DDMC 7.7 Install Admin Guide
DDMC 7.7 Install Admin Guide
DDMC 7.7 Install Admin Guide
Center (DDMC)
Installation and Administration Guide
7.7
September 2021
Rev. 01
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2021 - 2021 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Other trademarks may be trademarks of their respective owners.
Contents
Revision history.......................................................................................................................................................................... 7
Contents 3
Assigning properties....................................................................................................................................................27
Adding properties to systems and replication pairs............................................................................................ 28
Continuing DDMC configuration....................................................................................................................................29
Understanding RBAC in DDMC......................................................................................................................................29
Viewing DDMC page elements.......................................................................................................................................29
Navigating a DDMC page.................................................................................................................................................31
Organizing the dashboard................................................................................................................................................ 31
Adding and configuring tabs...................................................................................................................................... 31
Adding widgets.............................................................................................................................................................32
Copying tabs................................................................................................................................................................. 34
Filtering tabs................................................................................................................................................................. 34
Modifying widgets....................................................................................................................................................... 35
Organizing managed systems.........................................................................................................................................35
Creating groups........................................................................................................................................................... 35
Managing groups......................................................................................................................................................... 36
Inbound and outbound proxy host names and port numbers used by the firewall......................................36
Data Center........................................................................................................................................................................ 38
Displaying property information..................................................................................................................................... 38
Displaying properties for an element...................................................................................................................... 38
Finding elements by property value........................................................................................................................ 39
Managing replication lag threshold policies................................................................................................................ 39
Working with filters.......................................................................................................................................................... 40
4 Contents
Updating system software..............................................................................................................................................58
Managing system update packages........................................................................................................................59
Performing a system update.................................................................................................................................... 59
Scheduling a software update..................................................................................................................................60
Local users...........................................................................................................................................................................61
Creating access for users.......................................................................................................................................... 61
Contents 5
Managing autosupport reporting............................................................................................................................ 119
Managing system logs.............................................................................................................................................. 120
Updating DDMC software.............................................................................................................................................. 121
Managing DDMC update packages........................................................................................................................ 121
Prerequisite to performing a DDMC software update......................................................................................122
DDMC software update in ESXi............................................................................................................................. 122
Performing a DDMC software update in KVM................................................................................................... 122
Performing a DDMC software update in Hyper-V............................................................................................. 123
Performing a DDMC software update in AWS................................................................................................... 124
Performing a DDMC software update in Azure..................................................................................................126
Performing a DDMC software update in GCP....................................................................................................126
6 Contents
Revision history
The following table presents the revision history of this document.
Revision history 7
1
PowerProtect DDMC Overview
Topics:
• Introducing PowerProtect DDMC
• Features and limitations of DDMC
• Differences between DDMC and PowerProtect DD System Manager
○ DDMC includes the ability to manage systems with High Availability (HA), Cloud Tier, and DDVE instances.
● DDMC can perform an update on groups of systems simultaneously.
● DDMC aggregates storage and performance data and compares operational information for all managed systems. DD
System Manager does not aggregate storage or performance data from multiple systems, nor can you compare operational
information across systems.
● DDMC does not directly manage storage. DD System Manager directly manages storage (using VTL, CIFS, NFS, DD Boost,
and so on).
● DDMC cannot configure and manage any replication or encryption.
System requirements
The virtual machine hardware requirements are provided in this table.
NOTE: These configurations are fixed for all combinations, and the changing of any of the individual components of these
settings is not supported. You cannot increase the memory, change the CPU settings, and so on.
Prerequisites
Review the chapter Planning the DDMC environment on page 10 and ensure the required VMware hardware and software
components are in place at the site. The guide also includes descriptions of optional VMware software for backup and reliability
that ensures the DDMC installation is operating optimally.
Ensure the following are in place:
● VMware vCenter or ESXi servers and software
● VMware vSphere client application (VMware vSphere client application are only required if installing on vSphere/vCenter.
They are not required for AWS, Azure, GCP, Hyper-V, or KVM.)
● Sufficient CPU, memory, disk space, and network resources
● If installing within a Hyper-V or cloud environment, and you cannot use role-based credentials, have information available to
create an access profile.
Downloading DDMC
The DDMC zip file that you use depends upon the on-site environment in which you are operating.
Steps
1. Log in to the support site using your existing credentials, or register to obtain your credentials.
2. Select Support by Product below the Search box.
3. Use the Find a Product search box to find DDMC.
12 Getting Started
4. In the list of categories under the Search box, select Downloads.
5. Select the link to download the appropriate version of the software.
6. Download the appropriate DDMC zip file for your on-site environment.
NOTE: DDMC in AWS, Azure, and GCP are available in the marketplace of each of these public clouds. Dell EMC no
longer provides the image file to download.
Next steps
You can now install the DDMC software on your VMware platform.
Getting Started 13
Installing on a VMware vCenter Server
Prerequisites
1. Download the DDMC software, as described in Downloading DDMC.
2. Open the vSphere client, type the following, and select Login:
● The IP address or hostname of the VMware vCenter Server where DDMC will be installed
● The administrator ID and password for the VMware server
14 Getting Started
This initial configuration cannot be repeated to change settings. After you have completed an initial configuration, you must use
the DDMC CLI for any settings that you want to change.
Name and Location Optionally type a name (default is “ DDMC-<version number>”), and select an
installation location. This name identifies the virtual machine on the VMware
server. It does not become a hostname on the LAN.
Deployment Configuration Default configuration cannot be changed.
Datastore Select the datastore where data is to be stored. For best performance, Dell EMC
recommends that you use a dedicated datastore.
Disk Format Select the disk format type. Thin Provisioned disk format dynamically allocates
storage capacity. Thick Provisioned disk format allocates all storage now
(recommended).
Ready to Complete Review the configuration summary and finish the wizard.
This initial configuration cannot be repeated to change settings. After you have completed an initial configuration, you must use
the DDMC CLI for any settings that you want to change.
Hyper-V
This version of DDMC enables you to create virtual machines using Microsoft Hyper-V for Windows.
Set up Hyper-V
Set up Hyper-V by going to Microsoft's Windows Server (2012 R2 or 2016) site and following the instructions that are found on
the install page.
Getting Started 15
Deploying the Hyper-V package for DDMC
About this task
The Hyper-V package consists of the following:
● ddmc-installer-sc.ps1: the PowerShell script used for the deployment of DDMC on Microsoft System Center
● README.txt: Contains additional information about the steps that are needed to deploy the package.
● ddmc-N.N.N.N-xxxxxx.vhd: the boot disk
● ddmc-installer.ps1: the PowerShell script needed for DDMC deployment on a Microsoft Windows Server 2012 R2 or
Windows Server 2016 with Hyper-V Server.
Steps
1. Unzip the ddmc-N.N.N.N-xxxxxx-hyperv.zip package to a folder.
The script must be downloaded onto the Windows server (2012 R2 or 2016).
2. Open the Power Shell prompt as an administrator.
3. Run the following script and specify the name of DDMC virtual machine when prompted: .\ddmc-installer.ps1
Prerequisites
Steps
1. Download and extract the KVM installable Zip file. File name is ddmc-kvm-<branch number>-<build
number>.tar.gz.
2. Copy the tar file to the Linux system where KVM is installed, and in partition where VMs are stored. Make a new directory
for new DDMC VM.
3. Untar the tar file. It creates a directory.
This directory has the following files:
● DDMC_README.txt: Help file for deploying VM on KVM.
● kvm-ddmc-installer.sh: DDMC deployment script, which automatically setups CPU, RAM, DISK, NVRAM
configuration
● ddmc-<branch number>-<build number>.qcow2: Root disk for VM
16 Getting Started
root@ddve-ucs55d:/mnt/ucs55d-das1/ddmc_set/ddmc1/ddmc-kvm-0.6120.12.0-566688# ./kvm-ddmc-
installer.sh -n GS-DDMC -r /data/
Distribution:ubuntu Version:16.04
The host version check done.
Basic validation done.
Convert the root disk to raw...
Disk convert done.
root disk:/data/GS-DDMC cpu:4 mem_value:8192 $ bridge:virbr0
Start creating DB disk, it may take 20-30 minutes...
DB disk file has been created successfully.
Start creating SERVICE disk, it may take 10-20 minutes...
SERVICE disk file has been created successfully.
Domain GS-DDMC defined from config.xml
Steps
1. Deploy PowerProtect DDVE on KVM. (For more information, see the appropriate DDVE installation and administration guide.)
2. Get the IP addresses of the DDVE to be added to DDMC for management.
3. Log in to DDMC.
4. Run the following command on DDMC to add managed DDVE system DDVE to DDMC, # managed-system add <IP
address of DDVE> inbound-proxy <IP address of DDMC> outbound-proxy <IP address of DDVE>.
Getting Started 17
Results
The DDVE system is added under Systems > Inventory.
Steps
1. Log in to the Azure portal. https://portal.azure.com
2. Search "Dell EMC" and find PowerProtect DD Management Center in Azure Marketplace.
3. Select a plan, and click Create to begin the deployment.
4. Complete the settings information under the Basics tab, and click Next: Disks.
18 Getting Started
Inbound port rules Select Allow selected ports
Select inbound ports. Select HTTP(80), HTTPS(443), and SSH(22)
5. On the Disks tab, configure disk storage for the DDMC, then click Next: Networking.
● Operating system disk type: select the type based on your requirement
● Host caching: select None
● The db disk and service disk have been set up and added automatically during deployment.
6. On Networking tab, define the network connectivity for this DDMC.
7. On the Management tab, configure monitoring and management options for DDMC.
● Boot diagnostics: select On if you want to capture the serial console output of the DDMC to help diagnose bootup issue
● System assigned managed identity: select off
● Enable Auto-shutdown: select off
8. On the Tags tab, create a tag, such as Name, <the name of this DDMC>, to the DDMC for resource management.
9. On the Review+Create tab, verify the configuration summary, and click Create to set up the DDMC.
Getting Started 19
7. Review the information, and then, click Deploy.
8. Locate the deployed PowerProtect DD Management Center on the VM instances page.
20 Getting Started
Preparing the DDVE Amazon machine image
Before you can deploy a DDVE, you have to create an Amazon Machine Image (AMI). The DDVE code is delivered as a VMware
virtual drive file (VMDK). Amazon has tools to convert this file into an AMI. In brief, you transfer the DDVE boot disk image to a
S3 bucket and use the Amazon tools to convert this file to an AMI. When done, the AMI is assigned an AMI ID. You need this ID
as part of the deployment process.
Deploying a DDVE
After all the preparation steps, you are ready to deploy a DDVE. When deploying a DDVE, DDMC runs a workflow with several
steps. The workflow steps are as follows:
1. Creating and booting an AWS virtual machine using the DDVE AMI .
2. Provisioning EBS volumes to hold the file system data and attaching those volumes to the DDVE.
3. Configuring the DDVE to use a license server.
4. Setting the DDVE hostname, IP address, and sysadmin password.
5. Creating a Data Domain or PowerProtect file system on the EBS volumes.
6. Applying an optional configuration template.
7. Adding the DDVE to the DDMC inventory.
You initiate the process by running a POST to /rest/v2.0/dd-systems. This is an updated API for this release. The request body
includes a new structure which tells DDMC to deploy a DDVE. The request structure looks like this:
POST /rest/v2.0/dd-systems
{
"hostname": "my-ddve-hostname",
"password": "abc123",
"deploy_info": {
"environment": "aws",
"common_deploy_info": {
"vm_name": "my-ddve-name",
"access_profile_name": "aws_access_profile",
"resource_profile_name": "resource_profile",
"config_template": "configuration_template_name"
},
"aws_specifc_deploy_info": {
Getting Started 21
"init_config": 2,
"max_config": "8TB"
}
}
}
See the online REST documentation for an explanation of the fields. The AWS and legal values and descriptions are as follows.
This takes several minutes to complete. Ensure that the REST client has a sufficiently long timeout.
While the deployment is running, you can monitor its progress by running a GET on /rest/v1.0/tasks URI to see a list of all (or
active) tasks. From the task list, you can retrieve a task ID and use that id to GET /rest/v1.0/tasks/{ID} to get the detailed
status of the running task.
Managing a DDVE
Once the DDVE is deployed, you can monitor and manage it using all the standard DDMC interfaces. You can monitor status,
health, capacity and much more through the DDMC GUI. You can launch System Manager to make changes to the DDVE.
Also, there are many DDMC REST APIs you can use to do things like provision MTrees, create NFS exports, build your own
performance monitoring applications, and perform delete/deploy functions. Refer to Appendix B.
Destroying a DDVE
When you are done with the DDVE, use the DELETE /rest/v1.0/dd-systems/{SYSTEM-ID} API to remove the DDVE from the
DDMC inventory. In addition to removing the system from the inventory, DDMC destroys the DDVE and deprovision the EBS
storage that is used for the file system. Again, this is a long running task which you can monitor using the /rest/v2.0/tasks
URIs. Refer to Appendix B.
Powering on DDMC
About this task
If installation is successful, you can power on the DDMC virtual machine and login to the system.
Steps
1. Open the client, and navigate to the location where you configured DDMC.
2. Right-click on the instance, and select Power On.
3. Optionally, right-click and select Console to view the boot and initialization process. After a successful boot sequence
completes, a CLI prompt is displayed. You can log in as sysadmin with the initial password changeme.
NOTE: While the CLI can be used to log in to DDMC and perform some operations (see "Differences between DDMC
CLI and DDOS CLI on page 133"), the preferred interface for working with DDMC is the GUI.
22 Getting Started
Logging in and out of DDMC
DDMC is accessed by using a supported browser on a workstation that has network access to the DDMC instance. DDMC
supports multiple simultaneous users.
Other browser versions may also work; these particular versions have been validated. See the release notes for the most
up-to-date information.
Steps
1. Open a browser, and enter the hostname or IP address of DDMC.
A Secure Login link is provided for establishing a secure connection over the network using HTTPS instead of HTTP. This
option uses a self-signed certificate by default, which the user must accept, despite browser warnings.
2. In the login window, enter a user name and password, and press Enter, or select Log In.
Results
After you log into DDMC, the Dashboard is displayed, showing the default set of monitoring widgets.
Related concepts
Managing local user access to DDMC on page 103
Global controls and icons on page 128
Prerequisites
Logging in with a certificate is only available through a secure login page (HTTPS), and it also requires an import of CA Root and
intermediate files through the CLI.
Steps
1. To import CA Root, enter the following command in the Windows or Linux CLI:
ssh sysadmin@DDMC adminaccess certificate import ca application login-auth < rootCA.crt
2. To import the intermediate CA files, enter the following command in the CLI:
ssh sysadmin@DDMC adminaccess certificate import ca application login-auth <
intermediateCA.crt
Getting Started 23
3. Select the "Log in with certificate" link.
The Select a Certificate dialog displays, enabling users to select the appropriate certificate to use to login to DDMC.
NOTE: Only users that exist in DDMC are displayed.
● Certificate supports local, NIS, and AD users.
● Users are authenticated by the Data Domain or PowerProtect system using the public certificate present on the
CAC/PKI.
● Using a CAC/PKI card might require the user to enter a PIN as part of the certificate authentication process.
Steps
1. Select Inventory > Systems.
2. Click ADD (green plus sign). Type the following for the first system, then select Add to continue adding systems (up to 20
systems total). Ensure the box next to the system being added is checked.
● Select System or HA system.
● Host name (required) – Type the fully qualified hostname (use alphanumeric characters, dashes, periods, and
underscores) or IP address. Ensure that the hostname and the DNS name for the system match; a mismatch may
cause problems with backup software.
NOTE: For HA systems, specify the floating hostname, otherwise the Add operation fails.
● Sysadmin password (required) – Type the sysadmin password that is used on the Data Domain or PowerProtect
system (required).
● Proxy Firewalls (optional) – Type the inbound and outbound proxy hostname (or IP address) and port number to for the
firewall. If this option is selected, and you do not change the port number, the default (3009) is used. If you do change it,
the port number must be between 1 and 65535. The default port settings let DDMC communicate with the system. If the
ports have been changed on the firewall or the system, they should also be updated here.
NOTE:
○ Proxy firewalls are not supported for HA systems, so this section is not editable when adding an HA system.
○ For more detailed information, see the section, Inbound and outbound proxy host names and port numbers used
by the firewall on page 36.
● Certificate (optional) – Check certificate information by clicking in the associated cells. The Subject name in the DDMC
CA certificate should match the DDMC hostname, or SSL fails the host verification.
NOTE: For environments that use self-signed SHA-256 certificates, the certificates must be regenerated manually
after the update process is complete, a trust must be reestablished with external systems that connect to the
system.
● Progress – Shows the percentage that is completed as the system is being added.
● Takeover managed system – Select this checkbox if the system is managed by another DDMC. The system becomes
unmanaged but not removed from the other DDMC.
3. Click REGISTER to continue.
Results
A progress bar displays on the page showing the progress of the initial data synchronization for the newly added systems. Also,
job progress details can be tracked on the Health > Jobs page.
NOTE: If there is a failure, select Get failure reason on the progress bar. After correcting the failure reason issue, click
REGISTER to re-register again.
24 Getting Started
After a system is added to DDMC, all historical information for that system is copied to DDMC. From that point on, whenever
operational data changes on that system, the system notifies DDMC, which immediately polls the system to receive that new
information.
Common Causes of Errors While Adding Systems
The following checklist may help you resolve some errors that can occur when trying to add a system to DDMC:
● Ensure that the system is online. A system must be online to be added to DDMC.
● If you specified a port number in the proxy firewall settings, ensure it is correct.
● Ensure that there are no networking issues preventing communication between the DDMC and the system.
● If you specified a hostname for the system, ensure that the hostname can be resolved in the namespace (DNS or host list).
● Ensure the password that is entered for the system is correct.
● Ensure that the DDOS version of the system is supported by the current version of DDMC.
● Ensure that the system is not already managed by another DDMC. To resolve this issue, you can either delete the system
from the original DDMC or select the Takeover managed system checkbox. The system is added to the new DDMC, but
the system’s status will be changed to unmanaged on the original DDMC, and data collection will be suspended for that
system.
● For HA systems, ensure:
○ The specified hostname was not the hostname of the standby node.
○ The HA system is not in degraded mode.
○ Both of the nodes are up.
Steps
1. Select Infrastructure > Systems.
2. Select one or more systems and then EDIT (yellow pencil).
3. In the Edit System dialog, choose any or all tabs to make changes (select APPLY, or change tabs to save the new settings
and continue reconfiguration). If you selected more than one system, only the Properties and Thresholds tabs are available.
● Configuration lets you edit the inbound and outbound proxy hostname (or IP address) and port number used by the
firewall. If this option is selected, and you do not change the port number, the default (3009) is used. If you do change it,
the port number must be between 1 and 65535. The default port settings let DDMC communicate with the system. If the
ports have been changed on the firewall or the system, they should also be updated here.
NOTE: Configuration is not displayed for HA systems.
NOTE: For more detailed information, see the previous section, Inbound and outbound proxy host names and port
numbers used by the firewall on page 36.
● Properties lets you edit information for classifying systems, and the data contained in MTrees and Replication contexts,
for searching, filtering, and organizing. If you selected more than one system, and there are different values for that
property on the different systems, the field shows Mixed values. If you change the value, all systems receive the new
value. There are default and user-created properties (Administration > Properties > System) . The default properties
of Model, operating system, and Domain Name are not editable. Data Center is a "hybrid" fixed-value string-type
property. Because it is a default system property, it cannot be deleted, but its values can be edited and set for a system.
● Groups let you organize systems under a specific name, in a hierarchical structure the DDMC administrator creates,
which is helpful for searches. You can add or remove group assignments, and select or clear group assignments for the
system. Any number of groups and subgroups can be selected.
● Thresholds indicate the system warning and critical capacity thresholds and are shown on capacity views and in reports.
Use the slider to specify thresholds as a percentage of total capacity. When editing multiple systems with mixed warning
thresholds, the initial warning value is zero. When editing multiple systems with mixed critical thresholds, the initial critical
value is 100. If you change the value, all systems receive the new value.
4. Select OK to save and exit system reconfiguration.
Getting Started 25
Configuration Templates
Configuration Templates allow a DDMC administrator to create a template for configuring a Data Domain or PowerProtect
system.
This function allows:
● The same configuration to be applied to multiple devices.
● A known valid and preferred configuration from a DD System to use as a standard template.
● Monitoring of multiple systems for configuration compliance and audit changes, including who made them and when.
NOTE: A Configuration Template is based on configuration from a source system and cannot be created from scratch in
DDMC.
Template details can be viewed clicking the Details button in the table row. For additional configuration details, click View
Configuration Details in the details panel on the right side.
26 Getting Started
6. Click Next.
7. Review the summary page, and click Audit.
A direct link to the job status is available. The status can also be viewed by going to Health > Jobs.
Audit Schedules
1. Select Infrastructure > Configuration Templates.
2. Select the Audit Schedules tab, and click Create.
3. Define the schedule by adding:
● Name
● Frequency (Daily or Weekly)
● Start Date
● Time
● Template (from the list of available Configuration Templates)
4. Search in Select Systems and select one or more systems from the Available Systems list to audit.
5. Click Add.
6. Click Next.
7. Review the summary page, and click Create.
Audit History
The Audit History tab can be accessed by navigating through to InventoryConfiguration Templates. A table with System
Name, Template Name, Schedule Name, Audit Run Date, Audit Job Status, Compliance Status, and Non-Compliant Features are
displayed.
Click the Template Name for configuration details.
If a number other than zero is shown in the Non-Compliant Features column, click the numeral to see the specific features that
are non-compliant.
Assigning properties
The procedure to assign a property varies, depending on where the property is used: system or replication.
Related tasks
Adding properties to systems and replication pairs on page 28
Steps
1. Select Infrastructure > Systems.
2. Select one or more systems.
3. Select EDIT (yellow pencil), and in the Edit System dialog box, select the PROPERTIES tab.
Data Center is the default property that should appear when adding a system.
4. For each property listed, assign a value. If you selected more than one system, and the systems have different values for
that property, the field shows Mixed values. If you change the value, all systems receive the new value. An Undo control
is provided for undoing the setting, and a More Details control shows the saved values for each selected system. For
properties that were created as a:
● String – Type the text that is displayed as the value.
● Boolean – Select one of the two values from the drop-down list.
● Fixed-value string (and multi-value) – Select the value from the drop-down list.
5. Click OK to set the values.
Getting Started 27
Related tasks
Assigning replication property values on page 28
Adding properties to systems and replication pairs on page 28
Steps
1. Select Replication > Automatic.
2. Select a replication pair.
3. Select ASSIGN PROPERTIES and set a value. For properties that were created as a:
● String – Enter the text that will be displayed as the value.
● Boolean – Select one of the two values from the drop-down list.
● Fixed value string (and multi-value) – Select the value from the drop-down list.
4. Click ASSIGN to set the values.
5. To see values that are assigned to replication contexts, you can add this property as a column in the replication table on the
Automatic replications page:
a. Select the Show Columns icon.
b. Select the checkbox of the property from the list.
c. You will see the name of the property as the column title, and any value that is assigned to a context will appear in the
cell.
Related tasks
Assigning system property values on page 27
Adding properties to systems and replication pairs on page 28
Steps
1. Select Administration > Properties.
2. At upper right, select one of the tabs (SYSTEM or REPLICATION), and click ADD (green plus sign).
3. In the Add Property dialog box, type a name for the property, and select its operation type:
● String – Allows a string of up to 256 characters to be set when assigning the property, for example, you could name the
property "Comments", and a user could enter "Waiting for Tom's response", "Not ready yet", as examples.
● Boolean – Creates a condition where you can assign one of two values, for example, you could name the property
"Restored?", and possible values could be "True" or "False", or "Yes" or "No".
● Fixed-value String – Lets you provide a name and specific values for the property, for example, "Department" could
be the name, and "Finance", "Human Resources", "Marketing" could be the values. Selecting the option Allow multiple
types lets you assign more than one value.
4. Click ADD.
5. Assign values to the properties, as described in "Assigning Properties".
Related concepts
Assigning properties on page 27
Displaying property information on page 38
28 Getting Started
Related tasks
Assigning system property values on page 27
Assigning replication property values on page 28
Displaying properties for an element on page 38
Finding elements by property value on page 39
Getting Started 29
Figure 1. DDMC page elements
Related tasks
Working with filters on page 40
30 Getting Started
Navigating a DDMC page
Navigation elements on a DDMC page change the focus and scope of the content that is displayed in the work area.
Related tasks
Working with filters on page 40
Steps
1. Select Home > Dashboard.
2. On the dashboard, select the Add tab control in the banner, in the upper right.
3. In the Add and Configure Dashboard Tabs dialog, select ADD (green plus sign).
4. In the selected text field, enter the name for the tab.
5. Choose the number of columns for the tab (more columns produce smaller widgets) and any applicable filter.
6. Click ADD.
7. Order the placement of the tab across the dashboard using the MOVE UP or MOVE DOWN controls.
8. Click SAVE.
Results
The new tab is displayed on the dashboard.
Getting Started 31
Adding widgets
You can also add widgets to customize your DD Management center setup.
Steps
1. Select Home > Dashboard.
2. On the dashboard, navigate to a tab (All Systems, etc.), or create a new tab (see the preceding section).
3. Select the Add widget control in the banner, at the top right.
4. In the Add Dashboard Widget dialog, enter a Name that will reflect the widget's use. For example, using a Lag Thresholds
template, you could name the widget "New Jersey Lag Thresholds" if you have set filters to show only those systems that
replicate to New Jersey. The name must be unique for this tab.
5. Select a Template for the desired output. When you select a template, an image appears under Example, showing an example
of a widget of that type.
6. If applicable, in the Settings area, select any of the available options (such as filtering to narrow the scope of the widget
monitoring). Widgets can be filtered using standard filter primitives such as systems, groups, and properties. Also, depending
on the template, you may have other settings that you can configure.
7. Click ADD.
Results
The new widget is displayed on the dashboard.
Widget templates
You can add, edit, or delete widgets from the dashboard, by selecting the Add widget control in the banner at the top right, by
using the Edit widget control in the banner of each widget, or by using the Remove widget control in the banner of each widget,
respectively.
32 Getting Started
Capacity Used widget
The Capacity Used widget shows ratio of space that is used to available space.
This widget shows the total percentage of capacity used. Since the widget does not represent a Health state, the text and color
is always a neutral state. The gauge shows blue to the ratio of the used capacity, and the text is always blue. Navigation from
this widget takes the user to the Systems Capacity Thresholds page.
Select the Show detail control (>>) to display the Capacity > Systems page.
Getting Started 33
Clicking the Gauge (or the image within the widget or the Show Details (>>) button on the toolbar) goes to to the Health Status
page, which is filtered by the complete list of the Cloud extended systems.
If a system has two cloud units, one in the Delete Pending and Disabled state and the other in the Disconnected state, the
widget shows yellow.
When the Cloud Tier on some or all of the Cloud extended systems is not healthy, meaning one or more Cloud units on those
systems are not healthy, the Gauge shows the fraction of the Cloud extended systems whose Cloud Tier is not healthy. If all five
Cloud extended systems are Unhealthy, then the complete gauge is Red.
Clicking the Gauge (or the image within the widget or the Show Details (>>) button on the toolbar) goes to to the Health Status
Page filtered by the Cloud Extended Systems that are Unhealthy.
If one Cloud Unit is healthy and one has errors, the widget should display error for the Cloud Tier and requires further
troubleshooting to determine the source of the error and any remedial action that can be taken. The widget displays a gauge
with the error proportion colored red and the remaining gray.
NOTE: The worst state for the Cloud Units in a system takes precedence.
Users can filter by systems, groups, properties, and rules. Filtering by systems shows only the Cloud Extended systems available
in the inventory.
Copying tabs
You can create a tab that contains the same widgets as an existing tab by copying that tab.
Steps
1. Select Home > Dashboard.
2. Select the Add tab control in the banner on the upper right.
3. In the Add and Configure Dashboard Tabs dialog, select the name of the tab to copy and then COPY.
4. In the text box, enter the new name for the tab (typing over "COPY OF ...").
5. If you want to change the number of columns, select the current number, and change it using the drop-down list.
6. If you want to change the placement of the new tab, use the MOVE UP or MOVE DOWN arrows.
7. Click SAVE.
Results
The new tab is displayed on the dashboard. You can open the widgets on the new tab to modify their properties.
Editing tabs
You can edit an existing tab by using the Filter icon on the upper right corner.
Filtering tabs
Tabs can be filtered using the Filter icon on the upper right corner.
Click the Filter icon to:
● Filter by group
● Filter by property
34 Getting Started
● Filter by system
● Filter by rule
● Clear filter
Modifying widgets
You can modify widgets that were copied from a tab as a starting point for a new set; for example, you could change the filter
properties to monitor a different group, set of systems, or rule.
To modify a widget, use the Edit widget icon on the widget's title bar, and change the name, settings (if available), and filtering.
NOTE: You cannot change the widget type (as determined by the widget template) with the Edit function.
Creating groups
Groups are ways to organize Data Domain or PowerProtect systems under a specific name, in a hierarchical structure created by
the DDMC administrator.
Steps
1. Select Administration > Groups.
2. To add a group at the root level, click + ADD.
3. Ensure only the "/" is in the Path box. Enter a name for the new group, and click SAVE.
The new group is now listed in the Groups panel.
4. To add a sub-group to a group, select a group (which will be the parent group) from the Groups panel, click + ADD (green
plus sign), enter a name for the sub-group, and click SAVE.
The sub-group is nested under the parent group in the Groups panel.
5. After a system has been added to DDMC, it can be added to a group. Select the target group from the Groups panel, and
click ADD (green plus sign). In the Add Group dialog, select a system from the Available Systems panel, select > to move
the system into the Systems in the Group panel, and click SAVE.
The system is displayed in the Group Details panel when the group is selected in the Groups panel. When a system resides in
more than one group, you can hover the cursor on the Information control to display the group assignments.
Getting Started 35
Managing groups
Although group creation and modification can be performed only by the DDMC system administrator, any user can apply group
designations to their Data Domain or PowerProtect systems and can see the complete group structure, although role-based
access control (RBAC) permissions control the systems that are displayed for each user.
Any permissions that are applied to a group affect all systems in that group. A lock image is added to the groups folder icon
when permissions are directly applied to that group.
Use the Administration > Groups page to perform group management:
● Use ADD to create groups or to add systems to existing groups.
● Use DELETE to remove systems from the group-level organization. (You cannot use delete to remove systems from a
group. But you can edit the group, and remove systems by selecting them in the right panel and selecting the left-pointing
arrow)
● Use EDIT on a selected group to modify the presence of systems within that group or the name of the group.
NOTE: Groups cannot be dragged and dropped into a different location; they must be changed with the Edit function.
Inbound and outbound proxy host names and port numbers used by
the firewall
The inbound and outbound proxy host names (or IP addresses) and port numbers for a firewall must be set if the connection
between DDMC and the Data Domain or PowerProtect system is through a proxy.
NOTE: This section is disabled when adding HA systems.
NOTE: In DDMC, ports 8009 and 8080 are restricted to localhost only and are inaccessible from outside. DDMC is accessed
by default HTTP port 80 or, if SSL is enabled, by default HTTPS port 443.
The terms inbound and outbound are from the perspective of DDMC. Inbound means from the system to DDMC, and outbound
means from DDMC to the system.
Starting with the simplest situation (direct connection) for explanation, here are some scenarios and how you would set up the
inbound and outbound proxy firewall host names (or IP addresses) and port numbers.
36 Getting Started
A system with multiple network interfaces
When a system has multiple network interfaces, you need control of the specific interface that is used by DDMC.
In this case, the system hostname probably does not translate to the IP address of the wanted network interface. To direct
DDMC to the wanted interface, you must set the outbound proxy hostname (or IP address) to a DNS name or the IP address of
the wanted interface. It is not necessary to set the inbound proxy hostname or port number.
In this case, when DDMC wants to connect to port 3009 on the system, DDMC must try to connect to port 12,345 on the
firewall. Conversely, when the Data Domain system wants to connect to port 3009 on DDMC, the Data Domain system must try
to connect to port 54,321 on the other side of the firewall.
To configure this, set the outbound proxy hostname to 1.1.1.2 and the outbound proxy port number to 12,345. Set the inbound
proxy hostname to 1.1.2.3 and the inbound proxy port number to 54,321. The rule is that the outbound hostname and port
number are the addresses to which DDMC should try to connect when it wants a connection to port 3009 on the Data Domain
system. The inbound proxy hostname and port number are the addresses to which the Data Domain system should connect
when it wants a connection to port 3009 on DDMC.
Avoiding the addition of host names to peer's DNS server or /etc/hosts file
There may be situations in which you do not want to add the hostname of the DDMC, or the hostname of the system, or both,
to their peer's DNS server(s) or to their peer's /etc/hosts file.
In these situations, depending on the host name(s) you do not want to add, you can instead specify the IP address of DDMC in
the inbound proxy hostname field and/or the IP address of the system in the outbound proxy hostname field.
Getting Started 37
Data Center
Create, manage, and monitor health and alerts of groups of systems at the data center level.
An overview is provided on the main data center page and shows:
● The number of created data centers
● How many systems are in and are not in a managed data center
Before you can manage systems in a data center, they must first be added (register). See the section Adding (registering)
systems to DDMC.
Related tasks
Adding properties to systems and replication pairs on page 28
Steps
● Systems – Select Infrastructure > Systems, and select a DD system.
All properties assigned to that system are displayed in the Properties panel.
38 Getting Started
NOTE: You can also display properties by selecting the "gear" control in the systems banner. When you select one or
more properties from the list of configured properties, a column for that property is added to the table. To hide the
property, clear the property from the list. Some properties may not be removed from the table, so they will not display in
the list of configured properties under the gear control.
● Replication – Select Replication > Automatic, select a replication pair, and select Pair Details.
Any properties assigned to the replication pair are displayed in the Properties panel.
Related tasks
Finding elements by property value on page 39
Adding properties to systems and replication pairs on page 28
Steps
1. Select Administration > Properties, and select the property type (SYSTEM or REPLICATION).
The table shows all of the properties that have been created. Selecting a property displays its assigned values in the panel at
the right.
2. To display where the property is assigned, select a property, and select the icon on the right side of the Key column.
In the Property Assignment dialog, you can see the property type, the element where it is assigned, and the property values.
Related tasks
Displaying properties for an element on page 38
Adding properties to systems and replication pairs on page 28
Steps
1. Select Replication > Automatic.
2. Select one or more replication pairs from the table.
3. To create a policy, select LAG THRESHOLD POLICY (or right-click the pair, and select the option).
a. In the Assign Lag Threshold Policy dialog, from the Threshold policy menu, select Create a new policy.
b. In the Manage Lag Threshold Policies dialog, select ADD.
c. In the text box, enter the policy name, and use the slider controls to set the threshold points for the Warning and Critical
lag levels.
d. Click SAVE.
4. Back in the Lag Threshold Policy dialog, select a policy from the Threshold Policy menu, and click ASSIGN.
Getting Started 39
Results
The policy is applied to the selected replication(s). The assigned policy name is displayed in the table in the Threshold Policy
column.
To modify or destroy a policy, select Manage Lag Threshold Policies (or right-click the pair and select the option). In the
Manage Lag Threshold Policies dialog, select a policy from the list, and select Edit or Delete. If a deleted policy was assigned
anywhere, it is replaced with the Default policy. Select Save to exit.
NOTE: The Default policy cannot be renamed or deleted, but it can be modified.
NOTE: Global Filter is only available in Classic view and is not supported in the Cloud tab.
Steps
1. From the Filter drop-down menu, select Filter by rule.
2. In the Filter by Rule dialog, provide a name for the filter.
3. Using the selection menus in the Match the following area, create the criteria for your rule. The criteria consists of one or
more statements.
Create the first statement by selecting an object from the first menu (System, Group, Model, OS, Domain Name, etc.) and a
logic condition (contains, does not contain, is, is not, etc.), then the target (text you input or a menu selection, based on the
previous selections). For example, a statement could be "Model is DD880".
4. If needed, add more statements with the Add row (+) control, or add conditions to the rule using the Block (...) control,
which adds the choice of All or Any to the Match the following area), and create additional statements.
5. Select the Save (disk) control to make this filter available from the Filter menu list or select Filter to run the filter once and
exit.
6. To remove the filter and return to unfiltered content, select Clear filter from the Filter menu.
NOTE: The filter may still be available with the Recent filters option on the Filter control list.
Related concepts
Viewing DDMC page elements on page 29
Global controls and icons on page 128
Dashboard controls on page 130
Related tasks
Navigating a DDMC page on page 31
40 Getting Started
4
Monitoring Systems
Topics:
• How DDMC helps monitor DD systems
• Data retention policy for DDMC
• Space projection algorithm for DDMC
• Performing daily monitoring
• Monitoring capacity
• Checking the System Details lightbox
• Monitoring replication
• Monitoring status with reports
Monitoring Systems 41
Table 9. Data retention policy for DDMC (continued)
type of data keep hourly samples keep daily keep weekly samples for
for samples for
Automatic replication (bytes transferred and 1 month 3 months 10 years
lag)
On-demand replication (number of files and 3 months 1 year 10 years
bytes transferred)
Performance (CPU and network) 1 month 1 year none created or retained
Finally, DDMC retains up to 2,000 historical alerts from each DD system being monitored.
42 Monitoring Systems
Widget templates for commonly used monitoring functions can be used to create widgets for all managed systems or filtered by
a set of criteria such as groups, properties, systems, or rules.
After they have been created, you can drag widgets around the dashboard to improve their organization. A widget or a tab with
several widgets can be copied and modified to create additional widgets.
The size of the dashboard can switch between full screen and normal view.
Capacity Thresholds
The Capacity Thresholds widget displays systems that have crossed warning or critical storage capacity levels.
Capacity Used
The Capacity Used widget lets you monitor aggregate totals of storage levels for all DD systems it is configured to manage. This
widget monitors the total storage capacity of all systems (for space that is used and available) or a selected group if a filter is
set.
Replication Status
The Replication Status widget highlights replications with performance problems for the widget's monitored systems.
Lag Thresholds
The Lag Thresholds widget identifies replication pairs which are not replicating data to the destination fast enough and shows
the count of replication pairs which have crossed the Critical, Warning, and Normal threshold levels, based on the assigned
policies. This widget identifies these pairs, the duration of the lag time and whether it is improving.
Health Status
The Health Status widget highlights unreachable systems and systems experiencing issues with file system and replication
operations, alerts, and data transmission protocols. The widgets show All Normal (green) or show a count of systems exhibiting
issues.
Clicking on the gauge navigates to the Health Status page, filtered by the systems in Not Healthy status, if any.
Active Alerts
The Active Alerts widget displays a tally of systems with outstanding alerts for Emergency & Alert, Critical & Error, and Warning,
using a colored gauge and a rolled up count of Alerts for each system. The worst status takes precedence.
Clicking on the gauge takes you to the Alerts page, filtered by the widget's configured filters .
Monitoring Systems 43
Checking alert notifications
For new, unacknowledged alerts on systems you are authorized to manage, always check the bell icon present at the upper right
side.
This Notification Area is not constrained by filter settings that are active, and it displays notifications of alerts for all systems
you are authorized to manage.
The "New Alerts" area shows the current unacknowledged Emergency, Error, and Warning level alerts. Click anywhere in the
New Alerts area to display a pop-up reporting the severity, system name, and class of the new alert. After the pop-up is
displayed, the alerts notification is removed from the Alerts Notification area.
To see the alert details, select the "Show me these alerts" link to open the Health > Alerts page, where the table is filtered to
show only the new alerts.
44 Monitoring Systems
● The Tenant Unit Details control (upper left) launches the Tenant Unit Details Lightbox.
● A special "all" Tenant Unit alert is applied to all Tenant Units in the system.
The page banner provides summaries of the total number of alerts: those that are errors and above, and those that are
warnings.
At the upper right, you can select the Active Alerts or All Alerts tab. Many, but not all, alerts remain active until manually cleared.
The Date range filters (Last 12 hours, Last 24 hours, Last 7 days, Last 30 days, All active alerts, and Custom) allow you to
narrow or expand the focus of alert scoping or go back to a specific point in time.
The column controls sort the alert list by Severity, System Name, Post Time, Class, Message, and Object ID. The System Name
column includes a filter for entering system name text.
Selecting an alert in the table expands to show descriptive information about the alert. To see a summary of the alert's history,
select the More Details link to see a list of every occurrence of the alert at the site.
To investigate or resolve an alert on a system, open the DD System Manager by double-clicking the alert in the table, or use the
View DD System Manager control, which is enabled when a system alert is selected.
NOTE: For additional information about specific alerts, see the Error Message Catalog on the online support site.
Monitoring capacity
The Capacity pages display information about storage utilization. Current and historical space consumption, as well as estimate
projected near-term future storage needs, can be monitored from here.
The Capacity section is split into the following:
● Systems, which includes both capacity information and projection information
● Cloud
● MTree
Monitoring Systems 45
Physical capacity (PCM) for MTrees, Tenants, and Tenant Units can be measured and is described in more detail in the next
section, Measuring Physical Capacity (PCM).
Systems capacity
The Systems Capacity Threshold's table show the current space available and "% Used and Projected."
● No more than 25 systems can be shown on a page
● 3 months is default for the Projection Timeline (Capacity Used %), specific date can be selected, but cannot go beyond
12 months
● Must select one row (radio button) before the Calculate Projections option is available
Additional functionality:
● Identify systems as targets for new back ups, replication, and migration
● View the amount of data that is written during a particular timeframe, such as a back-up cycle, and determine how much it
has been compressed
● Identify systems that have deviated from their norm for compression ratio
● Identify systems that have used all their storage space
● For Extended Retention-enabled systems, identify how much space is available and used on the Archive and Active tiers, and
how well it is compressed
● Identify when garbage collection runs and how much space is reclaimed
● Sort the Warning and Critical Capacity Thresholds columns by ascending/descending controls and can be filtered by greater
than or equal to or less than or equal to
There is a details panel that can slide open on the right, using the arrow on the upper right corner of the table. When a system is
selected using the radio button, the details panel is populated with more capacity related information.
For more detailed information, the system name (in the table or in the details panel) can be clicked to launch the System Details
Lightbox.
NOTE: The Space Usage amounts may not exactly match capacity totals that are reported by DD System Manager.
Because of the polling delay of up to an hour, DDMC reporting will always lag. This is especially true if there is a lot of churn
on the monitored system. The discrepancy will be more visible, and there is a possibility that DDMC may never catch up
with DD System Manager capacity totals.
Cloud capacity
● Monitor the active tier and cloud tier capacity residing on different cloud providers
● Give an overview of the data distribution between on-premises data centers and the different cloud providers
● List which MTrees are associated with a certain Cloud provider
MTree capacity
● Type a list of comma-separated strings to filter the Tenant Unit column.
● Sort MTrees within a Tenant Unit.
● Monitor the capacity of logically grouped or single systems to track usage and identify systems that are using capacity too
quickly
In the Capacity Usage section:
● When a Tenant Unit is selected, the information is aggregated based on all MTrees within that Tenant Unit.
● When a Tenant is selected, the information is aggregated based on all MTrees within all Tenant Units pertaining to that
Tenant.
● The last row shows aggregated totals.
In the Measured Physical Capacity section, Job State can have one of the following five values:
● Unsupported (DD system does not support PCM features)
● Completed (latest job successful)
● Failed
● In-progress
● None (PCM is supported, but no jobs run)
46 Monitoring Systems
In the Charts area, the Space Usage, Consumption, and Data Written information and can be seen by selecting each in a
drop-down list. If there are connected systems with Cloud Tier or Retention Tier, tabs are shown as Retention (for both Cloud
Tier and Retention Tier) and Total. New charts for the Cloud Tier are also available.
● Systems that are consuming space at a rate greater or less than their historical norm
● Total capacity, amount that is consumed, and compression ratio (aggregate) for a group of systems
● Data ingest rate for a group of systems, for example, the total data ingest rate for the last 24 hours
● Systems that are out of space or critically low on space or have used all of their storage space
● The amount of data that was backed up the previous night (24 hour period), and the compression ratio for a group of
systems
● The last time that garbage collection was run and how much space was reclaimed
● Select multiple systems and see aggregated information
Schedules may be consolidated on multiple Data Domain and PowerProtect systems, as follows:
● If two or more schedules have the same name, type, and schedule (for example, "every Monday at 7 AM"), DDMC displays
one schedule that is configured on different systems.
● If two schedules have the same name, but different types or different scheduled times, DDMC displays two schedules.
Monitoring Systems 47
● If a schedule is Disabled on one system, but Enabled on another, DDMC displays one schedule.
NOTE: Refresh can take up to one hour if these changes are made through the command-line interface (CLI).
Steps
1. Select Capacity > MTrees > Physical Capacity Measurement menu > Schedules
In Classic view, select Capacity > Utilization > MTree tab > Physical Capacity Measurement menu > Schedules.
2. In the Manage Measurement Schedules dialog, you can add a new schedule, edit an existing schedule, or delete a schedule.
3. For existing schedules, expand the arrow at the left to display the entities that belong to the selected schedule:
● Schedule shows the current schedule, such as Daily at 12:00.
● Type can be MTree, Tenant Unit, or Tenant.
● Status indicates whether the schedule is Enabled or Disabled. If disabled, it will not run at the scheduled time.
NOTE: If the schedule was enabled on some systems and disabled on others, selecting Enable will enable it on all
systems. Likewise, selecting Disable will disable it on all systems.
● In Use displays Yes if any entities are assigned to this schedule.
4. Select Close when you are finished.
Steps
1. Select Capacity > MTrees > Physical Capacity Measurement menu > Schedules
In Classic view, select Capacity > Utilization > MTree tab > Physical Capacity Measurement menu > Schedules.
2. In the Manage Measurement Schedules dialog, select Add (green plus sign), or select a schedule and select Edit (yellow
pencil).
3. In the Add a Schedule or Edit schedule dialog, enter or edit the following information:
● Status is displayed only for editing. Select Enabled or Disabled.
● Name can be entered only for a new schedule. You cannot edit the name after the schedule has been created.
● Every can be Day, Week, or Month. Selecting Week or Month will bring up a weekly or monthly calendar where you can
select the days of the week or days of the month.
● Scope indicates whether the schedule is MTree, Tenant, or Tenant Unit. You cannot create a schedule with different
types of entities; however, you must select one to create a schedule. You cannot edit the scope after it has been
created.
● Assignment displays Yes if any entities are assigned to this schedule.
4. Select Add.
Steps
1. Select Capacity > MTrees > Physical Capacity Measurement menu > Schedules
In Classic view, select Capacity > Utilization > MTree tab > Physical Capacity Measurement menu > Schedules.
2. In the Manage Measurement Schedules dialog, select a schedule, and select Delete (red X).
3. In the Delete schedule dialog, select the down arrows beside More information to see the entities assigned to this
schedule.
4. Select Yes or No.
48 Monitoring Systems
Assigning and unassigning measurement schedules for physical capacity
You can assign and unassign measurement schedules for physical capacity of MTrees, Tenant Units, or Tenants, using the
Assign/Unassign Schedules dialog. Assigning a schedule to a Tenant will measure that Tenant on all DD systems used by the
Tenant.
Steps
1. Select all or multiple MTrees, a single MTree, a Tenant Unit, or a Tenant for which you want to assign or unassign schedules.
2. Select Capacity > MTrees > Physical Capacity Measurement menu > Assign/Unassign Schedules.
In Classic View, select Capacity > Management > MTree tab > Physical Capacity Measurement menu > Assign/
Unassign Schedules
3. In the Assign/Unassign Schedules to entity dialog, you can move schedules from the Available Schedules list to the Assigned
Schedules list, and vice versa, using the arrows. The double arrows (>> and <<) move everything. The single arrows (> and
<) move only the selected schedule.
4. Select Save or Cancel.
Steps
1. Select all or multiple MTrees, a single MTree, a Tenant Unit, or a Tenant that you want to measure now.
2. Select Capacity > MTrees > Physical Capacity Measurement menu > Measure Now.
In Classic View, select Capacity > Management > MTree tab > Physical Capacity Measurement menu > Measure
Now
3. In the Measure Now dialog box, you can select Hide to keep the process going, but to not show the dialog box. You can
monitor progress on the Jobs page.
a. If the job submits successfully, a success message is displayed.
b. If the job fails, the reason for failure is displayed when hovering over the "Failed" status.
c. For entities associated with multiple systems (a single Tenant or multiple MTrees), if an error occurs, a table with the
error on a per Data Domain system basis is displayed.
d. After the job starts, it may take some time for it to complete.
NOTE: A physical capacity measurement takes roughly the same time as a cleaning cycle. This might be hours or,
in extreme cases, days. Timing depends on the current workload of the system and how much data is in the MTree,
Tenant Unit, or Tenant.
It may take up to an hour for the physical capacity measurement data to show up on the MTree pages after the job is
completed.
Steps
1. Select Capacity > MTrees > Physical Capacity Measurement > View Measurement Jobs
Monitoring Systems 49
In Classic View, select Capacity > Management > MTree tab > Physical Capacity Measurement > View Measurement
Jobs.
2. In the View Measurement Jobs for entity dialog, observe the combined list of physical capacity measurement jobs that are
In-progress, Completed, and Failed, starting with the most recent.
3. Select Close.
50 Monitoring Systems
Table 10. Insufficient data messages (continued)
Message Description
Projection cannot be made because the space ● The last measured usage point is below the confidence interval of the
usage trend is not consistent during the specified projection. The confidence interval is the 95% band, that is, for 95%
date range. of the time, the actual data points should be within the confidence
interval. The most recently measured point is lower than the lowest
value expected with 95% confidence.
● A regression was computed, but the best regression does not match
the actual measurements closely. Technically, this result indicates that
the R 2 value (the "coefficient of determination") is less than 0.8.
[An R 2 value of 1 means that a perfect fit was found. A value of 0
means that no correlation was found at all.] This R 2 value means that
capacity is not being used in a smooth, linear fashion. It is either being
consumed at a varying rate or varying between being used and freed
up. (See Space projection algorithm for DDMC on page 42 for more
about R 2 .)
Date column data (Current, and those selected using the timeline) can be sorted by amount of Used Space, Free Space, %
Used, and Size in rising or descending order.
Highlighting a system in the list activates controls for interactively customizing the projection and launching the DD System
Manager.
Steps
1. To adjust the visible range of data shown in the chart (this does not change the projected dates):
● In the Date Range control, at the top left of the chart, simply select 1w, 1m, 3m, 1y, or All. The input fields at upper left
change the visible range of data, and those on the right change the projection dates.
● Enter specific dates in the date input fields.
● To change the projections, you can slide or adjust the gray area in the chart. You can move these controls to the left or
right, or you can make the chart wider or narrower, to fit a time range you believe is more representative than the one
DDMC computed as the best fit.
A better correlation between the projected trend line will show a narrower confidence range around the projected trend line.
A less satisfactory correlation will show a wider confidence range.
2. In the Dates used for making projections control, at the top right of the chart, the dates will update to reflect the
customized projection.
3. Use the Defaults button to return to the default/best fit projections.
Monitoring Systems 51
There are five tabs for non-HA systems, and six tabs for HA systems.
The Overview tab shows the operational status of various system components (such as the file system and protocols) using
LED status indicators. Also provided are summaries of file system usage and capacity, and replication status and statistics for
inbound and outbound replications.
The Capacity tab shows different tier data if applicable. If the configuration is a single-tier system, there is only one column. If
the configuration is a Cloud or Extended Retention tier system, then there are Active tier, Cloud or Retention tier respectively,
and total columns. This tab contains a Capacity usage chart and a table with MTrees on that system.
The Network tab shows total bytes, backup and restore bytes, and replication inbound and outbound bytes. There is a network
byte chart as well.
The Charts tab lets you produce charts for selected time intervals. System Charts tab has all system charts. For cloud enabled
systems, charts are broken into two sections - Historical, which contains the same charts as before, and a new Current charts
section, which contains two pie charts that show the current distribution of data on the systems and cloud providers. These
charts are:
● Protection Distribution - a chart showing how much data resides on-premises versus on different cloud providers.
● Licensed Capacity Usage - Space that is used on each provider, space available, and total capacity licensed for all the
providers combined.
The Replication tab lists the counts of different automatic/on-demand replication pairs, both inbound and outbound, with ones
that have errors or warnings. There are also inbound and outbound charts.
The HA tab, for an HA system, contains the HA system health diagram which marks alerts, if any, in each component of the HA
system. Selecting different components in the diagram can filter the alerts that are viewed in the table.
Resource charts
● CPU utilization shows the CPU utilization percentage for the system by date and also shows when cleaning is being
performed.
● Network throughput shows whether a system is experiencing bandwidth-related bottlenecks. You can determine how
much network bandwidth is being used by systems sharing the same subnet to see if any are using more than expected or
enabled by IT departments.
File system charts
● Streams counts shows the numbers of each type of stream that were open at the date and time that is indicated for each
data point. It is not an aggregate (average, min, or max) of the stream count over the selected interval. It is best viewed at
the lowest interval (hourly), so that hourly stream count throughout each day can be observed. At greater intervals (daily
or weekly), only a single data point, which is taken at noon, is shown, which is not helpful in determining how many streams
were open throughout the day or week. In summary, the hourly interval is the best choice for viewing this chart.
● Protocol processing shows the number of operations per second.
● Protocol throughput shows the following:
○ Data in is the amount of data that the DDOS file system can read from the kernel socket buffer.
○ Data out is the amount of data that the DDOS file system can write to the kernel socket buffer.
○ Wait Time per MiB in is the amount of time it takes for the DDOS file system to receive one mebibyte of data from a
network client. A high value indicates that the client is sending data relatively slowly and any performance issues are likely
to be related to the client or network. A low value indicates that data is arriving from a network client as fast or faster
than it can be deduplicated and written to disk.
○ Wait Time per MiB out is the reverse metric, the amount of time that is taken to send a mebibyte of data from the
DDOS file system to a network client. A low value indicates that data can be sent over the network as fast as it is being
read from disk. A high value indicates that data is being read from disk faster than it can be accepted by the network and
network client.
Replication charts
● Inbound characteristics shows the inbound counts for both automatic and on-demand replication pairs.
● Outbound characteristics shows the outbound counts for both automatic and on-demand replication pairs.
● Throughput shows throughput for both automatic and on-demand replication pairs.
52 Monitoring Systems
Monitoring replication
The Replication pages provide status and performance details about replication pairs – organized by systems, Groups, or
Tenants. For each page, you can view either pairs, cascades, or topology by selecting the controls at the upper right.
NOTE: For Automatic and On-demand pages, Group view has different behavior than Tenant view. Groups view shows
ungrouped pairs while Tenant view do not show pairs that do not belong to any tenants or tenant units.
For Tenants – in the Replication > Overview > All Pairs page:
● Grouping hierarchy is Tenant, Tenant Unit, Inbound, Outbound, Automatic, On-demand, Replication pair. If there are no
applicable replication pairs, the corresponding row will not appear.
● If a Tenant Unit has no MTrees or Storage Units participating as a Source or Destination, that Tenant Unit is not displayed.
● MTrees and Storage Units that are not assigned to any Tenant Units are not displayed, even if they may be a source or
destination. Similarly, if all Tenant Units in a Tenant have no MTrees or Storage Units with Replication contexts, that Tenant
is not displayed.
● RBAC (role-based access control) also affects the Tenants and Tenant Units that are displayed.
● The CSV (comma-separated values) file contains these addition columns: Tenant, Tenant Unit, Source Tenant, Source
Tenant Unit, Destination Tenant, Destination Tenant Unit. It does not contain the System column.
● Replication pairs are grouped by the Tenant or Tenant Unit to which the source or destination MTrees or Storage Units
belong.
● A pair will be listed twice when the source and destination belong to different Tenant Units.
For Tenants – in the Replication > Overview > Topology page:
● The source or destination shows the Tenant Unit name if the MTree or Storage Unit belongs to a Tenant Unit.
● Tenant Units are shown inside systems. The Tenant name is shown above the Tenant Unit icon.
● Tenant Units can be expanded just like systems.
● MTrees that do not belong to a Tenant Unit are displayed if one end of the pair belongs to a Tenant Unit.
● Tenant Units not assigned to a Tenant are displayed if one of their MTrees or Storage Units has a replication to or from an
MTree or Storage Unit belonging to a Tenant Unit.
● Cascaded replications are still displayed if they include data that originates from or is replicated to a managed Tenant Unit.
● The context menu for a Tenant Unit includes menu items for Tenant and Tenant Unit detail lightboxes.
● You can choose the related pairs view for a Tenant Unit or Tenant.
● The related pairs view for a Tenant shows all Tenant Units from that Tenant, and incoming, outgoing, or cascaded pairs from
its Tenant Units.
For Tenants and Systems – in the Replication > Overview > All Pairs page:
● Each monitored DD system or Tenant that has configured replication pairs is listed.
● Expand an entry to see its inbound and outbound replications, and for these, expand to see the replication type: Automatic
(Data Domain or PowerProtect system to Data Domain or PowerProtect system replications) and On-demand (client-
initiated and controlled replication of DD Boost files), and expand those to see the pairs of that type. The Inbound and
Outbound entries are shown only when applicable.
● Use the column selector to display columns for replication status, number of pairs (totals for systems, inbound, and
outbound replications), and a selectable/configurable time-interval for displaying historical replication data.
● Double-click a status error icon at the system level to open the System Details Lightbox, where hovering on the Replication
LED exposes a pop-up with a link to the Alerts page, which is filtered for the pairs in error. The Status error icon for a
category (inbound, outbound, system) shows if any of its items has an error condition.
● Use the right triangle System control at the upper left of the table to expand the inbound and outbound tiers to see all
Automatic and On-Demand replications (if the system entries have not been expanded yet), and also to collapse all expanded
entries.
For Systems, Groups, or Tenants – in the Replication > Automatic page:
● All monitored system replications for directory, collection, and MTree replication are listed.
● The page banner displays the total count of monitored Automatic replications, and the table shows for each replication pair
selectable columns for the status, source and destination systems, and performance data, such as lag time (the lag cell is
red when lag duration is greater than or equal to the Critical threshold and yellow for Warnings; hover over the cell for
detailed information about the lag threshold), lag trend (increasing – the data cannot be replicated within the lag threshold),
steady, decreasing, or no arrow if the pair is suspended or in error), time over threshold (hover to see policy settings), bytes
remaining, and status message text.
● The page-specific controls include Assign Properties and Lag Threshold Policy/Manage Lag Threshold Policies to
set/manage alerting for when an Automatic Replication lag time exceeds the set time limit for critical and warning levels.
Monitoring Systems 53
For Systems, Groups, or Tenants – in the Replication > On-Demand page:
● Historical data for completed replications can be viewed for the past 24 hours, 7 days, 30 days, 90 days, or by setting a
custom time frame.
● Details that are shown are for Pre-comp data that is replicated, completed and failed replicated files, percentage of failure,
and the last error messages.
● For the group view, data for pairs are rolled up at each group level. Data for all pairs are summarized at the last line of the
table.
● The number of completed and failed files can include file replications that the system retried up to four times due to
recoverable failures. The sum of the completed and failed file replications can be greater than the total number of file
replications that were initiated by the DD Boost applications on the replication pair.
● DD Boost file replications are listed (for systems running DDOS 5.3.1 or later), showing for the pair: the last transfer status,
source and destination storage units, and performance data for recent and completed replications. The table can organized
by Pairs or Groups (switch at upper right).
● If the source or destination fields show an IP address instead of a hostname, the DNS server configuration for the DD
system must be modified. When configuring DD systems to monitor DD Boost (on-demand replication), ensure that their
DNS servers include configuration for both forward and reverse hostname lookup. Without proper DNS server configuration,
DD systems cannot translate from IP addresses to host names, and the source and destination paths contain IP addresses
instead of host names.
● The replication Pair Details control is active when a pair is selected and shows a lot of replication detail.
● The System Details control is active when a system entry is selected on the Overview page.
● The Export CSV file control sends the overview listing with performance data for the last 7 days to a file with comma-
separated values (for viewing in Excel, for example).
54 Monitoring Systems
● The last transfer status
● The source and destination systems
● Settings such as encryption and operational status
● Color-coded icons showing capacity levels
The Charts tab provides graphs for:
● Pair characteristics - performance factors, such as pre-compression written, pre-compression replicated, post-compression
replication, pre-compression remaining, network bytes, and compression ratio.
● Lag trend - charts pre-compression remaining, replication lag, pre-compression written, warning threshold, and critical
threshold (not available for on-demand replication)
● CPU utilization
● Data written
● Network and replication throughput
● Source and destination characteristics, and common pairs
The charts are vertically aligned for source and destination systems by the same time interval, allowing comparisons for both
systems at any point in time.
Monitoring Systems 55
Steps
1. Select Reports > Management.
2. Select Add (green plus sign).
3. In the Add Report Template dialog, select the type of report you want (System Reports, Multi-Tenancy Reports, or Cloud
Reports), and select Next.
4. Enter a name, and select a Template. Choose one or more Sections to include, and select Next.
a. For System, the choices are Capacity, Replication, or Status.
The Hide capacity projection data checkbox will appear after a Template is selected from the dropdown. Selecting
this checkbox hides the projection data from the report.
b. For Multi-Tenancy, the choices are Status or Usage.
c. For Cloud Tier, the choices are Status or Usage.
5. Depending on whether you selected System, Multi-Tenancy or Cloud Tier:
a. System: Select a filter to narrow the scope of reported objects (for example, filter by selected groups). Select the time
span for data collection (for example, last 24 hours), and the report retention (for example, 7 days). Select Edit to set a
schedule for the frequency and time the report is run. Report generation time will be two hours ahead of Starts On time.
Select Next.
b. Multi-Tenancy: Select a Scope (Tenant Unit or Tenant). The Daily Status report is always configured to show the last
24 hours of historical data, and you can select the Report retention (Forever, 7 days, 30 days, 90 days). The Usage
Metrics report (which is generated as an Excel spreadsheet) lets you display data for a full month or a full week. Select
Edit to set a schedule for the frequency and time the report is run. Report generation time will be two hours ahead of
Starts On time.
c. Cloud Tier Reports: Select Cloud Service Providers to filter the systems that have cloud tier that is configured to
connect to them.
6. Optionally, add recipient email addresses (for when the report completes and if an error occurs). For the Tenant Unit report
template, the Tenant Unit admin email messages are added by default. For the Tenant report template, the Tenant admin
email is added by default. You can manually add or remove these email messages. Select Next.
7. Review the details, and select whether to save the template for later use and to run the report immediately. Select Finish.
Results
After it has been created, a report template is added as an entry in the reports table. When selected, the report template can be
used to immediately run a report, or it can be edited or deleted, or the time it was last run can be displayed.
Edit report
Properties of an existing report template can be edited.
Steps
1. Select Reports > Management.
2. Select the template name, and click Edit.
3. In the Edit Report Template dialog, choose the report property to edit.
● Content - Template name, template that is used, and sections.
● Scope - Systems in the report.
● Schedule - Status, time span, schedule run time, and report retention
● Email - Add and delete email addresses where reports are sent when the report is finished and if an error occurs.
Capacity reports have the option to have the content embedded within the email. The report is sent as an email
attachment by default.
56 Monitoring Systems
Cleaning up reports from deleted users
Report templates owned by deleted users can be deleted, or re-assigned to another DDMC user.
Users can be deleted from the Settings > Access > Local Users window.
When deleting a local user, DDMC provides the option to select another local user to own the deleted user's report templates, or
delete the report templates along with their owner. Report templates are re-assigned to sysadmin by default, but any local user
can be selected.
If the report templates are re-assigned, the report schedules are disabled by default until the email recipients for the report are
updated. Report templates can be updated from the Report Management window, or the Edit button on the Schedule tab.
Monitoring Systems 57
5
Managing DD Systems
Topics:
• Viewing DD System Manager
• Updating system software
• Local users
58 Managing DD Systems
3. Perform the DDOS update on the systems.
Steps
1. Select Infrastructure > Updates.
Two tabs are now available in the main window: Systems and Packages.
2. Select Packages.
3. Click ADD to add a software package.
After the update package has been uploaded to DDMC, you can update one or more systems.
NOTE: To delete a package, check the box next to a Package Name and click DELETE to remove that software
package.
Workaround: Use the CLI to upload the package into DDMC (for example, use SCP/PSCP from a Unix terminal or Windows
CMD).
Steps
1. Select Infrastructure > Updates.
Two tabs are now available in the main window: SYSTEMS and PACKAGES. SYSTEMS is selected automatically and a list
of systems available to update are displayed.
2. Select one or more systems to update.
If there was a precheck error, there is an option to run precheck manually from details panel after fixing any errors.
3. Click the Configure Update button.
NOTE: HA systems cannot be updated from DDMC. If one or more HA systems are selected, DDMC displays a message
stating that updates for HA systems are not supported.
4. Enter update schedule name, and select one of the options below.
● Download Package Only - Allows for predownloading an update package to the systems without installation.
● Install Update Only - Installation of previously downloaded update packages on systems.
NOTE: This option is only available for systems with successfully predownloaded packages.
● Download Package and Install Update - Allows for configuring both download and installation of an update package to
selected systems.
Managing DD Systems 59
Scheduling a software update
Distribution and installation of DD system RPM packages can be scheduled for any future date.
NOTE: Selected time and date for schedule is validated against browser time zone to determine if selection is a past date
or time. If it is deemed past date/time based on browser time , then the following warning message may display:
Warning: Time selected is in the past for one or more systems. Choose a time further in
the future to accommodate all system time zones.
Steps
1. Click Configure Update.
2. Type an Update Name.
3. Select Download Package Only, Install Update Only, or Download Package and Install Update.
● Download Package Only: Allows for pre-downloading an update package to the systems without installation
● Install Update Only: Installation of previously downloaded update packages on systems (This option is only available for
systems with successfully pre-downloaded packages. Update may trigger system reboot.)
● Download Package and Install Update: Allows for configuring both download and installation of an update package to
selected systems (Update may trigger system reboot.)
NOTE: Check the Compatibility Matrix before starting the update installation.
4. Click Next.
5. Select from the list of available systems for the configured update.
NOTE: Systems that are High-Availability (HA) or have an existing update schedule cannot be updated and do not
appear in the list of Available Systems.
6. Click Next.
7. Select the package to apply to the previously selected system or systems.
8. Click Next.
9. Select when to perform the downloads and update, Now or Later.
If Later is chosen, select whether to use the Individual System Time or the DDMC Time and schedule the specific date and
time.
10. Click Next.
11. Review the Summary, and if applicable, select Reboot before installation.
A system reboot allows the update to continue without any conflicts with background running processes and may be
required for some updates.
12. Click Finish.
60 Managing DD Systems
Local users
Local users are non-administrative users that can log into DDMC, but can only view systems specified by an administrator.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Local Users.
2. Click Add to create users.
These users can log in to DDMC, but cannot see any other systems. You can add permissions to view (user role), administer
(admin role or limited-admin), or take snapshots (backup operator) for groups and systems.
User groups have either admin or user roles; user roles can be admin, limited-admin, and user. If a user or a user group has
the admin role, they can view all DD systems by default; it is not necessary to set any other permissions for admin users and
groups.
3. Access Authentication to create access groups (NIS, Windows (using Workgroup or Active Directory), and LDAP) in
DDMC.
4. For users and user groups with the user role, you must set permissions on systems so they can view the systems. Select
Administration > Permissions.
5. Select Add (green plus sign).
6. In the Add Permissions dialog, select where to add the permission:
● Add permissions to systems – Select this option, and from the list of managed systems, select the checkboxes of the
systems where the permissions are to be assigned.
● Add permissions to groups – Select this option, and from the list of groups, select the checkboxes of the groups
where the permissions are to be assigned.
7. In the User area, select Add (green plus sign), select one or more users from the Select Users dialog, and select Select.
8. Click in the Role field for the user, and select the access role: Administrator, Limited-Admin, Backup Operator, or User.
9. Select Add (green plus sign).
The users are given the assigned role (Administrator, Limited-Admin, Backup Operator, or User) for the selected systems or
groups.
Next steps
To simplify the management of permissions:
● It is recommended that the use of the admin role for the DDMC be minimal.
○ The admin role can manage all Data Domain systems in the DDMC inventory. In addition, the admin for the DDMC
configures the DDMC properties and groups and assigns its permissions.
○ Configure most logins for DDMC with the user role.
● Use NIS user groups for permissions – this simplifies the process for adding, removing, and modifying users without
changing the permission assignment.
● Use DD System Groups for permissions rather than assigning permissions to individual systems.
By assigning permissions at the group level, policy-based permissions can be used with a union model that is applied to the
entire group hierarchy.
● Start with lower-level permissions at the top of the hierarchy:
○ Assign lower-level permissions toward the root of the Group hierarchy.
○ Assign higher-level permissions toward the leaf of the Group hierarchy.
○ Use a union model, not an override model. This makes it easy to change permissions at lower levels without affecting the
entire hierarchy.
Verify Changes:
● After assigning permissions or changing group membership, verify the change by looking at the Effective role for a system.
Managing DD Systems 61
Use Central Administration:
● Use DDMC to centrally administer all systems, reducing the use of local accounts on each managed system. Turn off direct
user interface access to systems that are managed by DDMC.
62 Managing DD Systems
6
Administering Secure Multitenancy
Topics:
• How DDMC helps with SMT monitoring
• Creating and managing Tenants
• Creating and managing Tenant Units
• Creating, editing, and generating SMT reports
NOTE: Secure multitenancy is not supported on DDVE 2.0 instances, but it is supported on DDVE 3.0 and later.
MTrees
MTrees are logical partitions of the file system and offer the highest degree of management granularity, meaning users can
perform operations on a specific MTree without affecting the entire file system. MTrees are assigned to Tenant Units and
contain that Tenant Unit's individualized settings for managing and monitoring SMT.
Multi-Tenancy
Multi-Tenancy refers to the hosting of an IT infrastructure by an internal IT department, or an external service provider, for
more than one consumer/workload (business unit/department/Tenant) simultaneously. DD SMT enables Data Protection-as-a-
Service.
Storage Unit
A Storage Unit is an MTree configured for the DD Boost protocol. Data isolation is achieved by creating a Storage Unit and
assigning it to a DD Boost user. The DD Boost protocol permits access only to Storage Units assigned to DD Boost users
connected to the system.
Tenant
A Tenant is a consumer (business unit/department/customer) who maintains a persistent presence in a hosted environment.
Tenant Self-Service
Tenant Self-Service is a method of letting a Tenant log in to a protection system to perform some basic services (view MTrees
or storage units that belong to the tenant unit, or change the tenant's own password). This reduces the bottleneck of always
having to go through an administrator for these basic tasks. The Tenant can access only their assigned Tenant Units. Tenant
Users and Tenant Admins will, of course, have different privileges.
Tenant Unit
A Tenant Unit is the partition of a system that serves as the unit of administrative isolation between Tenants. Tenant units that
are assigned to a tenant can be on the same or different systems and are secured and logically isolated from each other, which
ensures security and isolation of the control path when running multiple Tenants simultaneously on the shared infrastructure.
Tenant Units can contain one or more MTrees, which hold all configuration elements that are needed in a multi-tenancy setup.
Users, management-groups, notification-groups, and other configuration elements are part of a Tenant Unit.
admin role
A user with an admin role can perform all administrative operations on a protection system. An admin can also perform all SMT
administrative operations on the system, including setting up SMT, assigning SMT user roles, enabling tenant self-service mode,
creating a tenant, and so on. In the context of SMT, the admin is typically referred to as the landlord. In DDOS, the role is
known as the sysadmin.
To have permission to edit or delete a tenant, you must be both a DDMC admin and a DDOS sysadmin on all systems that are
associated with the tenant units of that tenant. If the tenant does not have any tenant units, you need only to be a DDMC
admin to edit or delete that tenant.
limited-admin role
A user with a limited-admin role can perform all administrative operations on a system as the admin. However, users with the
limited-admin role cannot delete or destroy MTrees. In DDOS, there is an equivalent limited-admin role.
tenant-admin role
A user with a tenant-admin role can perform certain tasks only when tenant self-service mode is enabled for a specific tenant
unit. Responsibilities include scheduling and running a backup application for the tenant and monitoring resources and statistics
within the assigned tenant unit. The tenant-admin can view audit logs, but RBAC ensures that only audit logs from the tenant
units belonging to the tenant-admin are accessible. In addition, tenant-admins ensure administrative separation when tenant
self-service mode is enabled. In the context of SMT, the tenant-admin is referred to as the backup admin.
tenant-user role
A user with a tenant-user role can monitor the performance and usage of SMT components only on tenant unit(s) assigned to
them and only when tenant self-service is enabled, but a user with this role cannot view audit logs for their assigned tenant
units. Also, tenant-users may run the show and list commands.
none role
A user with a role of none is not allowed to perform any operations on a system other than changing their password and
accessing data using DD Boost. However, after SMT is enabled, the admin can select a user with a none role from the
system and assign them an SMT-specific role of tenant-admin or tenant-user. Then, that user can perform operations on SMT
management objects.
management groups
BSPs (backup service providers) can use management groups defined in a single, external AD (active directory) or NIS (network
information service) to simplify managing user roles on tenant units. Each BSP tenant may be a separate, external company and
may use a name-service such as AD or NIS.
With SMT management groups, the AD and NIS servers are set up and configured by the admin in the same way as SMT local
users. The admin can ask their AD or NIS administrator to create and populate the group. The admin then assigns an SMT role
to the entire group. Any user within the group who logs in to the system is logged in with the role that is assigned to the group.
When users leave or join a tenant company, they can be removed or added to the group by the AD or NIS administrator. It is not
necessary to modify the RBAC configuration on a system when users who are part of the group are added or removed.
Table 11. Permission table for tenants and tenant units, DDMC admin and limit-admin
DDMC user/DDOS role DDMC admin/DDOS DDMC limited-admin/DDOS
sysadmin sysadmin
Tenant
Create Tenant yes yes
Edit/delete Tenant with no Tenant Units yes yes
Delete/destroy MTree yes no
Edit/delete Tenant with Tenant Units a yes yes
View all Tenants defined in DDMC yes yes
Display issue with Tenant Units for Tenant in summary page yes yes
View Tenant Details lightbox yes yes
View MTree configuration issues for Tenant in summary page yes yes
Tenant Unit
See system for selection in the Create Tenant Unit Wizard yes yes
Edit and delete Tenant Unit yes yes
View Tenant Units that are associated with systems listed in yes yes
inventory page
Edit/delete unmanaged Tenant Unit yes yes
Assign/unassign Tenant Unit to/from Tenant yes yes
View Tenant Unit Details lightbox yes yes
a. DDMC admin or limited-admin must have DDOS sysadmin or limited-admin role on all DD systems that host the Tenant's
Tenant Units.
Table 12. Permission table for Tenants and Tenant Units, DDMC user
DDMC user/DDOS role DDMC user/DDOS DDMC user/DDOS user DDMC user/no DDOS
sysadmin or limited- or backup operator role
admin
Tenant
Create Tenant no no no
Edit/delete Tenant with no Tenant no no no
Units
Delete/destroy MTree no no no
Edit/delete Tenant with Tenant Units no no no
View all Tenants defined in DDMC yes yes yes
Display issue with Tenant Units for yes yes no
Tenant in summary page *
View Tenant Details lightbox * yes yes no
View MTree configuration issues for yes yes no
Tenant in summary page *
Tenant Unit
* For DDMC users, only aggregate/show the Tenant's Tenant Units on system for which the DDMC user has a DDOS role
(sysadmin, limited-admin, user or backup operator)
Local backup
In a local backup use case, a protection storage infrastructure is shared across clients, and deployment is local to the enterprise.
The on-premises IT staff uses each Tenant Unit to back up the data of a specific business unit.
Replicated backup
In a replicated backup use case, the tenant performs local backups at their physical site, but does not want to own or manage a
remote site for disaster recovery purposes. For this type of tenant, service providers can host multiple tenants, each replicating
to their own Tenant Unit, to provide replicated backup services on a shared Data Domain backup appliance platform.
Remote backup
In a remote backup use case, a client does not perform local backups at the physical site. Instead, the client performs direct
backups over the WAN to a hosted backup IT environment managed by a service provider or a hosted provider. Remote backup
is used for traditional client-based backup and application-direct backup.
Controls
In the upper left are controls to Add (green +), Edit (yellow pencil), Delete (red X) Tenants, and a Tenant (Unit) Details (blue i)
icon that displays the Tenant (Unit) Details Lightbox (depending on what is selected). You can also right-click each node in the
tree to perform these functions. RBAC (role-based access control) controls all of these actions.
Summary area
At the right is a summary.
When All Tenants is selected, the summary shows the total number of Tenants, Tenant Units, and host systems. You can see if
any of the Tenants or Tenant Units are offline or have configuration problems in different severity panels. You can also see the
number of unassigned Tenant Units.
When you select a Tenant or Tenant Unit, the summary includes (depending on the item) the name, status, administrator name
and email, host systems, data center location, alerts, and MTree and storage information, DD Boost Users, Tenant Self-Service
information, and Report schedule and recipients.
Configuration problems
Tenants can be configured directly on Data Domain and PowerProtect systems. This may lead to Tenant name and ID conflicts
when these systems are managed by DDMC. DDMC lets you resolve Tenant conflicts by either consolidating the Tenants into
one or separating the Tenants with unique names and IDs.
Creating Tenants
You can create Tenants from the Multi-Tenancy page.
Steps
1. Select Administration > Multitenancy.
2. Select All Tenants in the tree, and select Add Tenant (green plus sign) above the tree.
3. In the Create Tenant dialog box, type the following information:
● For Tenant name [which is required, as indicated by the asterisk (*)], you can use the name of the client or organization
that will use the storage. For example, if you are a service provider, the name might be XYZ Widget Corp. If you are a
storage administrator for an organization, the name might be Finance Department.
● For Administrator name (which is optional), type the name of the backup administrator.
Results
The new Tenant appears in the tree.
Steps
1. Select Administration > Multitenancy.
2. Highlight All Tenants to see an overview of the configured Tenants, important messages, and the status of multitenant
reporting.
3. Highlight a specific Tenant to see the backup administrator's name and email address, important messages about the Tenant
Units for this Tenant, and information about reports for this Tenant.
4. For much more detail about the Tenant, select Tenant Details (the blue i), above the list of Tenants, to see all of the
available information about the Tenant. The Tenant Details lightbox is described in the next section.
Steps
1. Select Administration > Multitenancy.
2. In the tree, select the Tenant that you want to update, and select Edit Tenant (yellow pencil) above the tree.
3. In the Edit Tenant dialog, edit what you need to change, and select Save.
Results
The edited Tenant will again be displayed in the tree.
Deleting Tenants
When you no longer need to provide storage for an organization, you can delete the Tenant that corresponds to that
organization.
Steps
1. Select Administration > Multitenancy.
2. Highlight the Tenant in the tree, and select Delete Tenant (red X) above the tree.
3. In the Delete Tenant dialog box, you have two options:
● Remove all Tenant Units, which will preserve the data, so that the Tenant Unit may be assigned to another Tenant.
The Tenant Units will be moved to the Unmanaged Tenant Unit pool and will retain all MTrees/Storage Units associated
with them.
● Destroy all Tenant Units, which will destroy all of the Tenant Units and any MTrees and Storage Units associated with
them.
4. Select Yes.
NOTE: Deleting a Tenant cannot be undone from DDMC, so be very careful when performing this task.
Results
The Tenant has been deleted from the tree.
What to do if delete Tenant fails
When you try to delete a Tenant, the operation may fail for a variety of reasons.
First, go to the Health > Jobs page, select the failed job, and observe the reason for the failure, which may include:
● The file system of one or more of the Data Domain or PowerProtect systems under the Tenant is turned off.
● Some of the Data Domain systems under the Tenant are not reachable or are powered off.
● The DD Boost feature of one or more of the systems under the Tenant is disabled or is not licensed.
You can manually fix these problems using both the DD System Manager and the DDMC command line interfaces (you need to
fix them in both places, as they are Data Domain system-related). Then, you can try to delete the Tenant again using DDMC.
Prerequisites
Storage for a Tenant is contained within a virtual partition that is called a Tenant Unit on a DD system. To assign storage to a
Tenant, you can use the Create Tenant Unit Wizard to create the Tenant Unit, provision storage, and assign the Tenant Unit to
a Tenant. You can also create an empty Tenant Unit for a Tenant and provision storage later.
Select Administration > Multitenancy. Then select a Tenant, and the Add (green +) control.
You have three choices when creating a Tenant Unit:
● Create a Tenant Unit with manual provisioning storage, where you create or select the MTrees and Storage Units that
are associated with this Tenant Unit. You can also optionally create DD Boost Data Access users to go with the Storage
Units.
● Create a Tenant Unit with automatic provisioning storage, where you can add new or existing DD Boost Data Access
users to this Tenant Unit. This allows backup software to create Storage Units that are assigned to this Tenant Unit.
● Create an empty Tenant Unit, where you can provision the Tenant Unit later using the Edit Tenant Unit dialog box.
Steps
1. On the first page of the wizard, Identify Host System:
● For Datacenter location (which is optional), select a location. These locations (for example: Dallas, New York) must
have been entered previously as Data Center location properties. (Administration > Properties > Data Center)
● For Size now (GiB) (which is optional), type a number to filter systems that do not have sufficient storage capacity.
● For Size to grow (GiB) (which is optional), type a number to filter systems that will not have sufficient capacity at a
specified time in the future (set in the next field, "Time to grow"), based on capacity projections. The size to grow is the
size to grow to by the specified time. For example, for a specified time of 6 months, if the size now is 1 GiB, and the size
to grow is 2 GiB, in 6 months, the minimum capacity requirement would be 2 GiB.
● For Time to grow (which is optional), type the time after which the "Size to grow" amount of capacity should be
reached.
2. On the second page of the wizard, Select Host System, you see systems that have enough logical capacity to host the
Tenant Unit:
How do I check host system performance? Use the following information to determine the best system on which to
create the Tenant Unit.
● Available now indicates systems that you can select now.
● Available in 6 months is displayed if you selected 6 months in the "Time to grow" field on the previous page, or did
not explicitly select a value. Available in 12 months, Available in 18 months, or Available in 24 months is displayed
if you selected those values in "Time to grow". For example, for a specified time of 6 months, if the size now is 1 GiB,
and the size to grow is 2 GiB, in 6 months, the minimum capacity requirement would be 2 GiB. Any system that has a
lower projected capacity is filtered from the list. Also, any system offline at the time, as well as any collection destination
system, is filtered from the list. Only systems running DDOS 5.6 or later are listed.
● Existing Tenant Units displays the current number of Tenant Units on this system.
● For systems with an information (blue i) control, you can hover to see a warning message explaining why a projection
cannot be made.
● If a system is not listed, it may be because it:
○ is not in the specified data center.
○ is offline.
○ is running DDOS 5.6 or earlier.
○ has insufficient capacity.
○ has a replication destination.
○ is a system for which you do not have administrative privileges.
4. The fourth page of the wizard depends on the previous choice. [Note that for "Create an empty Tenant Unit", you skip to
the final page (step 5).]
a. For manual provisioning, you can create MTrees/Storage Units.
● MTrees/Storage Units can be added here, when creating a Tenant Unit with Manual Provisioning. You can also add
then when editing a Tenant Unit.
● You can add new MTrees or Storage Units, or select from the Existing MTrees or Storage Units on the host system.
● You can also edit, unassign, or destroy MTrees or Storage Units from the same area.
● If an MTree or Storage Unit selection is disallowed, you can hover the hover over it, to see more information.
b. For automatic provisioning, you can configure users for data access over the DD Boost protocol.
● You can add an existing local user or create a new local user and promote the local user to DD Boost user.
● You can delete the selected DD Boost User.
● The table contains DD Boost Data Access User names and the Storage Units count associated with the user.
● The information panel shows when one or more users are selected.
● The configuration is not changed until you select Create on the Summary page.
● If there are one or more local users in the list, the first local user in the list is selected by default. If there are no
local users in the list, the "New local user "is selected. All selected users or newly created users will automatically be
default Tenant Units.
● A warning shows if the current selected local user already has another Tenant Unit as their default Tenant Unit.
● The first entry in the "Local user" drop-down list is "New local user", which lets you create a new local user and add it
as a DD Boost Data Access user.
● When selecting " New local user", the Add Data Access User dialog box changes to a Add New Data Access User
form.
5. The fifth (final) page (fourth page for "Create an empty Tenant Unit") of the wizard is a Summary, showing data from the
previous pages.
● The Tenant Unit is not created until you select Create.
● You have the option to send an email to the Tenant Unit administrator on the successful creation of the Tenant Unit.
● Creating a Tenant Unit with any sort of provisioning (not empty) automatically generates a pair of Report Templates
(Status and Usage) and schedule them.
● You may get one of two warnings: (1) You have not provisioned this Tenant Unit correctly. Add MTrees or Storage. (2)
You have not provisioned this Tenant Unit correctly. Make this Tenant Unit the Default Tenant Unit for one of the DD
Boost Data Access Users.
Results
The newly created Tenant Unit is added to the tree.
What to do if create Tenant Unit fails
Creating a Tenant Unit may fail for several reasons.
It may fail for simple reasons such as a duplicate Tenant Unit name, or it may fail if there are sudden system state changes, such
as a network/connectivity issue.
Steps
1. Select Administration > Multitenancy.
2. Select a Tenant Unit in the tree to view a summary page and critical alerts.
3. For more detail about the Tenant Unit, select Tenant Unit Details (the blue i), above the tree, to see all of the available
information about the Tenant Unit. The Tenant Unit Details lightbox is described in the next section.
Steps
1. Select Administration > Multitenancy.
2. Select the Tenant Unit in the tree, and select Edit Tenant Unit (yellow pencil) above the tree.
3. The Edit Tenant Unit dialog has the following tabs: General, Alert Notifications, DDBoost Streams, MTrees, Data Access
Users, and Tenant Self-Service, which are described in the following sections.
Steps
1. Select Administration > Multitenancy.
2. Select a Tenant Unit in the tree, and select Edit Tenant Unit (yellow pencil) above the tree.
3. In the General tab, you can change the following:
● Tenant Unit name
● Administrator name
● Administrator email – If the administrator email is modified, report templates sending reports that are associated with the
Tenant Unit to that administrator must be re-routed. After editing the administrator email, a popup appears confirming
whether a change must be made for all report templates that are associated with the old email. If you select Yes, all old
administrator email messages are replaced with the new value.
● Security Mode – You can choose to enable strict security mode, which assures that any incoming replication is from
another Tenant Unit that is owned by the same Tenant. In addition, this mode must be enabled to allow management
connections to or from assigned IPs.
● Management IP Addresses – You can add or delete management IP addresses for remote client addresses or local DDMC
addresses.
Steps
1. Select Administration > Multitenancy.
Steps
1. Select Administration > Multitenancy.
2. Select a Tenant Unit in the tree, and select Edit Tenant Unit (yellow pencil) above the tree.
3. In the Data Access Users tab, add, edit, or delete users. New Data Access users are assigned the role of none. If a user has
already been created with a role other than none, that user is disabled and can only be deleted from the table. Also, if a user
has already been associated with multiple Tenants, that user is disabled and can only be deleted from the table. Password
validation for a new local user is based on the DD OS password policy strength that is associated with the current Tenant
Unit.
4. The columns indicate:
● MTrees Accessed - The combined total of Storage Units and vDisk Pools.
● MTree Type - Supported types are Storage Unit and vDisk Pool. If a user is not associated with an MTree's access, the
MTree type is None.
5. Select SAVE to save your changes.
Steps
1. Select Administration > Multitenancy.
2. Highlight a Tenant Unit in the tree, and select Edit Tenant Unit (yellow pencil) above the tree.
3. In the DD Boost Streams tab, view the Storage Units associated with this Tenant Unit.
4. If you want to set limits for a Storage Unit, select that unit, and then select Set Limits.
Steps
1. Select Set Limits from the DDBoost Streams tab of the Edit Tenant Unit dialog [which you can get to by selecting
Administration > Multi-Tenancy, then selecting a Tenant Unit and Edit Tenant Unit (yellow pencil)].
2. In the Set DDBoost Stream Limits dialog, enter values for the Read, Write, Replication, and Combined stream limits. Do not
exceed the DD system limits. Also note that a single value cannot be larger than the combined limit.
For hard limits there are two additional validation rules:
● The combined limit is also no greater than the sum of the other hard limits (if it is, you will hit one of the other limits first
and never the combined limit).
● The combined limit is less than the maximum individual hard limit (if it is, you will never hit that individual limit, that is, you
will always hit the combined limit first).
3. If the limits are surpassed, an alert will be generated by the system.
4. Select Set.
Steps
1. Select Administration > Multitenancy.
2. Highlight a Tenant Unit in the tree, and select Edit Tenant Unit (yellow pencil) above the tree.
3. In the MTrees tab, add, edit, or delete MTrees, Storage Units, vDisk Pools, and VTL Pools, as desired.
NOTE: vDisks with double agent data access users (that is, users associated with another Tenant) or users with a role
other than none cannot be associated with the Tenant Unit.
4. If capacity quota is enabled on the host system, you may edit soft and hard quotas.
Prerequisites
The host system quotas must have already been enabled.
Steps
1. Select Administration > Multitenancy.
2. Check the Tenant Unit in the tree, and select Edit Tenant Unit (yellow pencil) above the tree.
3. In the MTrees tab, highlight a Storage Unit or MTree in the list, and select Edit (yellow pencil).
4. Set the desired quota values in the Edit MTree or Edit Storage Unit dialog, and select ADD.
5. Select SAVE to save your changes.
Next steps
You can also enable or disable quotas on the host system by:
1. Launch the DD System Manager for the specific Data Domain or PowerProtect system from DDMC.
2. Select Data Management > Quota tab.
3. Enable or disable quotas, as needed.
You can also enable or disable quotas using the CLI. See the DD OS Command Reference Guide.
Steps
1. Select Administration > Multitenancy.
2. Select a Tenant Unit in the tree, and select Edit Tenant Unit (yellow pencil) above the tree.
3. In the Tenant Self-Service tab, you must first enable Tenant Self-Service. (It is disabled by default.)
4. In this table:
Steps
1. Select Administration > Multitenancy.
2. Select a Tenant Unit in the tree, and select Delete Tenant Unit (red X) above the tree.
3. In the Delete Tenant Unit dialog, if the Tenant Unit has provisioned storage, you have two options:
● Unassign all storage, which retains all MTrees and Storage Units that are associated with the Tenant Unit, so they can
be reassigned later to another Tenant Unit.
● Destroy all storage, which deletes all MTrees and Storage Units that are associated with the Tenant Unit.
4. Select YES to delete the Tenant Unit.
5. Observe that the Tenant Unit has been deleted from the tree.
What to do if delete Tenant Unit fails
When you try to delete a Tenant Unit, the operation may fail for various reasons.
First, go to the Health > Jobs page, select the failed job, and observe the reason for the failure, which may include:
● The file system of the system on which the Tenant Unit resides is turned off.
● The DD system on which the Tenant Unit resides is not reachable or is powered off.
● The DD Boost feature of the system on which the Tenant Unit resides is disabled or is not licensed.
You can manually fix these problems using both the DD System Manager and the DDMC command line interfaces (you must
fix them in both places, as they are system-related). Then, you can try to delete the Tenant Unit again using DDMC.
Steps
1. Select Administration > Multitenancy.
2. Select the Unmanaged node in the tree. A table is displayed on the right, which contains all unmanaged Tenant Units and the
host systems on which they reside.
3. To add all unmanaged Tenant Units to a Tenant, right-click the Unmanaged node, and select Add all to Tenant. In the Add
(All) Tenant Units dialog, select the Tenant name, and select Add.
4. If you want to add only a specific Tenant Unit or Units to a Tenant, go back to the table to select the checkbox or
checkboxes next to them. Or to select a single Tenant Unit, and see a summary about it, you can expand the Unmanaged
list (if it is not already expanded), and select a single Tenant Unit.
Next steps
You may encounter a potential conflict when trying to assign a Tenant Unit.
Suppose you have a DD Boost user, or Tenant self-service user, configured under a current unmanaged Tenant Unit. If the
same user is configured to the managed Tenant Unit of Tenant T2, but you want to assign the Tenant Unit to Tenant T1, this is
considered a conflict and is not allowed.
Table 13. Permission table for Tenants and Tenant Units, DDMC admin and limit-admin
DDMC user/DD OS role DDMC admin/DD OS sysadmin DDMC limited-admin/DD OS sysadmin
Report Template
View all report templates yes yes
View Tenant report configuration yes yes
information in summary page
View Tenant Unit report yes yes
configuration information in
summary page
Create Auto Tenant report template yes yes
Create Auto Tenant Unit report yes yes
template
Create Manual Tenant report yes yes
template
Create Manual Tenant Unit report yes yes
template
Maintain and tag SMT report yes yes
template configuration
Delete/destroy MTree-related yes no
reports
Table 14. Permission table for Tenants and Tenant Units, DDMC user
DDMC user/DD OS role DDMC user/DD OS DDMC user/DD OS user or DDMC user/no DD OS role
sysadmin backup operator
Report Template
View all report templates a no no no
View Tenant report no no no
configuration information in
summary page b
a. DDMC user can view only templates or reports that they created.
b. Only DDMC admin should be allowed to create Tenant report template.
c. DDMC user is not allowed to manually create a Tenant report template.
d. If the reports of a DDMC user are deleted, that user is warned, and the reports are re-created and tagged for that user
only.
Steps
1. Select Reports > Management.
2. Select Add (green plus sign).
3. In the Add Report Template dialog box, select Multitenancy Reports and select Next.
4. Type a name, and select a template. The template choices are Daily Status or Usage Metrics. Choose one or more
Sections to include, and select Next.
5. Select a Scope (Tenant Unit or Tenant). The Daily Status report is always configured to show the last 24 hours of
historical data, and you can select the Report retention (Forever, 7 days, 30 days, 90 days). The Usage Metrics report
(which is generated as an Excel spreadsheet) lets you display data for a full month or a full week. Select Edit to set a
schedule for the frequency and time the report is run. Report generation time is two hours ahead of Starts On time.
6. For the Tenant Unit report template, the Tenant Unit admin email messages are added by default. For the Tenant report
template, the Tenant admin email is added by default. You can manually add or remove these email messages.
7. Review the details, and select whether to save the template for later use and/or to run the report immediately. Select
Finish.
Results
After it has been created, a Multi-Tenancy report template is added as an entry in the reports table. When selected, the
template can be used to immediately run a report, or it can be edited or deleted, or the time it was last run can be displayed.
Steps
1. Select Reports > Management.
2. Select a template, and select Edit (yellow pencil). In the Edit Report dialog, you can select from four tabs.
3. In the CONTENT tab, the template name can be renamed and template sections can be re-selected for the report. The
template itself is not editable.
4. In the SCOPE and SCHEDULE tabs, the template scope and schedule can be changed. The report template can be changed
from a Tenant report to a Tenant Unit report or from a Tenant Unit report to a Tenant report. For the daily status report
template, the schedule can be changed only to daily time. For the usage report template, the time span can be weekly or
monthly. If time span is weekly, only weekly can be scheduled for start on time, and if time span is monthly, only monthly
can be scheduled for start on time. Both daily status and usage report templates can modify the report retention period
(Forever, 7 days, 30 days, 90 days).
5. In the EMAIL tab, email messages can be manually added or removed from the When report is finished list or/and from the If
an error occurs list.
6. Select APPLY and/or OK.
Steps
1. Select Reports > Management.
2. Select a report template from the list.
3. Select Run Report.
Results
A report (named by concatenating the datestamp to the template title) is created and opened as a PDF file in the browser,
except for the Tenant Usage report, which is generated as an Excel file.
The report generation information is listed in the Report History table, where it can be viewed, renamed, or deleted.
Related concepts
Configuring network interfaces on page 84
Configuring routes on page 88
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select one of the options under Network.
2. View the network settings (described in the following table), and use the add, edit, or delete button to change the
configuration.
Related concepts
Managing a domain search list on page 88
Mapping hosts on page 86
Configuring DNS settings on page 87
Related tasks
Configuring hosts on page 85
Related concepts
Configuring network settings on page 83
Configuring routes on page 88
00:02:b3:b0:8a:d2
Configuring hosts
Both the host name and domain name are used by other systems when they want to access DDMC. The host name can be set
manually or automatically generated with DHCP.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Network > Hosts.
2. Select how you want to set the host and domain names:
● Obtain Settings using DHCP.
● Manually.
Related concepts
Managing a domain search list on page 88
Mapping hosts on page 86
Configuring DNS settings on page 87
Related tasks
Viewing network settings on page 83
Mapping hosts
Use the Hosts Mapping area to add a mapping that ties an IP address to a hostname.
Mapping Hosts is required when DNS is not configured. DNS maps a device's name with its IP address. If DDMC is not
configured in DNS (and if the systems are not configured to use DNS), then host mapping is required.
Related concepts
Managing a domain search list on page 88
Configuring DNS settings on page 87
Related tasks
Viewing network settings on page 83
Configuring hosts on page 85
Steps
1. Select ADD in the Host Mapping area to create a host mapping.
2. If no hosts are listed in the Host Name list, select the add (+) button.
3. In the Add Host dialog, enter an IP address and one or more host names that will be used for the mapping.
The new hostname is added to the list of Host Names. Continue to add host names as necessary.
4. Select ADD.
The mapping is created, and you are returned to the Hosts page.
Related tasks
Deleting a host name mapping on page 86
Steps
1. In the Mapping table, select the rows you want to delete.
2. Click the Delete button above the Mapping table.
Related tasks
Adding a host name mapping on page 86
Related concepts
Managing a domain search list on page 88
Mapping hosts on page 86
Related tasks
Viewing network settings on page 83
Configuring hosts on page 85
Steps
1. Determine the method for obtaining the DNS. Choose to either:
● Obtain DNS Settings using DHCP. (At least one interface must be configured using DHCP.)
● Manually configure DNS:
a. Select the plus (+) button.
b. Enter the DNS IP address.
2. Select APPLY to save changes.
Related tasks
Deleting a DNS IP address on page 87
Steps
1. Select the one or more rows from the table listing.
2. Click the Delete (X) button on the DNS IP address in the table to be deleted.
3. Select Apply to save changes.
Related tasks
Adding a DNS IP address on page 87
Related concepts
Mapping hosts on page 86
Configuring DNS settings on page 87
Related tasks
Viewing network settings on page 83
Configuring hosts on page 85
Steps
1. Click the Add button (+) next to "Search domain names".
2. Enter a name in the "Search domain" text box.
3. Select Add.
Results
You should be returned to the DNS page with the newly added Search Domain added to the list.
Related tasks
Removing a search domain on page 88
Steps
1. Select the search domains to delete from the "Search domain names" list.
2. Click the Delete button (X) above the table.
3. Select Apply.
Results
Changes are applied to the system.
Related tasks
Adding a search domain on page 88
Configuring routes
Routes determine the path taken to transfer data to and from the local host (DDMC) to another network or host.
DDMC does not generate or respond to any of the network routing management protocols (RIP, EGRP/EIGRP, and BGP). The
only routing implemented on DDMC is based on the internal route table, where the administrator may define a specific network
or subnet used by a physical interface (or interface group).
DDMC uses source-based routing, which means outbound network packets that match the subnet of multiple interfaces will be
routed over the physical interface from which they originated.
Related concepts
Configuring network interfaces on page 84
Configuring network settings on page 83
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Network > Routes.
2. On the Routes page, view the configured static and dynamic routes (described in the following table), and create or modify
routing information.
Metric Distance to target (usually counted in hops). (It is not used by the DD OS, but might be
needed by routing daemons.)
MTU Maximum Transfer Unit (MTU) size for physical (Ethernet) interface.
Window Default window size for TCP connections over this route.
IRTT Initial RTT (Round Trip Time). The kernel uses this to estimate the best TCP protocol
parameters without waiting on (possibly slow) answers.
Interface Interface name associated with routing interface.
Steps
1. The Default IPv4 Gateway or the Default IPv6 Gateway can be set using the DHCP value or a manually configured gateway.
a. Use DHCP value: indicates that you want to use the DHCP (Dynamic Host Configuration Protocol) server value.
b. Manually Configure Indicates that you want to manually configure the gateway address and enables the Gateway box,
into which you should enter the gateway address. Changing the mode from DHCP to Manual will provide a text box for
you to specify the default gateway.
2. Click Apply to save the changes.
Related tasks
Viewing route information on page 89
Creating static routes on page 90
Deleting static routes on page 90
Steps
1. Select ADD in the Static Routes action table to create a route.
2. In the Add Static routes dialog box, select an interface.
3. Specify the Destination by selecting one of the following:
● Network – Type the network IP address and netmask.
NOTE: This is not the IP address of the interface.
● Host – Type the hostname or IP address of the destination host of the route.
4. Optionally, type a new gateway address in the Gateway box.
5. Select Add to close the dialog box and save changes.
The new route is now added to the Static Routes table in the Routes page.
Related tasks
Viewing route information on page 89
Setting the default IPv4 or IPv6 gateway address on page 90
Deleting static routes on page 90
Steps
1. In the Route Spec area, select the route specification to delete.
Related tasks
Viewing route information on page 89
Setting the default IPv4 or IPv6 gateway address on page 90
Creating static routes on page 90
Related tasks
Configuring mail server settings on page 117
Configuring time and date settings on page 116
Configuring system properties on page 117
Related concepts
Managing SNMP V3 users on page 94
Managing SNMP V3 and V2C trap hosts on page 95
Managing SNMP V2C communities on page 96
Related tasks
Enabling or disabling SNMP on page 93
Downloading the SNMP MiB on page 93
Configuring SNMP properties on page 93
Steps
1. In the Status area, select Enable to use SNMP.
2. In the Status area, select Disable to stop using SNMP.
3. Click Apply to save changes.
Related concepts
Checking SNMP status and configuration on page 91
Managing SNMP V3 users on page 94
Managing SNMP V3 and V2C trap hosts on page 95
Managing SNMP V2C communities on page 96
Related tasks
Downloading the SNMP MiB on page 93
Configuring SNMP properties on page 93
Related concepts
Checking SNMP status and configuration on page 91
Managing SNMP V3 users on page 94
Managing SNMP V3 and V2C trap hosts on page 95
Managing SNMP V2C communities on page 96
Related tasks
Enabling or disabling SNMP on page 93
Configuring SNMP properties on page 93
Steps
1. In the SNMP text fields, add an SNMP system location (a description of where DDMC is located) and/or an SNMP system
contact (for example, the email address of the system administrator for DDMC).
2. Click Apply to save changes.
Related concepts
Checking SNMP status and configuration on page 91
Managing SNMP V3 users on page 94
Managing SNMP V3 and V2C trap hosts on page 95
Managing SNMP V2C communities on page 96
Related concepts
Checking SNMP status and configuration on page 91
Managing SNMP V3 and V2C trap hosts on page 95
Managing SNMP V2C communities on page 96
Related tasks
Enabling or disabling SNMP on page 93
Downloading the SNMP MiB on page 93
Configuring SNMP properties on page 93
Steps
1. In the V3 Configuration Users area, select ADD.
2. In the Name text field, enter the name of the user or the SNMP manager who will have access to the agent for DDMC. The
name must be a minimum of 8 characters.
3. Select either read-only or read-write access for this user.
4. To authenticate the user, select the checkbox for Authentication.
a. Select either the MD5 or the SHA1 protocol.
b. Enter the authentication key in the Key text field.
c. To provide encryption to the authentication session, select the checkbox next to Privacy.
d. Select either the AES or the DES protocol.
e. Enter the encryption key in the Key text field.
5. Select APPLY.
The newly added user account appears in the SNMP V3 Users table.
Related tasks
Modifying SNMP V3 users on page 94
Removing SNMP V3 users on page 95
Steps
1. In the Action table under the V3 Configuration section on the SNMP Settings page, select EDIT.
2. Select either read-only or read-write access for this user.
3. To authenticate the user, select the checkbox for Authentication.
a. Select either the MD5 or the SHA1 protocol.
b. Enter the authentication key in the Key text field.
c. To provide encryption to the authentication session, select the checkbox next to Privacy.
Related tasks
Creating SNMP V3 users on page 94
Removing SNMP V3 users on page 95
Steps
1. In the Action table under the V3 Configuration section on the SNMP Settings page, select DELETE.
2. Verify the user name to be deleted, and select APPLY.
NOTE: If the DELETE button is disabled, the selected user is being used by one or more trap hosts. Delete the trap
hosts, and then delete the user.
Related tasks
Creating SNMP V3 users on page 94
Modifying SNMP V3 users on page 94
Related concepts
Checking SNMP status and configuration on page 91
Managing SNMP V3 users on page 94
Managing SNMP V2C communities on page 96
Related tasks
Enabling or disabling SNMP on page 93
Downloading the SNMP MiB on page 93
Configuring SNMP properties on page 93
Steps
1. In the SNMP V3 Trap Hosts or SNMP V2C Trap Hosts area, select ADD.
2. In the Host text field, enter the IP address or domain name of the SNMP Host where traps will be sent.
3. In the Port text field, enter the port number for sending traps (port 162 is commonly used).
4. Select the user (SNMP V3) or the community (SNMP V2C) from the drop-down menu.
Alternately, from the drop-down menu select Create New User (SNMP V3) to add an SNMP user, or Create New
Community (SNMP V2C) to add an SNMP community.
Related tasks
Modifying SNMP V3 and V2C trap hosts on page 96
Removing SNMP V3 and V2C trap hosts on page 96
Steps
1. In the Trap Hosts area (either for V3 or V2C), select a Trap Host entry and select Edit.
The Edit SNMP [V3 or V2C] Trap Hosts dialog appears. Modify any of the following items.
2. In the Port text field, enter the port number for sending traps (port 162 is commonly used).
3. Select the user (SNMP V3) or the community (SNMP V2C) from the drop-down menu.
4. Select Apply.
Related tasks
Creating SNMP V3 and V2C trap hosts on page 95
Removing SNMP V3 and V2C trap hosts on page 96
Steps
1. In the Trap Hosts area (either for V3 or V2C), select a trap host entry, and select Delete.
2. Verify the host name to be deleted, and select Apply.
The trap host entry is removed from the Trap Hosts table.
Related tasks
Creating SNMP V3 and V2C trap hosts on page 95
Modifying SNMP V3 and V2C trap hosts on page 96
Related concepts
Checking SNMP status and configuration on page 91
Managing SNMP V3 users on page 94
Managing SNMP V3 and V2C trap hosts on page 95
Related tasks
Enabling or disabling SNMP on page 93
Downloading the SNMP MiB on page 93
Configuring SNMP properties on page 93
Steps
1. In the Communities area, select ADD.
The Add V2C Community dialog appears.
2. In the Community text field, enter the community name of the SNMP manager who will have access to the agent for DDMC.
The community name must be a minimum of 8 characters.
3. Select either read-only or read-write access for this community.
4. In the Hosts area, select the checkbox of a host in the list, or:
a. Select + to add a host.
b. Type the IP address or domain name of the host in the Hosts test field.
The Host is added to the host list.
5. Select ADD.
The new community entry appears in the Communities table.
Related tasks
Modifying SNMP V2C communities on page 97
Deleting SNMP V2C communities on page 97
Steps
1. In the Communities area, select the community, and select EDIT.
The Edit V2C Community dialog appears. Add or change any of the following settings.
Related tasks
Creating SNMP V2C communities on page 97
Deleting SNMP V2C communities on page 97
Steps
1. In the Communities area, select the community, and select DELETE.
Related tasks
Creating SNMP V2C communities on page 97
Modifying SNMP V2C communities on page 97
● Administrator
Manage dashboard widgets Create dashboard widgets
● Limited-Administrator
● Administrator
Configure dashboard Configure widgets and dashboard layouts
● Limited-Administrator
Manage global filter rules ● User Add, edit, delete filter rules
Launch the virtual DD System Manager
NOTE: Administrator privilege is required
View DD System Manager ● User on the managed system to change
anything.
Manage user jobs ● User Suspend, resume, cancel jobs owned by user
Manage all jobs ● Administrator Suspend, resume, cancel any job
● Administrator View replication status, export to CVS file,
Manage advanced replication
● Limited-Administrator assign properties
Manage basic replication ● User View replication status, export to CVS file
Related concepts
Managing local user access to DDMC on page 103
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Administrator Access.
2. View the Passphrase, if it is set, or set it, if not. The Passphrase is a human-readable (understandable) key – like a
smart card – which is used to generate a machine-usable AES 256 encryption key. (For more information, see the DD OS
Administration Guide.) You can also view the available services, and for a selected service, the service options that are
configured for it.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Administrator Access.
2. In the Services area, select FTP, and click Edit.
3. In the Access dialog, select Enabled or Disabled. If FTPS is enabled, it will be disabled before enabling FTP.
4. In Session Timeout, enter, in seconds, the interval that must elapse before the connection closes, or choose the default of
Infinite.
5. Determine how hosts are to connect:
● All hosts
● Specified hosts – Host names can be a fully qualified host name or an IP address.
○ To add a host, select Add (green plus sign). Enter the host name, and click Save.
○ To modify a host name, select the host name in the Hosts list, click Edit (pencil), change the host name, and
clickSave.
○ To remove a host name, select the host name in the Hosts list, click Delete (X), and click Save.
6. Click Apply to save changes.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Administrator Access.
2. In the Services area, select FTPS, and click Edit.
3. In the Access dialog box, select Enabled or Disabled. If FTP is enabled, it is disabled before enabling FTPS.
4. In Session Timeout, type, in seconds, the interval that must elapse before the connection closes, or choose the default of
Infinite. To return to default values, select the Default button.
5. Determine how hosts are to connect:
● All hosts
● Specified hosts – Host names can be a fully qualified hostname or an IP address.
○ To add a host, select Add (green plus sign). Type the hostname, and click Save.
○ To modify a hostname, select the hostname in the Hosts list, click Edit (pencil), change the hostname, and click
Save.
○ To remove a hostname, select the hostname in the Hosts list, click Delete (X).
6. Click Apply to save changes.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Administrator Access.
2. In the Services area, select HTTP/HTTPS, and click Edit.
3. In the Edit HTTP/HTTPS Access dialog box, select Enabled or Disabled, and a port for HTTP and HTTPS.
4. In Session Timeout, type, in seconds, the interval that must elapse before the connection closes, or choose Infinite. The
default value is 10,800 seconds (3 hours).
5. Determine how hosts are to connect:
● All hosts
● Specified hosts – Host names can be a fully qualified hostname or an IP address.
○ To add a host, select Add (green plus sign). Type the hostname, and click Save.
○ To modify a hostname, select the hostname in the Hosts list, click Edit (pencil), change the hostname, and click
Save.
○ To remove a hostname, select the hostname in the Hosts list, click Delete (X), and click Save.
6. Click Apply to save changes.
Results
Steps
1. NOTE: The minimum supported OpenSSH version of SSH client is OpenSSH v4.7p1.
Click the Settings button (the gear icon) in the DDMC banner, then select Access > Administrator Access.
2. In the Services area, select SSH/SCP, and click Edit.
3. In the Edit HTTP/HTTPS Access dialog box, select Enabled or Disabled, and a port for SSH and SCP.
4. In Session Timeout, type, in seconds, the interval that must elapse before the connection closes, or choose the default
value of Infinite.
5. Determine how hosts are to connect:
● All hosts
● Specified hosts – Host names can be a fully qualified hostname or an IP address.
○ To add a host, select Add (green plus sign). Type the hostname, and click Save.
○ To modify a hostname, select the hostname in the Hosts list, click Edit (pencil), change the hostname, and click
Save.
○ To remove a hostname, select the hostname in the Hosts list, click Delete (X), and click Save.
6. Click APPLY to save changes.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Administrator Access.
2. In the Services area, select Telnet, and click Edit.
3. In the Access dialog box, select Enabled or Disabled.
4. In Session Timeout, type, in seconds, the interval that must elapse before the connection closes, or choose the default of
Infinite. To return to default values, select the Default button.
5. Determine how hosts are to connect:
● All hosts
● Specified hosts – Host names can be a fully qualified hostname or an IP address.
○ To add a host, select Add (green plus sign). Type the hostname, and click Save.
○ To modify a hostname, select the hostname in the Hosts list, click Edit (pencil), change the hostname, and click
Save.
○ To remove a hostname, select the hostname in the Hosts list, click Delete (X), and click Save.
6. Click Apply to save changes.
Managing certificates
About this task
Certificates are managed by importing CA root and CA intermediate files through the GUI.
CA files provide the following:
● Allows only https application for imported host type.
● Imported host type allows file type to import a PKCS 12 file (. p12), a signed public file (. pem ) or use certificate text.
Steps
1. To import CA Root, enter the following command in Windows or Linux CLI:
2. To import the intermediate CA files, enter the following command in the CLI:
Related concepts
Roles required for DDMC tasks on page 98
Related tasks
Logging into DDMC on page 23
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Local Users.
2. On the Local Users page, view information for the configured users.
NOTE: The default password policy can be changed by an admin or limited-admin by selecting Manage Password
Policies. Default values are the initial default password policy values.
Related concepts
User roles on page 104
Related tasks
Creating local users on page 105
Modifying a local user profile on page 106
Deleting a local user on page 107
Enabling or disabling local users on page 107
Changing user passwords on page 107
Changing login options on page 108
User roles
Roles provide a way to restrict user access to system functions by using a set of privileges. Permissions allow an admin or
limited-admin access to specific groups and systems, reducing the need to configure every user as a global admin.
DDMC supports the following roles:
● admin role: This role can configure and monitor the entire DDMC system.
NOTE: It is recommended that the admin role be used judiciously and assigned to very few users, as these users will be
able to configure DDMC as well as have access to all registered systems.
● limited-admin role: This role can configure and monitor the entire DDMC system, but it cannot delete or destroy MTrees.
● user role: This role can monitor DDMC and systems for which the user has permission.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Local Users.
2. Click Add.
3. In the Add local User dialog box, type the following in the General tab:
4. Select Add.
NOTE: The default password policy can be changed by the admin or limited-admin using Manage Password Policies.
The default values are the initial default password policy values.
Related tasks
Viewing local user information on page 103
Modifying a local user profile on page 106
Deleting a local user on page 107
Enabling or disabling local users on page 107
Changing user passwords on page 107
Changing login options on page 108
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Local Users.
2. Select a user name, and click Edit.
3. In the Edit Local User dialog: change the assigned role.
a. Enable or disable the user.
b. Change the user role.
c. Change the password for the user.
d. Set a date to disable the username.
4. Optionally change the password aging policy for the user
5. Click Save.
Related concepts
User roles on page 104
Related tasks
Viewing local user information on page 103
Creating local users on page 105
Deleting a local user on page 107
Enabling or disabling local users on page 107
Changing user passwords on page 107
Changing login options on page 108
Steps
1. From the Local Users tab, select user name from the list.
2. Select Delete to delete the user accounts.
3. In the Delete User dialog, click Apply to save changes.
Related concepts
User roles on page 104
Related tasks
Viewing local user information on page 103
Creating local users on page 105
Modifying a local user profile on page 106
Enabling or disabling local users on page 107
Changing user passwords on page 107
Changing login options on page 108
Steps
1. From the Local Users tab, select one or more user names from the list.
2. Select either the Enable or Disable button.
3. In the Enable User or Disable User dialog, click Apply to save changes.
Related concepts
User roles on page 104
Related tasks
Viewing local user information on page 103
Creating local users on page 105
Modifying a local user profile on page 106
Deleting a local user on page 107
Changing user passwords on page 107
Changing login options on page 108
Steps
1. From the Local Users tab, select a user name from the list.
2. Select Change Password.
3. In the Change Password dialog, enter the new password into the New Password box. (If prompted, enter the old password,
as well.)
4. Enter the new password again in the Verify New Password box.
5. Click Apply to save changes.
Related tasks
Viewing local user information on page 103
Creating local users on page 105
Modifying a local user profile on page 106
Deleting a local user on page 107
Enabling or disabling local users on page 107
Changing login options on page 108
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Local Users > Manage Password
Policies.
2. In the Manage Password Policies dialog box, type the password policy information.
Related concepts
User roles on page 104
Related tasks
Viewing local user information on page 103
Creating local users on page 105
Modifying a local user profile on page 106
Deleting a local user on page 107
Enabling or disabling local users on page 107
Changing user passwords on page 107
Active users
Active users are users that are currently logged into DDMC.
Configuring authentication
DDMC lets you configure three types of authentication: Active Directory, Workgroup, and NIS.
NIS authentication
Local user accounts on a Data Domain or PowerProtect system start with a UID of 500. When you set up a in an NIS (network
information service) environment, be aware of potential UID conflicts between local and NIS user accounts. To avoid such
conflicts, during initial planning consider the size of potential local accounts when you define allowable UID ranges for NIS users.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
4. You may add, edit, or delete any of this information by selecting the appropriate control.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the NIS tab.
3. In the Status area, select Enabled.
4. Select Apply.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the NIS tab.
3. In the Status area, select Disabled.
4. Select Apply.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the NIS tab.
3. Enter the new domain name in the Domain Name text box.
4. Click Apply.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the NIS tab.
3. In the NIS Servers area, select Manual.
4. To add a server, click Add (green plus sign) and specify a name.
5. To delete a server, select the server, then click Delete (red X).
6. Select Apply.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the NIS tab.
3. To add a group, click Add (green plus sign). Enter a name, select a management role (admin, limited-admin, or user), and
click Add.
4. To modify a group, select the group and click Modify (pencil). Edit the name and/or management role (admin or user), and
click Save.
5. To delete a group, select the group, and click Delete (X).
6. Click Apply.
Windows authentication
Windows authentication can be configured using workgroups or Active Directory.
1. Click the Settings button (the gear icon in the upper right corner) in the DDMC banner, then select Access >
Authentication.
2. Click the Windows tab.
3. Select Using Workgroup or Using Active Directory from the Method drop-down list.
For workgroup authentication, view information about CIFS servers and configured workgroups, as described in the following
table.
For Active Directory authentication, view information about Active Directory, as described in the following table.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the Windows tab.
3. Select Using Workgroup.
4. For Workgroup Name, select Manual to enter a different Workgroup name in the text box.
5. For CIFS Server Name, select Manual to enter a different CIFS server name (Data Domain or PowerProtect system) in the
text box.
6. Click Apply.
Steps
Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
NOTE: Username and password are always required to apply changes.
Steps
Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
Steps
1. In the Realm Name text box, enter the complete realm name for DDMC, such as domain1.local.
2. In the User Name text box, enter a user name. This user could be either in a domain to be joined or in a domain that is a
trusted domain of your company. This user must have permission to create accounts in this domain. The user name must be
compatible with Microsoft requirements for the Active Directory domain being joined.
3. In the Password text box, enter a password. The password must be compatible with Microsoft requirements for the Active
Directory domain being joined.
Steps
1. For CIFS Server Name:
● Select Use default: xxx to use the default CIFS server name, or
● Select Manual, and enter the CIFS server name in the text box.
2. For Domain Controllers:
● Select Automatically assign, which is the default and recommended method, or
● Select Manual, and enter controller name(s) in the text box(es). Up to three controller names can be added. You can
enter fully qualified domain names, host names, or IP (IPv4 or IPv6) addresses.
3. For Organizational Units:
● Select Use default: xxx to use the default Organization Units, or
● Select Manual, and enter the Organizational Unit name in the text box.
4. Select OK.
Next steps
After configuring Windows authentication, you must enable CIFS authentication from the DDMC command line:
adminaccess authentication add cifs
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the Windows tab.
3. Select Using Active Directory.
4. Click Add.
5. Specify a windows group.
6. Specify a role.
7. Click Add.
8. Click Apply.
Steps
1. Select Administration > Settings > Access tab > Authentication.
2. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
3. Click the Windows tab.
4. Select Using Active Directory.
5. Select a Windows group, and click Edit.
6. Edit the group name in the text box. The domain for the group must be specified, for example, domain\group name.
7. Click Save.
8. Click Apply.
Steps
1. Select Administration > Settings > Access tab > Authentication.
2. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
3. Click the Windows tab.
4. Select Using Active Directory.
5. Select a Windows group, and click Delete.
6. Click Apply.
LDAP authentication
Lightweight Directory Access Protocol (LDAP) can be used to authenticate users with DDMC access. An LDAP user can
manage Data Domain systems.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the LDAP tab.
3. In the LDAP Authentication area, view information about LDAP servers and configured LDAP groups, as described in the
following table.
4. Add, edit, or delete any of this information by selecting the appropriate control.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the LDAP tab.
3. In the Status area, select Enabled.
4. Select Apply.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the NIS tab.
3. In the Status area, select Disabled.
4. Select Apply.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the LDAP tab.
3. Type the Base suffix in the text box.
4. Click Apply.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the LDAP tab.
3. Type the Bind DN in the text box.
4. Click Apply.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the LDAP tab.
3. To add a server, click Add (green plus sign), and specify a name.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select Access > Authentication.
2. Click the LDAP tab.
3. To add a group, click Add (green plus sign). Enter a name, select a management role (admin, limited-admin, or user), and
click Add.
4. To modify a group, select the group, and click Edit (pencil). Edit the name and/or management role (admin, limited-admin,
or user), and click Save.
5. To delete a group, select the group, and click Delete (X).
6. Click Apply.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select System > Time and Date.
2. Set how time is synchronized:
● To manually set the time and date, select Manual, type the date in the text box, and use the drop-down lists to set the
time.
● To use NTP to synchronize the time, select NTP, and choose how to access the NTP server:
○ Obtain NTP Servers using DHCP – DHCP (Dynamic Host Configuration Protocol) will automatically select a server.
○ Manually Configure – Add the IP address of the server in the NTP Servers area.
3. Select Apply.
NOTE: Changes to the Time and Date settings require a DDMC restart to take full effect.
Related concepts
Working with SNMP on page 91
Related tasks
Configuring mail server settings on page 117
Configuring system properties on page 117
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select System > Properties.
2. The Location text field shows where the system is located. [This text field is not used by DDMC (or DD OS); it is here simply
for your information.]
3. In the Default Administrator section, enter an email address to be automatically added to the alert and autosupport
notification lists, and a host to be automatically added to the FTP and Telnet access lists. Entering ALL in this field allows all
hosts to FTP and Telnet in.
4. Click Apply.
Related concepts
Working with SNMP on page 91
Related tasks
Configuring mail server settings on page 117
Configuring time and date settings on page 116
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select System > Properties.
2. Enter the name of the mail server in the text box. .
3. Click Apply.
Related concepts
Working with SNMP on page 91
Related tasks
Configuring time and date settings on page 116
Configuring system properties on page 117
1. Click the Settings button (the gear icon) in the DDMC banner, then select System > Properties.
2. View the serial number listed.
NOTE: DDMC does not require a license, but the managed Data Domain and PowerProtect systems must have licenses for
their core and optional features.
Managing alerts
You can configure settings to determine who will receive DDMC alert notifications and daily alert summaries.
DDMC and DD OS use the same alert system. Detailed information about the alert system is described in the DD OS
Administration Guide.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select System > Support > Notifications.
2. In the Real Time Alerts area, click Add.
3. In the Add Notification Group dialog, type a name for the group in the Group Name text box.
4. Select the alert class attributes, and set the severity level at which notifications are to be sent.
For example, you could create a CriticalWarnings group, select all classes, and set the severity level to Critical.
5. In the Subscribers panel, click Add (green plus sign), add the email address of a subscriber.
6. Repeat this step for each subscriber who needs to be added to the group, and click Add.
Steps
1. In the More Tasks menu, select Send Test Alert.
2. In the Notification Groups panel, select the rows of the groups to receive the test email, then select Next.
3. In the Additional Email Addresses panel, add or modify email addresses, if necessary.
4. Select Send Now.
Steps
1. Click on the row of the group in the Notifications group table, and select Modify.
2. In the Modify Group dialog, select Group Properties, and in the Class Attributes area, add or remove classes, change any
severity levels, and select Next.
3. The Subscribers area displays. Add or remove any subscriber email addresses, as needed, and select Finish.
Steps
1. Select one or more rows of groups in the Notifications group table, and select Delete.
2. In the Delete Group dialog, verify the deletion, and select OK.
3. Select OK to exit the confirmation dialog.
Steps
1. From the More Tasks menu, select Reset Notification Groups.
2. In the Reset Notification Groups dialog, select Yes, and in the Verification dialog, select OK.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select System > Support > Notifications.
2. Select the desired notification group, and click Edit.
3. In the Edit Subscribers dialog, select one of the following options:
● To add a subscriber, click Add (green plus sign). Enter the email address in the Email Address dialog, and click Add.
● To modify an email address, select the email address in the Subscriber Email list, and click Modify (pencil). Edit the email
address in the Email Address dialog, and click Save.
● To delete an email address, select the email address in the Subscriber Email list, and click Delete (X).
4. Click Apply.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select System > Support > Notifications.
2. If the default "8:00 AM Daily" delivery time is not acceptable, select the hour, minute, and AM/PM for a new time.
3. Manage the subscriber emails:
● To add a subscriber, click Add (green plus sign). Enter the email address in the Email Address dialog, and click Add.
● To modify an email address, select the email address in the Subscriber Email list, and click Modify (pencil). Edit the email
address in the Email Address dialog, and click Save.
● To delete an email address, select the email address in the Subscriber Email list, and click Delete (X).
4. Click Apply.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select System > Support > DELL EMC SUPPORT.
2. In the Channel area, select Dell EMC Secure Remote Services.
3. Add, delete, or change the method priorities.
To change the method, see the DD OS Administration Guide.
4. Select the frequency to email the DDMC default administrator.
5. Click Apply.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select System > Support > Notifications.
2. In the Autosupport Report section, select Add (green + sign) to add an email address.
3. Click Apply.
Steps
1. Click the Settings button (the gear icon) in the DDMC banner, then select System > Support > Logs.
2. On the Logs page, view the log file name (which is assigned automatically), the file size, and the date it was last modified.
Select a log file name to view its contents. You may be prompted to select an application, such as Notepad.exe, to open the
file.
NOTE: The DDMC release family directly after 2.0 is 6.1; there are no 3.x, 4.x, or 5.x versions.
Steps
1. Use the Settings gear icon in the DDMC banner. System. Admin and limited-admin users with can access the Support
Bundles option.
2. In the Update Packages area, view the available update packages, their sizes, and their modification dates. Then, select one
of the following options:
● To get a new update package to store locally, click Add.
● To upload a package that has been stored locally to the inventory, click Add, then click the Dell EMC Online Support
link. Browse to the local drive to select the package.
Software update files use the .rpm file extension. This topic assumes that you are updating only DDMC. If you make hardware
changes, such as adding, swapping, or moving interface cards, you must update the DDOS configuration to correspond with the
hardware changes.
2. Click the Settings button (the gear icon) in the DDMC banner, then select System > UPDATE.
3. In the Update Packages Available area, select the update package from the list, and select Perform System Update.
4. Monitor the update progress from the DDMC console page.
5. Be aware that the update process automatically reboots DDMC.
6. It is recommended that you keep the System Update progress dialog open until the update completes, or until the system
powers off.
Prerequisites
A third disk with 100GB must be added before updating to DDMC 7.6.
1. Create a 100GB virtual disk file.
Steps
1. Review the appropriate release notes for instructions for this update, and verifying available space.
NOTE: For most releases, updates are permitted from up to two prior major release versions.
2. Click the Settings button (the gear icon) in the DDMC banner, then select System > UPDATE.
3. In the Update Packages Available area, select the update package from the list, and select Perform System Update.
4. Monitor the update progress from the DDMC console page.
5. The update process automatically reboots DDMC.
6. It is recommended that you keep the System Update progress dialog open until the update completes or until the system
powers off.
Prerequisites
A third disk with 100GB (using Hyper-V manager) must be added before updating to DDMC 7.6.
1. Click the setting menu of the VM.
2. Click Add button to add a new hard drive.
3. Use the New Virtual Hard Disk Wizard.
4. The new added disk should be 100GB.
5. Add the disk.
Steps
1. Review the appropriate release notes for instructions for this update, and verifying available space.
NOTE: For most releases, updates are permitted from up to two prior major release versions.
2. Click the Settings button (the gear icon) in the DDMC banner, then select System > UPDATE.
3. In the Update Packages Available area, select the update package from the list, and select Perform System Update.
Prerequisites
A 100GB third disk must be added before updating to DDMC 7.6.
1. Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/.
2. From the navigation bar, select the region where the DDMC is located.
3. In the navigation pane, choose Elastic Block Store > Volumes.
4. Click Create Volume.
● Volume Type: Choose a volume type same as root disk or db disk.
● Size: 100 GB
● Availability Zone: Choose the Availability Zone in which to create the volume. (An EBS volume must be attached to an
EC2 instance that is in the same Availability Zone as the volume.)
● Leave the default values for the other fields.
● Click Add Tag, Key: Name, Value: Provide the string that identifies this third service disk.
● Click Create Volume
Attach the third disk to an instance.
1. Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/.
2. In the navigation pane, choose Elastic Block Store.
3. Select an available volume and choose Actions > Attach Volume.
4. For Instance, start typing the name or ID of the instance. Select the instance from the list of options (only instances that
are in the same Availability Zone as the volume are displayed).
5. For Device, you can keep the suggested device name, or type a different supported device name. For more information, see
Name devices on Linux instances.
6. Choose Attach.
For 7.6, the instance type should be m4.xlarge or m5.xlarge. If the instance type does not match, an alert is displayed. The
recommendation is to use m5.xlarge.
Complete the following steps to resize DDMC instance if current instance type is not m5.xlarge.
1. Open the Amazon EC2 console, and in the navigation pane, choose Instances.
2. Select the DDMC instance, and click Actions > Instance state > Stop instance.
3. In the Stop Instance dialog box, Click Stop.
NOTE: It can take a few minutes for the instance to stop.
4. Once the DDMC instance is in the stopped state, go to Actions > Instance settings > Change instance type.
NOTE: This action is unavailable if the instance state is not stopped.
5. In the Change instance type dialog box, select the instance type, and click Apply.
6. Go to Instance state > Start instance to start the instance.
NOTE: It can take a few minutes for the instance to enter the running state.
Steps
1. Review the appropriate release notes for instructions for this update, and verifying available space.
2. Click the Settings button (the gear icon) in the DDMC banner, then select System > UPDATE.
3. In the Update Packages Available area, select the update package from the list, and select Perform System Update.
4. Monitor the update progress from the DDMC console page.
5. The update process automatically reboots DDMC.
6. It is recommended that you keep the System Update progress dialog open until the update completes, or until the system
powers off.
Modifying the DDMC instance attribute to add the Elastic Network Adapter
(ENA)
If the DDMC instance was manually deployed, the DDMC instance attribute must be modified to add the Elastic Network
Adapter (ENA) support before changing the instance type to m5.xlarge.
Prerequisites
Install AWS CLI for follow-up operations. See the Creating AMI with AWS CLI section for installing AWS CLI.
Steps
1. Use the following AWS CLI command to check if current DDMC instance has ENA support.
In this example, i-0bddc2cc1c9f9d61c is the instance id of DDMC instance. Use the instance id of the specific DDMC
when running this command. If the result is [] with vacant content, it means that the current DDMC instance does not
support ENA.
Prerequisites
A third disk with 100 GB must be added before upgrading to DDMC 7.6.
1. Go to Azure portal: https://portal.azure.com.
2. In Azure services, click Virtual Machine.
3. Select and click the DDMC instance.
4. In settings, click Disks.
5. Click Create and attach a new disk.
● Disk name: Enter the name string for the third service disk.
● Storage type: Choose the type same as above root disk or db disk
● Size: 100 GB
● Host caching: None
● Click Save.
The instance type D4s_v3 is required. If the instance type does not match, an alert is displayed.
1. Click Virtual instance.
2. Select and click the DDMC instance.
3. In Settings, click Size.
4. Search and select D4s_v3.
5. Click Resize.
Steps
1. Review the appropriate release notes for instructions for this update, and verifying available space.
NOTE: For most releases, updates are permitted from up to two prior major release versions.
2. Click the Settings button (the gear icon) in the DDMC banner, then select System > UPDATE.
3. In the Update Packages Available area, select the update package from the list, and select Perform System Update.
4. Monitor the update progress from the DDMC console page.
5. The update process automatically reboots DDMC.
6. It is recommended that you keep the System Update progress dialog open until the update completes or until the system
powers off.
Prerequisites
A third disk with 100 GB must be added before upgrading to DDMC 7.6.
1. Go to GCP console: https://console.cloud.google.com/.
2. Click Compute Engine, VM instances, and select the DDMC instance.
3. Click Edit under Additional Disks, and click Add new disk.
● Name: enter the name string for the third service disk
● Type: set it to the same type as root disk or db disk
● Size: 100 GB
4. Click Save.
The instance type e2-standard-4 is required. If the instance type does not match, an alert is displayed.
1. Go to GCP console: https://console.cloud.google.com/
Steps
1. Review the appropriate release notes for instructions for this update, and verifying available space.
NOTE: For most releases, updates are permitted from up to two prior major release versions.
2. Click the Settings button (the gear icon) in the DDMC banner, then select System > UPDATE.
3. In the Update Packages Available area, select the update package from the list, and select Perform System Update.
4. Monitor the update progress from the DDMC console page.
5. The update process automatically reboots DDMC.
6. It is recommended that you keep the System Update progress dialog open until the update completes or until the system
powers off.
Help Located in the DDMC banner and a dropdown menu appears when clicked:
● About DD Management Center
● What's New
● View EULA
● DDMC Guide - This is derived from the PowerProtect DD Management Center
Installation and Administration Guide
User A circular icon displays with the first alphabet letter of the user ID. Located in the
DDMC banner and is used to:
● Display user and role information
● Switch to classic view
● Logout
Settings Located in the DDMC banner and provides direct access to Network, Access, and
System settings
Refresh Located in the DDMC banner, reloads the page to display latest information
Filter controls The filter control is composed of two parts: the funnel icon and a drop-down list.
● If filtering is being performed, clicking the funnel turns all filtering off, causing
all systems to be visible.
● If filtering is off, clicking the funnel turns on filtering, using the previously set
filter.
● When a filter is active, the funnel display is yellow. Click Show Filter or the
Filtered by link to see details about what is filtered.
Filter selection is performed with the small down arrow, which opens a drop-down
list of the types of filtering that can be employed:
● Filter by group – Enables the selection of one or more groups. Systems
belonging to the selected groups display in the work area panel.
● Filter by property – Enables the selection of one or more property values.
Systems having those property values display in the work area panel.
Show Found on many of the views that are table-based, enables the choice of columns
columns that display in the table.
Column sorter On table views, sorts the columns in ascending or descending view (by date,
alphabetically, by priority, and so on), based on the column datatype.
Add Opens a dialog box to add one or more items. The type of item being added
depends on the page displayed. For example, on the Inventory > Systems page,
this lets you add systems to DDMC. On the Administration > Properties page,
this lets you create custom properties for managed objects.
Edit For a selected table element, opens a dialog box that allows changing information
about the element.
Delete Deletes a selected table element.
Continue Continues an operation, such as adding another statement when creating a custom
rule.
Unreachable – The system is not responding or is not transmitting. Data was last retrieved as of the
date that is shown in the status banner.
Unmanaged – The system is suspended or unmanaged. When suspended, all data collection ceases. A
system is suspended when management has been taken over by another DDMC or when the system
is suspended using the CLI.
Adding – The system is being added into the inventory.
Synchronizing – Data for the system is being synchronized. The system is unavailable during this
state.
Unsupported system – This system is unsupported because it is running an operating system that is
not supported by this version of DDMC. You may view system details for it, but the data will be out of
date. You will see a tooltip with an option to update the system.
Related tasks
Working with filters on page 40
Logging into DDMC on page 23
Dashboard controls
The Dashboard > Monitoring page consists of from one to seven tabs that you create to hold any number of widgets that
provide high-level, quick monitoring views of various aspects of the Data Domain or PowerProtect environment.
Add/Configure Tabs Opens the Add and Configure Dashboard Tabs dialog box where you can add
tabs, modify tab names, or delete tabs. You can also set the number of columns and
change the ordering of the tabs across the dashboard.
Maximize/Restore Toggles the size of the dashboard. Maximize hides the navigation panel and
dashboard Restore returns to default view, exposing the navigation panel.
Related tasks
Working with filters on page 40
Widget controls
Each widget includes the following standard controls.
Connection Status Click Status to open a popup that lists the counts of systems with connection
problems in any of these categories: (not responding, not transmitting, suspended,
and unmanaged.) Includes a link at the bottom of the popup to browse to the
Health > Status page that provides more details about just these systems.
NOTE: The Status control displays on a widget when any of the monitored
systems (filtered or unfiltered) have one or more connection problems.
Inactive/Active Indicates that a filter is either inactive or active in a table column where filtering is
Table Filter available.
Filter Indicates that a filter is active for the widget.
Emergency and When an emergency or alert state is present, click this icon to open the Status >
Alert Alerts page to show the emergency/alert messages.
Critical and Error When critical or error states are present, click this icon to open the Status > Alerts
page to show the critical/error messages.
Warning When a warning exists, click this icon to open the Status > Alerts page to show
the warning.
Group icons
On the Administration > Groups page, the DDMC system administrator creates groups in a tree-like hierarchy for logically
organizing Data Domain and PowerProtect systems.
Property controls
The controls used to add, edit, and assign properties (Administration > Properties) help you quickly see whether a property is
a system or user property and help you get more details and information about the property.
managed-system add
managed-system add hostname [force] [inbound-proxy proxy-host [inbound-proxy-port proxy-
port]] [outbound-proxy proxy-host [outbound-proxy-port proxy-port]]
This command adds a system to the set of managed systems. The command prompts you to:
1. Verify that the certificate obtained from the host is valid.
2. Type the sysadmin password for the system being added to management.
Argument Definitions
force If the system is already being managed by another DD Management Center, the current DD Management
Center assumes management of the Data Domain system from the other DD Management Center, and
the Data Domain system entry in the other DD Management Center is placed in the unmanaged state. If
the system is already being managed and you omit this argument, the command fails.
hostname The host name of the system.
inbound-proxy Inbound proxy host name if the incoming connection from the Data Domain system is through a proxy.
proxy-host
inbound-proxy- Inbound proxy port number if the incoming connection from the Data Domain system is through a proxy.
port proxy-port
outbound-proxy Outbound proxy host name if the connection from the DD Management Center to the Data Domain
proxy-host system is through a proxy.
outbound-proxy- Outbound proxy port number if the connection from the DD Management Center to the Data Domain
port proxy-port system is through a proxy.
NOTE: The proxy options are equivalent to the firewall options in the graphical user interface.
managed-system check-connection
managed-system check-connection hostname [inbound-proxy proxy-host [inbound-proxy-port
proxy-port]] [outbound-proxy proxy-host [outbound-proxy-port proxy-port]]
This command checks whether the specified host is reachable and available to be managed by this DDMC. Use managed-
system add to add the system to the set of systems that this DDMC is managing.
Argument Definitions
hostname The host name of the system.
inbound-proxy Inbound proxy host name if the incoming connection from the Data Domain system is through a proxy.
proxy-host
inbound-proxy- Inbound proxy port number if the incoming connection from the Data Domain system is through a proxy.
port proxy-port
outbound-proxy Outbound proxy host name if the connection from the DD Management Center to the Data Domain
proxy-host system is through a proxy.
managed-system delete
managed-system delete hostname
This command removes the specified system from DDMC management.
Argument Definitions
hostname The host name of the system.
managed-system resume
managed-system resume hostname
This command resumes data collection from the specified system if collection was suspended by managed-system suspend.
NOTE: If a system is running an unsupported version of DD OS, it will be resumed, but it will be put back in an unsupported
(not suspended) state.
Argument Definitions
hostname The host name of the system.
managed-system set
managed-system set hostname [inbound-proxy {proxy-host|none}] [inbound-proxy-port
{proxy-port|default}] [outbound-proxy {proxy-host|none}] [outbound-proxy-port {proxy-port|
default}]
This command sets or changes proxy server information for a managed system.
Argument Definitions
hostname The host name of the system.
inbound-proxy Inbound proxy host name if the incoming connection from the Data Domain system is through a proxy.
{ proxy-host | Use none to remove the proxy host and clear the proxy port.
none}
inbound-proxy- Inbound proxy port number if the incoming connection from the Data Domain system is through a proxy.
port proxy-port
outbound-proxy Outbound proxy host name if the connection from the DD Management Center to the Data Domain
{ proxy-host | system is through a proxy. Use none to remove the proxy host and clear the proxy port.
none}
outbound-proxy- Outbound proxy port number if the connection from the DD Management Center to the Data Domain
port { proxy-port | system is through a proxy. Use default to reset the proxy port number.
default}
managed-system show
managed-system show [{all | hostname}]
Argument Definitions
all Report about all systems. This is the default.
hostname The host name of the system.
The report lists the systems by hostname and includes serial number, management state, online status, DD OS version, and
latest synchronization time.
Management States
This list describes the possible values of the management State column.
not-responding DDMC has not been able to send messages to the managed system, or communication has failed in both
directions, for more than 30 minutes.
not-transmitting The managed system has not responded to messages from DDMC for more than 120 minutes.
online Communication with the managed system is normal.
upgrading The managed system is in the process of upgrading its DD OS.
upgrading, not- The managed system is in the process of upgrading its DD OS and is not communicating with DDMC.
responding
managed-system suspend
managed-system suspend hostname
This command suspends data collection from the specified host. If you do not want DDMC to show a system as unreachable
while it is shut down for maintenance, you can use this command to suspend monitoring.
NOTE: If a system is not in a managed state, it cannot be suspended. If a system is running an unsupported version of DD
OS, it can be suspended.
Argument Definitions
hostname The host name of the system.
task commands
In the CLI, jobs are called tasks. The DDMC task CLI commands let you cancel, pause, resume, and generate reports about
jobs. Regular users may work with tasks that they created. The sysadmin user may work on all tasks.
The Health > Jobs page in the Web interface displays information about jobs that have been initiated from DDMC, including
jobs still in progress and jobs that have completed, whether successfully or not. Jobs include actions such as adding and
removing systems from management.
task cancel
task cancel task-id
This command terminates a task.
Argument Definitions
task-id The ID number for the task, as reported by one of the task show commands.
task pause
task pause task-id
This command suspends a task. Use task resume to continue the task.
Argument Definitions
task-id The ID number for the task, as reported by one of the task show commands.
task resume
task resume task-id
This command continues a task that you suspended with task pause.
Argument Descriptions
task-id The ID number for the task, as reported by one of the task show commands.
Argument Definitions
task-id The ID number for the task, as reported by one of the task show commands.
Argument Definitions
type {inventory Filter the results to show only tasks of the specified type.
| replication |
upgrade}
user user Filter the results to show only tasks owned by the specified user.
Argument Definitions
last n {hours | Filter the results to show only tasks that finished during the previous n hours, days, weeks, or
days | weeks | months.
months}
start Filter the results to show only tasks that finished during the specified interval. MMDD indicates month
MMDDhhmm [[ CC and day. hhmm indicates hours and minutes in 24-hour format. To specify midnight between Sunday night
] YY ] end and Monday morning, use mon 0000. To specify noon on Monday, use mon 1200. CC is the first two
MMDDhhmm [[ CC digits of the year. YY is the last two digits of the year.
] YY ]
type {inventory Filter the results to show only tasks of the specified type.
| replication |
upgrade}
Argument Definitions
last n {hours | Filter the results to show only tasks that finished during the previous n hours, days, weeks, or
days | weeks | months.
months}
start Filter the results to show only tasks that finished during the specified interval. MMDD indicates month
MMDDhhmm [[ CC and day. hhmm indicates hours and minutes in 24-hour format. To specify midnight between Sunday night
] YY ] end and Monday morning, use mon 0000. To specify noon on Monday, use mon 1200. CC is the first two
MMDDhhmm [[ CC digits of the year. YY is the last two digits of the year.
] YY ]
type {inventory Filter the results to show only tasks of the specified type.
| replication |
upgrade}
user user Filter the results to show only tasks owned by the specified user.