including, without limitation, claims, suits, and liability for bodily or other injuries to
end-users resulting from use of Licensee’s product not caused solely by faults in Licensed Software as
provided by American Megatrends to Licensee.
Technical Support
American Megatrends provides technical support for American Megatrends products purchased directly
from American Megatrends or from an American Megatrends-authorized reseller only.
If… Then…
You purchased this product from American Megatrends
or from a certified American Megatrends reseller,
This American Megatrends product was installed as part
of a system manufactured by a company other than
American Megatrends or you purchased an American
Megatrends product from an unauthorized reseller,
If the American Megatrends StorTrends® iTX Software fails to operate as described or you are in doubt
about a configuration option, please call technical support at 770-246-8645.
Web Site
We invite you to access the American Megatrends’ World Wide Web site at:
http://www.ami.com/
call American Megatrends’ technical support at 770246-8645. Please be prepared to specify the serial
number or CD Key of the product (if applicable).
call the technical support department of the computer
manufacturer or the unauthorized reseller. American
Megatrends does not provide direct technical support in
this case.
Preface
v
Disclaimer
This manual describes the operation of the American Megatrends StorTrends® iTX Software. Although
efforts have been made to assure the accuracy of the information contained here, American Megatrends
expressly disclaims liability for any error in this information, and for damages, whether direct, indirect,
special, exemplary, consequential or otherwise, that may result from such error, including but not limited to
the loss of profits resulting from the use or misuse of the manual or information contained therein (even if
American Megatrends has been advised of the possibility of such damages). Any questions or comments
regarding this document or its contents should be addressed to American Megatrends at the address shown
on the inside of the front cover.
American Megatrends provides this publication “as is” without warranty of any kind, either expressed or
implied, including, but not limited to, the implied warranties of merchantability or fitness for a specific
purpose.
Some states do not allow disclaimer of express or implied warranties or the limitation or exclusion of liability
for indirect, special, exemplary, incidental or consequential damages in certain transactions; therefore, this
statement may not apply to you. Also, you may have other rights which vary from jurisdiction to jurisdiction.
This publication could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. American
Megatrends may make improvements and/or revisions in the product(s) and/or the program(s) described in
this publication at any time.
Requests for technical information about American Megatrends products should be made to your American
Megatrends authorized reseller or marketing representative.
Our feature rich StorTrends® iTX comes with a built-in command line interface (CLI) that provides
extensive options to monitor and control “managed objects”. Wherever applicable, CLI follows industry
standards and uses extensible ‘tags’ for new features and objects. The command line utility can be accessed
through an in-band special console connected to the StorTrends® iTX system or out-of-band via a SSH or
telnet client. It can also be used with scripting languages to automate a set of operations.
Overview of CLI
Our CLI supports commands in excess of 140 verbs and supports XML output format. The design is very
similar to DMTF SMASH specifications and is being extended to fully comply with SMASH. Every managed
element or object has a SMASH compliant <Target> addressing conforming to the server management
instance addressing specification. The commands implemented are essentially “stateless” in nature. SMASH
compliant <Verbs> is used to select the management actions, which are complemented by extensive <Option>
attributes to control the behavior of the command. <Property> attributes can control the behavior of the
output produced by the <Verb> along with various other mapping actions to the CIM schema.
The output produced can be controlled depending on the need, For example, in automation scripting. Output
can also be made to be in the W3C standard compliant, self-descriptive XML format. The output format
includes new tags pertinent to the object management. Inherent support for multi-lingual documents and
Unicode data, along with content separation from presentation, aids in development of management
applications that have their own data representation format. CLIs used for monitoring of performance
parameters are dished out in XML tags that assist in graphing and charting, and can be right away imported
by spreadsheet applications.
Accessing CLI
The CLI can be accessed either through an in-band console connected directly to the ITX box or through the
out-of-band / remote CLP agents. It can also be accessed through a remote terminal emulation program using
SSH or Telnet. Once connected, the administrator has to login to the system to perform the operations. In a
typical console session, the user will be presented with a login screen such as:
login: cli <Enter>
password: ******* <Enter>
“cli” is the special user that has been provided with CLI access. The password is factory defaulted to
“password”. Once logged in, the system will present the user with a CLI shell as follows:
CLI>
The user can then enter the supported commands in any order. The supported commands are listed in the
next section. To close the session, the user can type the command ‘quit’. This will end the session.
Chapter One: Overview of CLI
1
Initial Setup
Network Configuration
Once the StorTrends® iTX is installed in a new system, please ensure that the initial network configuration is
proper. The system factory defaults to DHCP setup. The configured network settings can be verified by the
following CLI commands:
CLI> get –-type or –t port
-–name or –n NIC-1
--info or -i
network <Enter>
Example: get –t port –n nic-1 –i network
This will display the NIC-1 network settings.
To configure static IP to this port:
CLI> set –-type or –t port
–-name or –n NIC-1
–-ip or –i 10.0.0.100
–-mask or –m 255.255.255.0
–-gate or –g 10.0.0.7 (optional)
--pridns or –p 10.0.0.2 (optional)
--secdns or –s 0.0.0.0 (optional)
--dnssuff or –f ami.com (optional)
network <Enter>
Example: set –t port –n nic-1 –i 10.0.0.100 –g 10.0.0.7
-p 10.0.0.2 –s 0.0.0.0 –f ami.com network
Here 10.0.0.100 is the static IP address, 255.255.255.0 is netmask and 10.0.0.7 is the network gateway.
Initial volume configuration can be done in three stages.
1. RAID Disk Creation
At the base level is the RAID CONTROLLER.
CLI> list –-type or –t controller
raid <Enter>
Example: list –t controller raid
This will list the available RAID controllers in the system. By default, Software MD will be shown as a RAID
controller with controller number “0”. If Hardware RAID controllers present, then they will take precedence
over Software MD.
CLI> list –-type or -t PD
--controllerno or -n 0
raid <Enter>
Example: list –t pd –n 0 raid
This will list the PD’s that are available for configuration in controller number zero. PD’s can be grouped
through a RAID level to form a Logical disk – LD.
CLI>create –-type or -t LD
–-stripesize or -p 64
–-diskname or -d /dev/sda (use –d 1 or –d 2…15 on a 3U)
–-diskname or –d /dev/sdb
–-diskname or –d /dev/sdc
–-diskname or –d /dev/sdd
This command creates a container named “accounting” from the LD /dev/sdb.
On a 1U, LDs are created with names of /dev/mdX, with X as 0, 1, and so on. Therefore the above operation
would be accomplished by entering, for example:
A NAS volume can be created by the following command:
CLI>create –-type or –t volume
–-containername or -c container1
–-volumename or -v nasvol0
–-volumesize or -z 1000 (in GB)
–-provisiontype or -p 0 (0 is thin-provisioned, 1 is exact)
–-volumetype or -e 0 (type 0 is ROW)
–-voldialect or –f 1 (dialect 1 is NAS, 0 is iSCSI)
--chunksize or –k (8 or 64 for 8KB and 64KB chunk sized volume
respectively.)
This command creates volume “nasvol0” in container “container1” with size of 1000GB, that is thinprovisioned, Redirect-On-Write, and of NAS type with chunk size as 64KB.
Volume size should be in GBs and currently supported volume type is 0 – ROW.
This command creates volume “sanvol0” in container “container1” with size of 1000GB, that is thinprovisioned, Redirect-On-Write, and of SAN type with chunk size as 8KB.
3. Enabling Share or Target
To enable NAS share, use the following command syntax. Make sure the corresponding share protocol is
enabled in the system.
First, create the directory in the path before creating a share for the path.
CLI>create --path or -p container1_nasvol0/test
dir<Enter>
Example: create –p cont1_nasvol0/test dir
This command creates the subdirectory of “test” within the volume “nasvol0” in the container “cont1”.
Then create the share using the following syntax.
CLI>add –-name or -n NASShare
–-path or -p container1_nasvol0/test
–-prototype or -s cifs
–-prototype or -s nfs
share <Enter>
The CLI design being similar to the DMTF SMASH specifications follows the standard to a great extent. The
commands supported can be represented grammatically as follows:
<verb> <option> … <property> <target>
The CLI provides a wide range of command sets. These commands are grouped into modules for better
understanding. Each command is non-interactive and state-less. The <options> are supported using switches.
Our CLI accepts both short and long options for each switch to make it user-friendly. If there is any error in
the parameters entered, the CLI will display the usage of that particular command.
CLI also provides extensive online help. Each command supports a help option using ‘-h’ or
‘--help’ that will display the grammar of the command.
To get the main list of targets or modules present in CLI, the user should type the command “main” at the
CLI prompt.
The following targets will get displayed:
*****************************************************************
TARGET LIST
Language
0-Unknown
1-English
2-Japanese
3-Korean
4-Chinese
Alert Mask:
1 - Information
2 - Warning
4 - Fatal
Any combination of the three alert
masks up to a maximum of seven
levels.
Chapter Two: Command Set 9
Date/Time Configuration
These commands configure the time zone and date.
Command Argument Description
set timezone -z/--zone <zone name>
-x/--xml
For example: set –z America/New_York timezone
get timezone For example: get timezone Shows the configured time zone.
set datetime -n/--ntp <FQDN of NTP server or ipaddress> Configures the NTP server to be
get timezone -c/--count Gets the number of time zones.
set datetime -d/--date <date in MM/DD/YYYY>
-t/--time <time in HH:MM:SS>
-x/--xml
For example: set –d 12/01/2006 –t 12:11:55
datetime
list timezone For example: list timezone Lists the time zones supported.
get datetime For example: get datetime Shows the date & time.
Sets the time zone of StorTrends®
iTX to given time zone.
used for time synchronization.
Sets the date and time to given
values.
Domain Configuration
These commands configure the domain server to be used for authentication.
Command Argument Description
get domain -t/--type {nis/ms}
-x/--xml
For example: get –t nis domain
set domain -t/--type{ nis }
-b/--broadcast {y/n}
-d/--domain <domainname >
-s/--server <server-1>
-s/--server <server-2>
-x/--xml
For example: set -t nis -b n -d NISSERV -s
10.0.0.215 -s 10.0.0.25 -s 10.0.0.5 domain
set domain -t/--type {ms}
-m/--mtype {wg}
-d/--domain< domainname>
-x/--xml
For example: set -t ms -m wg -d MYGROUP
domain
set domain -t/--type {ms}
-m/--mtype {/nt/ads}
-d/--domain< domainname>
-D/--nbname<netbiosname> (optional)
-i/--ip <serverip>
-I/--secip<secondary serverip> (optional)
-o/--orgname <orgName> (optional)
-u/--user <Adminname >
-p/--passwd <Adminpassword>
-x/--xml
For example: set –t ms –m ads –d domain1.com –D
domain1 –I 10.10.220.1 –u Administrator –p
password domain
Displays the domain information of
either NIS or Microsoft (MS)
domains.
Sets the NIS domain to given
domain with broadcast mode OFF
or ON. Servers can be added using
the –s/--server switch.
If broadcast is set to OFF, then no
servers are needed.
These commands retrieve the general server information, such as build version, build date and so on. It also
allows configuration of a new server name.
Command Argument Description
get serverinfo For example: get serverinfo Displays the server information
such as server name, build version,
build date and so on.
set serverinfo -n/--name <server name>
-x/--xml
For example: set –n newitx serverinfo
set serverinfo -p/--password
–u/--user{root/cli}
-x/--xml
create dump Creates a dump of the running
Configures the name of the server.
The length of the servername
should be less than 16 characters
and the first character must be
alphabetical.
System will prompt you to enter
and confirm the new administrator
(root/cli) password.
Password length should be 32 or
less characters.
system that is useful for debugging.
The file is placed in /usr/AmiNas.
Health Configuration
These commands get the health information
Command Argument Description
get health -c/--enccount
-x/--xml
For example: get –c health
get health -i/--info –n/--enclosure
-x/--xml
For example: get –i –n 0 health
get health -s/--encstatus
–n/--enclosure (optional)
-x/--xml
For example: get –s health
get –s –n 0 health
get health -a/--
-x/--xml
For example: get –x –a health
Gets the number of enclosures
present in the system.
Gets the health information
regarding fan, voltage and
temperatures for the given
enclosure.
Gets the enclosure status for the
given enclosure or for all the
enclosures.
Gets the enclosure status for all the
enclosures.
Chapter Two: Command Set 13
iSCSI Configuration
Note: Targetname input: Only the suffix portion of the targetname is required.
For example: “iqn.1991-10.com.ami:itx001a2b3c4d5e2006:test1” . The user needs to input only “test1”.
Command Argument Description
get iscsi -t/--type {tgtstatus}
-n/--targetname <targetsuffix>
For example: get –t tgtstatus –n target1 iscsi
get iscsi -t/--type {tgtname} Gets the iSCSI target name. This
activate iscsi -t/--type {portal}
-p/--ipaddress <Ipaddress of the target machine>
-g/--portaltag <portal tag>
For example: activate –t portal –p 10.15.1.1 –g 3
iscsi
deactivate iscsi -t/--type {portal}
-p/--ipaddress <ipaddress of the target machine>
enable iscsi -t /--type {tgt}
-n/--targetname <target suffix>
disable iscsi -t/--type {tgt}
-n/--targetname <target suffix>
For example: cli disable –t tgt –n newtgt iscsi
start iscsi To start the iSCSI service.
stop iscsi For example: stop iscsi To stop the iSCSI service.
set iscsi -t/--type {params}
-o/--choiceno {0-12}
-l/--value <value>
For example: set –t params –o 1 –l 256 iscsi.
get iscsi -t/--type {lunwritecachemode}
-v/--volumename <volume name>
-c/--containername <containername>
set iscsi -t/ --type {lunwritecachemode}
-v/--volumename <volume name>
Gives the status of the target as
enabled or disabled.
value is not configurable and is
unique to the iTX device.
For example:
iqn.1991-
10.com.ami:itx0030482c8d788a7e
Activates the specified iSCSI
portal. You have to specify a portal
tag at the time of activation of the
portal.
Deactivates the specified iSCSI
portal.
Enables the specified target.
Disables the specified target.
Sets specified iSCSI Login
negotiation parameters.
The possible values are:
1. FirstBurstLength (0-256 KB,
default=256)
2. MaxBurstLength (must be less
than #1, default=256)
Adds the processor to the specified
target (used for backup).
Removes the processor from the
specified target.
Gets the iSCSI statistics, for
example, No. of iSCSI PDU sent
and received, payload, and
login/session failures.
get iscsi -t/--type {portalstatus}
Gets the iSCSI Portal Status.
-p/--ipaddress <ipaddress>
get iscsi -t/--type {servicestatus} Gets the iSCSI service status.
(Active/Inactive)
add iscsi -t/--type {lun}
-v/--volumename <volume name>
Adds the LUN to the specified
target.
-c/--containername <container name>
-n/--targetname <targetsuffix>
remove iscsi -t/--type {lun}
-v/--volumename <volume name>
Removes the LUN from the
specified target.
-c/--containername <container name>
-n/--targetname <target suffix>
get iscsi -t/--type {sessions}
For example: get –t sessions iscsi
remove iscsi -t/--type {session}
-s/--sessionid <session id>
Gets the current sessions details
including session id.
Terminates the session with the
given ID. To avoid automatic
reconnection by the initiator, you
will need to change the security
settings for that target prior to
termination.
list iscsi -t/--type {tgt} Gets the List of Targets available.
list iscsi -t/--type {lun}
-r/--secretname <user password ‘none’ for default >
-i/--initiatorname <initiator name – ‘none’ for
default>
get iscsi -t/--type {lun}
-n/--targetname <target suffix>
Sets the Authorization settings for
the target. The secret name should
be at least 12 characters in size
This will give exclusive access to
the LUN for the specified user and
initiator for maximum security.
Gives the LUN's Information for
the specified target.
-v/--volumename<volumename>
-c/--containername<containername>
-i/--info
get iscsi -t/--type {tgtoptimizations}
-n/--targetname <target name>
Gives the Target's Optimization
settings (i.e. whether multiple
initiator logins are supported).
set iscsi -t/--type {tgtoptimizations}
-n/--targetname <target suffix>
-p/ --multiplesession {y/n}
-g/--nopinterval < nop ping internal >
Sets the Target's Optimization
settings to allow/disallow multiple
initiators logging in to a target
simultaneously.
Chapter Two: Command Set 15
Command Argument Description
For example: set –t tgtoptimizations –n t1 –p y –g
10 iscsi
enable iscsi -t/--type { iSNSservice} Enables the iSNS Service.
disable iscsi -t/--type { iSNSservice} Disables the iSNS Service.
get iscsi -t/--type {iSNS} Gives the iSNS server's
information i.e. iSNS server IP,
server status, command
description, last status message.
set iscsi -t/--type {iSNS}
-e/--entityname <entity name>
-a /--aliasname <alias name>
enumerate iscsi -t/--type {initiator}
-n/--targetname <target suffix, ‘none’ for default>
add iscsi -t/--type {iSNSServer}
-i/--ipaddress <ip address>
remove iscsi -t/--type {iSNSServer}
-p/--ipaddress <ip address>
rescan iscsi -t/--type {iSNS} Rescan for targets and initiators.
update iscsi -t/--type {noderegistrations} Updates the nodes that are
reset iscsi Resets the iSCSI statistics.
get iscsi -t/--type {params}
-o/--choice {0-12}
set iscsi -t/--tgtname This resets the base iSCSI target
Sets the specified iSNS
information.
Gets the iSCSI initiators from the
iSNS server.
Adds a new iSNS server.
Removes an existing iSNS server.
registered with all iSNS servers
this iTX device is registered with.
Gets values of the specified iSCSI
login negotiation parameters.
name of the iTX box
This operation should be done with
utmost precaution and there should
not be any replication pairs in the
box. Logout of all existing iSCSI
sessions before running this
command
License configuration
These commands configure the License.
Command Argument Description
set license -k/--key <key>
-x/--xml
set license -f/--file <filename with path>
-x/--xml
get license -s/--serviceKey
-x/--xml
get license -l/--licenseInfo
-x/--xml
Sets the entered license key to file.
Sets the license according to the
license key given in file path.
Gets the license service key
necessary if you want to upgrade
your iTX license.
Gets the current license
information.
These commands configure the network ports. They can also be used to create virtual bonding network ports
(teams) for high availability and/or load balancing.
Command Argument Description
get network -t/--type {port}
-c/--count
-x/--xml
For example: get –t port –c count network
get network -t/--type {port / alias}
-n/ --name <name of the adapter >
-i/--info
-x/--xml
set network -t/--type {port}
-n/--name <Name of the NIC>
-d/--dhcp
-x/--xml
For example: set –t port –n nic-1 –d network
set network -t/--type {port / alias}
-n/--name <Name of the NIC>
-i/--ip <IP Address>
-m/--mask <net mask>
-g/--gate <Gateway> (optional)
-p/--pridns <Primary DNS> (optional)
-s/--secdns <Secondary DNS>(optional)
-f/--dnssuff <DNS suffix>(optional)
-j/--mtu <size> (optional)
get network -t/--type {adp}
-c/--count
-x/--xml
list network -t/--type {adp} Displays the available network
create network -t/--type {team}
-m/--mode {1/2/3}
-p/--pri <primary NIC>
-s/--sec <secondary NIC>
-x/--xml
Creates a team named Team-1, Team-2, and so on,
depending on available NICs in system
For example: create –t team –p nic-1 –s nic-2 –m 1
network
delete network -t/--type {team}
-n/--name <name of the Team>
-x/--xml
For example: delete –t team –n Team-1 network
get network -t/--type {team}
-i/--info
-n/--name <name of the Team>
-x/--xml
For example: get –t team –i –n Team-1 network
get network -t/--type {team}
-i/--info
-n/--name <name of the Team>
-x/--xml
list network -t/--type {adp/port}
-x/--xml
add network -t/--type alias
-n/--name <alias name>
Gets the number of ports.
Displays the given network port
information.
Configures the given network port
to work with DHCP.
Configures the specified network
port to work with the given
STATIC IP configuration.
Displays the number of network
adapters present.
adapters and their status.
Creates a network team with the
given mode. The supported modes
are:
1 – Balance Round Robin
2 – 802.3 AD (with pre-configured
switch)
3 – Balance TB
Deletes the network team with the
given name.
Displays the number of NICs
present in the given team.
Displays the given network team
information.
Displays various information for
the available network ports
including their status.
Adding an alias adapter for a
specific NIC port
Chapter Two: Command Set 17
Command Argument Description
-p/--port <adapter name>
remove network -t/--type alias
-n/--name <alias name>
Removing an alias adapter
NAS Quota Configuration
These commands configure quotas for the NAS volumes of your iTX box.
Command Argument Description
get quota -t/--type {user }
-p/--path <volume path>
-n/--name <user name>
-x/--xml
For example: get –t user –p c0_nas0 –n user1 quota
set quota -t/--type {user }
-p/--path <volume path>
-n/--name <user name>
-q/--quotasize <size>
-f/--filecount <file count>
-x/--xml
For example: set –t user –p c0_nas0 –n user1 –q
4000 –f 400 quota
list quota -p/--path <volume path>
-x/--xml
get quota -p/--path <volume path>
-d/--default
-x/--xml
set quota -p/--path <volume path>
-q/--quotasize (KB) <quota size>
-d/--default [y/n]
-x/--xml
Displays the quota configured for
the given member.
Configures the quota size of given
member.
Size should be entered in KB.
Displays the user quota configured
for a given volume as specified in
path.
Displays the default quota
configured for the volume.
Sets the default quota limit which
should be used for a volume.
These commands allow viewing and configuration of the NAS Users and groups accounts.
Note:Known Issue: As iTX software supports enabling of ADS and NIS simultaneously, the user/group
list retrieved will be given for both instead of singly.
Command Argument Description
add ug -t/--type {user}
-u/--username <user name>
-i/--id <userid (optional)>
-p/--passwd <password(optional)>
-f/--fullname <Full name>
-x/--xml
For example: add –t user –u user1 –p password –f
“User 1” ug
add ug -t/--type {group}
-g/--groupname <group name>
-i/--id <group id (optional)>
-x/--xml
delete ug -t/--type {user}
-u/--username <username>
-x/--xml
get ug -t/--type {user/group}
-s/--section {local/ads/nis/all}
-c/--count
-x/--xml
For example: get -t user -i -u test1 ug
list ug -t/--type {user/group}
-s/--section (local/ads/nis/all)
-x/--xml
For example: list -t user -s all ug
get ug -t/--type {group}
-i/--info
-g/--groupname <groupname>
-x/--xml
For example: get –t group –I –g groupA ug
get ug -t/--type {user}
-i/--info
-u/--username <username>
-x/--xml
set ug -t/--type { user}
-u/--username <username>
-p/--passwd <password>
-f/--fullname <fullname>
-x/--xml
For exmaple: set -t user -u test1 -p test1 -f
test1 ug
list ug -t/--type {group}
-g/--groupname <groupname>
-x/--xml
delete ug -t/--type {group}
-g/--groupname <groupname>
-x/--xml
delete ug -t/--type {group}
-g/--groupname <groupname>
-u/--username <username>
-x/--xml
For example: cli delete –t group –g groupA –u
user1 ug
Adds a user. If password is not
entered in command line, it will be
prompted for.
Username is case-sensitive, must
be alphanumeric, and 8 -32
characters .
Adds a group. Group name is casesensitive, must be alphanumeric,
and 8 -32 characters.
Deletes the given user.
Displays the count of users / groups
of specified type.
Displays the specified list of users /
groups and their info.
Displays the group info.
Displays the specified user’s info.
Changes the user info to given
values for password and/or full
name.
Displays the users present in a
particular group.
Deletes the given group.
Deletes the given user from the
specified group.
Chapter Two: Command Set 19
set ug -t/--type {group}
-g/--groupname <groupname>
-u/--username <username>
-x/--xml
Adds the given user to the specified
group. Multiple users can be added
using –u/--username switch.
(maximum of 8 users at a time)
Protocol Configuration
These commands configure the various network protocols supported.
Command Argument Description
get protocol -t/--type {cifs/nfs/http/snmp/nis/ads/https/ftp/upnp} Gets the status of cifs, nfs, http,
snmp, nis, or ads protocols.
set protocol -t/--type
{cifs/nfs/apple/http/snmp/nis/ads/https/ftp/upnp}
-d/--disable or
-e/--enable
-x/--xml
For example: set –t cifs –e protocol
get protocol -t /--type {snmp}
-n/--communityname
For example: get –t snmp –n protocol
get protocol -t/--type {cifs}
-w/--winserver
set protocol -t/--type {cifs}
-s/--winsserver <winsserver name>
-m/--mtype {wg/nt/ads}
-w/--workgroup <workgroupname>
-x/--xml
set protocol -t/--type {snmp}
-n/--communityname <communityname>
set protocol -t/--type {nfs}
-i/--ipaddress <ipaddress or “world” >
-d/--disable or
-e/--enable
-x/--xml
For example:
set -t nfs -i 10.0.0.124 -i 10.0.0.123 -e -x protocol
list protocol Lists all the protocols and
get protocol -t/--type {nfs}
-c/--count
Enables or Disables the specified
protocol.
Gets the community name for
snmp.
Gets the Wins server address.
Sets the Wins server address.
Sets the snmp community name
By default, the public community
name is supported.
Sets the nfs clients.
whether they are enabled or
disabled.
Gets the number of NFS clients
that have access to NAS shares.
These commands allow management of disks and RAID creation.
For Hardware RAID please enter the Slotindex (For example: 1, 2,3, and so on) instead of diskname (For
example: /dev/sda, /dev/sdb) in the option for -d / --diskname <DiskInfo_OSName or slotindex>
Command Argument Description
get raid -t/--type {pd/ld/controller}
-c/--count
get raid -t/--type {controller}
-a/--alarm
-n <controllerno>
list raid -t/--type {pd/ld/controller}
list raid -t/--type {pd/enclosure}
-n <controllerno>
list raid -t/--type {spare}
get raid -t/--type {pd}
-i/--info
-n/--controllerno <controller number>
-d / --diskname <Diskname or slotindex>
get raid -t/--type {pd}
-d/--diskname <diskname or slotindex>
-n <ControllerNo>
-m/--cachemode
For example: get –t pd –d 1 –n 0 –m raid
get raid -t/--type {ld}
-l/--ldname < Logical_Osname>
-m/ --cachemode
rebuild raid -d/--diskname <diskname or slotindex>
For example: delete –t ld –l /dev/md1 raid (1U)
For example: delete –t ld –l /dev/sdb raid (3U)
Displays the number of disks,
logical drives and controllers
respectively.
Displays the alarm mode and
battery status of controllers
respectively.
Displays the list of logical drives
and controllers respectively.
Displays the list of physical drives
and enclosures for controller
respectively.
Displays the list of spare disks.
Displays the information about
specified disk.
Gets the physical disk cache mode.
Gets the logical drive cache setting.
Rebuilds a logical drive with the
specified disk drive.
Creates a logical drive.
-s/ --disksize – only supported for
3U
For LSI RAID Controller - Cache
Modes Format writecache:readcache:cachemode
-x/--xml
For example: set -t share -n test1 -p
Container0_Volume0/dir1 -s cifs -s http -s upnp
share
LEVEL FOR NT
0 - Apply to all levels 1 – Apply
to first level
PERMISSIONS FOR POSIX
0 - Read Write 1 - Read Only
2 - Deny
PERMISSIONS FOR NT : The 14
bits in following order
A - Traverse Folder / Execute file
B - List Folder / Read Data
C - Read Attributes
D - Read Extended Attributes
E - Create files/ Write Data
F - Create folders / Append Data
G - Write Attributes
H - Write Extended Attributes
I - Delete Subfolders and files
J - Delete
K - Read Permissions
L - Change Permissions
m - Take Ownership
INHERITANCE FOR NT
0 - No inheritance
1 - this folder sub folders and files
2 - this folder and sub folders
3 - this folder and files
4 - subfolders and files only
5 - subfolders only
6 - files only
Sets a share properties.
Chapter Two: Command Set 25
System Control Configuration
These commands configure the System controls.
Command Argument Description
shutdown system For example: shutdown system Shuts the system down.
get system
set system -f/--fansensors <on/off>
reboot system Reboots the system.
For example:
-t/--tempsensors <on/off>
-x/--xml
cli get -x system
Gets the auto shutdown
information.
Sets the fan sensors or temperature
sensors on or off for autoshutdown
(only temperature supported at this
release).
Volume and Snapshot Commands
These commands manage the way Containers, Volumes and Snapshots are created, or expanded. While some
of these commands are specific to either NAS or iSCSI volumes, most will work in both types of volumes.
This will enable local NAS snap
validation for the given NAS
volume. Once enabled, it will be
in “resumed” state by default –
meaning ALL scheduled snaps will
be validated, both already present
and those that will be created new.
This will disable local NAS snap
validation for already enabled NAS
volume.
This pause validation of NAS
snapshots for already enabled NAS
volume.
This will resume validation of
NAS snapshots for already paused
(enabled) NAS volume.
This will return the status – paused
/ resumed of the given NAS
Volume for snap validation. It will
also return the list of snapshots that
are validated so far with the status
(passed / failed)
This will return the list of NAS
volumes that are enabled for NAS
snap validation, along with the
current status – paused / resumed.
This will resume replica validation
for the given volume or volumes
SRP/HA. The remote system
information will be taken from the
given replica pair itself, so no need
to add them separately.
SRP – Sync replica module
HA – High availablility module
Pauses the already running
SRP/HA replica validation of given
SRP – Sync replica module
HA – High availability module
This will return the status – paused
/ resumed as well as the list of
snapshots validated. For SRP/HA
with multiple volumes, the each
validated snap of each volume will
be returned.
SRP – Sync replica module
HA – High availability module
This will resume replica validation
for the given volume or volumes
CG. The remote system
information will be taken from the
given replica pair itself, so no need
to add them separately.
CG – Snap assisted replication
module
Pauses the already running CG
replica validation of given set.
CG – Snap assisted replication
module
This will return the status – paused
/ resumed as well as the list of
snapshots validated. For CGs with
multiple volumes, the each
validated snap of each volume will
be returned.
0 Command Succeeded
1 Command Failed
2 Invalid Parameter
3 Insufficient buffer
4 Insufficient memory
5 Invalid Operation
6 Error in opening file
10 User does not exist
11 User already exists
12 Selected user is a NIS user
13 User type did not match ADS NIS and LOCAL
14 User Count in UserList is not set
15 Invalid User ID
20 Group does not exist
21 Group already exists
22 Selected group is a NIS Group
23 Group Count in GroupList is not set
24 Group type did not match ADS, NIS and LOCAL
25 Invalid Group ID
26 Not able to init CLI command list
27 Not able to init CLI error list
31 Share does not exist
32 Share already exists
33 Path does not exist
34 Share does not exist
35 Invalid share count
36 Unable to create share entry
37 Unable to delete the share entry
38 Share operations not possible on iSCSI volumes
40 Read less number of event log records, than requested.
41 Event log database is full.
42 Event log database is Empty.
43 Event is not in list
44 Corrupted event list file
45 No Matching records were found.
46 Log database is Empty.
47 Read less number of records, than requested.
51 Volume does not exist
52 Volume already exists
53 Volume is busy. Retry later.
54 Disk is not available for use by the volume
55 Disk count is invalid for the requested raid level
56 Invalid Raid level
57 Volume is not ready or Volume does not exist
58 Raid Volume is a bootable volume
59 No Raid OS volume
60 Snapshot unsupported
61 Snapshot is inactive
62 Invalid Snapshot count
63 iSCSI Volume sync error
64 Snapshot is mounted
65 Readable snapshot cannot be mounted
68 Input has missing parameters
69 Input has excess parameters
Index 45
Code Description
70 Null parameter
71 Invalid disk channel
72 Invalid Disk
73 Invalid Username
74 Invalid password
75 Invalid groupname
76 Invalid Network port
77 Invalid Path
78 Invalid Volume Name
79 Invalid share name
80 Invalid server name
81 Invalid member type
82 Invalid member count
83 Invalid access rights
84 Invalid address
85 Retry after system reboot
86 Invalid member name
87 Invalid service type
88 Invalid service status
90 Command is not processed
91 Command not supported
92 Reply packet is not good
93 Connection to Mstor Engine is lost
94 API is returned as success. but it got excess data than requested
95 Invalid payload size
96 Invalid host name
97 Invalid RPM name
98 Error in installing RPM
99 UPnP Share Does not exists
110 File open Error
111 User Operation busy
112 Unable to delete user
113 Unable to add group
114 Group operation busy
115 Unable to update user data
116 Unable to update group data
117 Invalid group ID
118 User ID already exists
119 Group ID already exists
120 Primary group error
121 Usergroup cache empty
122 Fewer members read
150 Group or Key does not exists in the file
151 Group already exists in the file
160 Error in initializing the health monitoring interface
161 Error in reading sensor value
162 Health monitoring SDK is not initialized
163 Path is used by other share
164 Record not found
165 Record addition failed
166 Record deletion failed
167 Record update failed
168 Entry not available
169 Error in getting container list
170 Volume list is NULL
171 Snapshot list is NULL
172 Entry addition failed
174 Error in setting ACL recursively
175 Error in mounting the share
200 Upgrade version error
201 Upgrade package already installed
202 Upgrade package dependency failure
203 Upgrade package installation failed
204 Upgrade requires more disk space
205 Invalid package name
220 Error in upgrade operation
230 Duplicate IP address
231 Invalid IP address
232 Invalid subnet mask
233 Invalid gateway
234 Invalid DNS server
235 Failed to set IP
240 Disks are differing in geometry
241 The partition of the disks differ
250 Raid Device is busy with resync or rebuild
251 Directory is shared
252 Error in deleting directory
253 Error in creating directory
254 Directory operations are not possible on ISCSI volumes
260 Invalid IPX internal network number
261 Invalid IPX external network number
262 Invalid IPX frame type
263 Invalid CIFS workgroup
264 Invalid SNMP Trap Destination
265 Invalid SNMP community
266 Invalid domain name
267 Duplicate SNMP Trap Destination
268 Duplicate Email ID
270 ACL database error
280 Error_net_join
281 ADS domain already exists
282 NIS domain already exists
290 Invalid time
291 Invalid date
292 Sync to NTP fail
293 Invalid time zone
300 Invalid network team mode
301 Invalid network team member
302 Invalid network team name
303 Network team already exists
304 Network adapter part of team
305 Invalid network team deletion order
306 Prerequisite not met
307 Network team does not exist
310 Invalid Rule Index
311 Rule limit exceeded
312 Rule Already exists
320 EVMS API General Failure
330 Invalid License File
331 Error in trying to update Evaluation License over existing Extended License
332 Incompatible License according to the Product Type
333 Invalid Customer ID
334 Invalid version
335 Invalid license features
336 License General error
337 License file open error
Index 47
Code Description
338 License file read write error
350 Duplicate Alias Name
351 Alias not found
352 Invalid Alias Name
353 DHCP is not supported for Alias Adapters
354 Maximum Alias Adapter count exceeded
355 Maximum Alias per NIC exceeded
500 No Target found
501 Object Not Found
502 Internal error
503 Limits exceeded for operation
504 Object does not have date
505 iSNS status returned
506 iSNS task error
507 Cannot communicate with iSNS daemon
508 Internal iSNS error
509 iSNS server signals error
510 iSNS object not found
511 iSCSI Service not running
512 Invalid Target name
513 iSNS service not running
514 Current operation failed as it needs iSCSI to be enabled on this Volume
515 Password for this user has to be between 12 and 16 characters
516 ISCSI Disk still in use
517 Too many ISNS servers
518 ISNS Server error
519 Cannot perform this operation; there are no iSNS servers
520 Unknown iSNS error
521 Cannot remove ISNS server, an operation is in progress
522 LUN serial number error
523 Error in loading SMA module
524 Error in unloading SMA module
525 Maximum number of LUNs/Volumes has been reached for this target
526 Cannot add NAS volume to target
527 Deactivate portal to change portal tag
528 LUN had been already added to target
529 Invalid LUN
550 Invalid Disk Selection
551 Invalid RAID Number
552 No RAID is Present
553 Invalid RAID Level
554 Invalid Cache Type
555 Invalid Disk Count for the RAID Level
556 Invalid Spare Disk Count
557 Invalid Disk Information
558 Selected array is part of Volume...Cannot be deleted
559 RAID Disks cannot be used as Spares
560 Size of Raid Array is greater than 2 TB
561 Distributed Spares is not supported in RAID0, RAID1 and RAID1n
562 Rebuild failed
601 Invalid controller
603 Function not supported
604 Null Controller list
605 Function not supported
606 Spare disk unsupported
607 Disk count limit exceeded
608 Error in initializing disk
609 IOCTL failure
610 No spare support
611 Max limit reached
612 No MD device available
613 MD creation failed
614 Add entry to configuration file failed
615 disk is not free
616 Minimum disk count
617 Error in updating configuration file
618 Error in reading from configuration file read error
619 Raid hot remove failed
620 Disk partitioning failed
621 Raid hot add failed
622 No raid array found
623 OS raid device error
624 Swap raid device error
625 Device open Error
626 Error raid creation in progress
627 Invalid Sub raid disk count
628 Error on transforming offline raid
629 Invalid raid number
631 Invalid spare disk count
632 Illegal spare type
633 Invalid raid cache type
634 Invalid raid drive size
635 Maximum raid size
636 Insufficient disk space
637 Raid cannot be shrunk
638 API failure
639 Disk is not a Spare
640 Var Log device error
642 LD Create & Expand/Transform not supported while another LD Expand/Transform is in progress
643 LD Expand/Transformation is in progress, not able to change the configuration
644 Battery Not Available
645 Cache type is not supported by the controller
701 Container count limit exceeded
702 FileSystem error
703 Volume creation error
704 DM mount error
705 Delete container error
706 Create container error
707 Duplicate device error
708 Volume Deletion error
709 DM umount error
710 NAS Volume freeze error
711 NAS Volume unfreeze error
712 Start Container failed
713 Stop Container failed
714 Invalid LD Device
715 Invalid Container chunk size
716 Resource is busy
717 Error in getting container info
718 Invalid Container name
719 Error in deactivating snap
720 Error in activating snap
721 Error in creating snap
722 Error in deleting snap
723 Error in mounting volume
724 Error in unmounting volume
Index 49
Code Description
725 Error in mounting file system
726 Error in getting snap info
727 Error in creating writable snap
728 Error in getting volume info
729 Max space reached
730 Invalid dialect
731 Invalid Snap
732 Error in rolling back Snap
734 Error in unmounting file system
735 Error in reading metadata
736 Serial already exists
737 Invalid mount type
738 Quota operations not possible on iSCSI volumes
739 Snapshot already activated
740 Snapshot already deactivated
741 Maximum volume count limit reached
742 Error in resizing the volume
743 Unsupported option
744 Error in DM reload
745 FileSystem growth failure
746 Volume already activated
747 Volume already deactivated
748 DMsetup info error
749 No space left in container
750 Permission denied
751 Session not found
752 Max user session limit
753 Max session limit
754 Management administrator not found
760 Maximum management stations configured
800 No free space to expand
801 Volume expansion limit exceeded
802 Read only snapshot count exceeded
803 Read write snapshot count exceeded
852 License – Read only snapshot count exceeded the license count
853 License – iSCSI volume license expired/disabled
854 License - SAS hard disk license expired/disabled
855 License – SATA hard disk license expired/disabled
856 License - Enclosure count exceeded/disabled
857 License - NAS volume license expired/disabled
858 License - Container size exceeded the license limit
859 License - Invalid License Key
860 License - License Structure is missing or License is absent
861 License - Service key is missing
862 License - Updation of Evaluation time failed
863 License - Limit on the particular feature is reached
864 License - Time for the particular feature usage expired or disabled
865 License - License Structure is corrupted
866 License - Temp file creation failed
867 License - Incorrect License for the System
868 License - Error Copying files
869 License - License File Decryption Failure
870 License - License File Encryption Failure
871 License - Setting License Failure
872 License - License Key is absent, License Module is not loaded.
873 License - Incorrect System for the License Key
874 Error in WINBIND
875 Error in YPBIND
876 Error in BIND
877 License - HA pair creation license expired/disabled
878 License - Unable to Read the License File
879 License - License Validation Failure
880 License - New Motherboard or New Motherboard with Some External NIC cards found, For service key
generation, remove all External NIC cards from the system
881 License - Thin provision license expired/disabled, request denied.
882 License - ILM license expired/disabled, request denied.
883 License - Applying Old License File Again, request denied.
900 Replication is enabled
901 Incorrect Replication
902 Replication is enabled, secondary volume present in container
903 Replication is enabled, replication pair non-operational
904 Resource group is not owned
905 Resource group already started
906 Resource group is out of sync
907 Unable to get resource group information
908 Invalid resource group state
909 Machines chosen for HA are not identical
910 Subnet does not match in machines. All NICS should be on different subnets
911 Remote Resource group not accessible
912 Unable to set virtual ipaddress
913 Maximum of 1 Alias per NIC per RG exceeded
914 Primary Target Name already used for a different volume in secondary
915 Error in regenerating target name
916 Portal is inactive in Local/Remote
917 Replication command timed out on the remote box due to it being busy
918 No Target found for volume either in Primary/Secondary
919 Replication – Operation not permitted on Secondary
1001 Replication - General error
1002 Replication - Invalid parameters
1003 Replication - Insufficient memory for performing the operation
1004 Replication - Permission denied
1005 Replication - system busy
1006 Replication - Fatal error
1007 Replication - Master Logical drive NOT available
1008 Replication - Volume error
1009 Replication - Volume size error
1010 Replication - iSCSI target serial number error
1011 Replication - Error while accessing Container DDF
1012 Replication - Error while accessing Replication DDF
1013 Replication - Initiator error
1014 Replication - Remote device error
1015 Replication - Error while accessing tab bits
1016 Replication - iSCSI login error
1017 Replication - Error while activation
1018 Replication - Remote Volume device NOT found
1019 Replication - Remote Management device NOT found
1020 Replication - Sync replication feature is not licensed or time period expired
1021 Replication - Error in establishing MPIO Session: Please check if secondary or link to it is alive, and it's
portal is activated
1022 Replication - Error in creating HA Pair. Volume is part of a SAR pair
1023 Replication - Resource group count exceeded
1024 Replication - Resource group already present
1025 Replication - Resource group not present
1026 Replication - Failed to modify the resource group config
1027 Replication - Resource group entry not present
1028 Replication - Duplicate entry present in resource group config
Index 51
Code Description
1029 Replication - Volume is not in sync
1030 Replication - Box owns RG but volumes are secondary
1031 Replication - Box is not the orignal owner of the RG
1032 Replication - Box does not own RG but volumes are primary
1101 Asynchronous Replication – Asynchronous Replication CG not found
1102 Asynchronous Replication – General Failure
1103 Asynchronous Replication – Duplicate Asynchronous Replication CG name
1104 Asynchronous Replication – Volume already part of Asynchronous Replication CG name
1105 Asynchronous Replication – Invalid Volume size
1106 Asynchronous Replication – Invalid Asynchronous Replication CG role
1107 Asynchronous Replication – Invalid volume count
1108 Asynchronous Replication – Volume not empty
1109 Asynchronous Replication – IOCTL error
1110 Asynchronous Replication – Error in Handshake
1111 Asynchronous Replication – Maximum CG reached
1112 Asynchronous Replication - Invalid opertion - replication not yet started - No valid snaps found
1113 Asynchronous Replication - CG config metadata area is corrupted
1114 Asynchronous Replication - Error in getting passive side CG info
1115 Asynchronous Replication - Error in getting passive side CG list
1116 Asynchronous Replication - Error in updating passive side CG info
1117 Asynchronous Replication - Error in passive side resume operation
1118 Asynchronous Replication - Error in passive side pause operation
1119 Asynchronous Replication - No common T number snapshot found
1120 Asynchronous Replication - Given T number snapshot info not available
1121 Asynchronous Replication - Given volume already part of another CG
1122 Asynchronous Replication - Remote machine unavailable
1123 Asynchronous Replication - Invalid Remote machine CG info
1124 Asynchronous Replication - Active volumes already paired with another SAR CG in this remote box
1125 Asynchronous Replication - Volumes having different scheduler settings
1126 Asynchronous Replication - Invalid Volume Chunk Size
1127 Asynchronous Replication - Unable to get the initiator name
1128 Asynchronous Replication - Unable to get mtarget name
1130 Asynchronous Replication - Minimum snapshot retention should be more than 3 per level
1131 Asynchronous Replication - Volume part of synchronous replication or HA grouping
1132 Asynchronous Replication - Invalid configuration
1200 JM – Failed to create Journal
1201 JM – Journal File count limit exceeded
1202 JM – Failed to create Journal File
1203 JM – Error in getting Journal info
1204 JM – Error in starting Journal
1205 JM – Error in stopping Journal
1206 JM – Invalid Journa Name
1207 JM – Journal Count limit exceeded
1208 JM – Failed to delete Journal
1209 JM – Journal Event Failed
1210 JM – Failed to expand Journal
1211 JM – Failed to delete Journal File
1212 JM – Error in getting Journal File Name
1213 Invalid T number
1214 JM – Journal in use
1215 JM – JournalFile size exceeded the Free Space available in Journal
1250 JM – Reached EOF
1300 Snap Validation – Info file creation error
1301 Snap Validation – Already paused
1302 Snap Validation – Already resumed
1303 Snap Validation – Config file creation error
1304 Snap Validation – Block Dedupe enabled
1305 Snap Validation – Remote side snapshot not available
1306 Snap Validation – Local snapshot not available
1307 Snap Validation – User snapshot validation pending
1308 Snap Validation – Snapshot already validated
1325 Read only snap count max reached
1326 Snap count per volume max reached
1327 Snap count per system max reached
1345 Duplicate Frequency/Level entered for Snapshot Schedule
1351 iSCSI MirrorConfig – Physical disk size mismatch found
1352 iSCSI MirrorConfig – Invalid physical disk mapping found
1353 iSCSI MirrorConfig – Hotspare creation failed
1354 iSCSI MirrorConfig – Logical drive creation failed
1355 iSCSI MirrorConfig – Container creation failed
1400 CDP – General error
1401 CDP – Invalid parameter
1402 CDP – Invalid Journal file name
1403 CDP – Invalid Container name
1404 CDP – Journal not present
1405 CDP – Failed to open resource
1406 CDP – Snapshot not available
1407 CDP – Memory constraint
1408 CDP – Snapshot not available in Journal
1409 CDP – CDP session for given parameters not available
1410 CDP – Failed to renew CDP session
1411 CDP – Event missing in Journal file
1412 CDP – Thread creation error
1413 CDP – Journal file overflow error
1414 CDP – Snapshot is in unstable state
1415 CDP – Failed to read from journal file
1504 Upgrading packages failed
1506 Upgrade Checksum failed
1507 Upgrade error in downloading image
1508 Upgrade image version is older than current version
1509 Upgrade image version is same as current version
1510 Insufficient disk space for upgrade
1511 Upgrade image file is corrupted
1512 Error in performing upgrade
1513 Invalid parameters in upgrade
1514 Upgrade image version is invalid
1515 License is not valid for upgrade
1516 Invald IP address or Host name
1517 Error in performing upgrade
2001 Remote Communication - General Error
2002 Remote Communication - Invalid Parameters
2003 Remote Communication - Insufficient memory for performing the operation
2004 Remote Communication - Permission Denied
2005 Remote Communication - Management Target Busy
2006 Remote Communication - Fatal Error
2010 Remote Communication - Invalid Packet Signature
2011 Remote Communication - Version Error
2012 Remote Communication - No such remote module
2013 Remote Communication - Connection Error
2014 Remote Communication - Inter-node Initiator error
2015 Remote Communication - Login Error
2016 Remote Communication - Module Connection Error
2017 Remote Communication - Remote Device Error
4096 DVM - Lib node open error
4097 DVM - Lib invalid data
4098 DVM - Device End of file
Index 53
Code Description
4099 DVM - Device open error
4100 DVM - Device access error
4101 DVM - general error
4102 DVM - Lib DM suspend error
4103 DVM - Lib DM resume error
8192 DVM - generic error
8193 DVM - memory allocation errors
8194 DVM - IOCTL Parameter passing failures copy_from_user, copy to user etc
8195 DVM - generic invalid parameter error
8196 DVM - container name is empty / unrecognizable by DVM driver
8197 DVM - volume is empty / unrecognizable by DVM driver
8198 DVM - snapshot name is empty / unrecognizable by DVM driver
8199 DVM - Error persisting metadata to disk (or) reading metadata from disk
8200 DVM - The number of LD segments is invalid
8201 DVM - The stripe size for the LD segments is invalid
8202 DVM - Duplicate container name
8203 DVM - Too many containers in the system
8204 DVM - Failed to open the LD segment
8205 DVM - volume size specified container
8206 DVM - invalid provisioning type specified
8207 DVM - snap type specified is invalid
8208 DVM - invalid UUID specified
8209 DVM - duplicate volume name specified
8210 DVM - duplicate volume UUID specified
8211 DVM - too many volumes in the system
8212 DVM - cannot create exact provisioned volume - No space available
8213 DVM - when trying to take a snap of snapshot - assumes writ. snapshot is another ioctl
8214 DVM - duplicate snap name
8215 DVM - too many snaps in the volume or a writable snapshot already exists
8216 DVM - too many snaps in the system
8217 DVM - if the ld segment length is invalid
8218 DVM - when trying to take a "writable" snap of volume
8219 DVM - volume is in use
8220 DVM - snap is in use
8221 DVM - snap rollback bg fail
8222 DVM - compaction bg fail
8223 DVM - compaction already running
8224 DVM - cannot pause compaction
8225 DVM - cannot stop compaction
8226 DVM - log fail
8227 DVM - Container couldn't start, conflicts in vol-index with existing container-volumes
8228 DVM - Obsolete command
8229 DVM – Redundant Snapshot
8230 DVM - Operation failed on invalidated snapshot
8231 DVM – Invalid Pinned Volume
8232 DVM – Pinned Volume exists
8233 DVM – Source & Dest Volume size mismatch
8234 DVM – Destination Volume is not empty
8236 DVM - No events