6.0 HP X9000 File Serving Software File System User Guide (TA768-96043, October 2011)

Starting a run-once directory replication task.......................................................................109
Stopping a remote replication task.....................................................................................109
Pausing a remote replication task.......................................................................................109
Resuming a remote replication task....................................................................................109
Querying remote replication tasks......................................................................................110
Replicating WORM/retained files...........................................................................................110
Configuring remote failover/failback.......................................................................................110
Troubleshooting remote replication..........................................................................................111
12 Managing data retention and validation..................................................112
Overview............................................................................................................................112
Data retention ................................................................................................................112
Data validation scans.......................................................................................................113
Enabling file systems for data retention and validation...............................................................113
Viewing the retention profile for a file system.......................................................................117
Changing the retention profile for a file system.....................................................................118
Managing WORM and retained files......................................................................................118
Creating WORM and WORM-retained files........................................................................118
Viewing the retention information for a file..........................................................................119
File administration............................................................................................................119
Running data validation scans................................................................................................121
Scheduling a validation scan.............................................................................................121
Starting an on-demand validation scan...............................................................................122
Viewing, stopping, or pausing a scan.................................................................................123
Viewing validation scan results..........................................................................................123
Viewing and comparing hash sums for a file.......................................................................123
Handling validation scan errors.........................................................................................124
Using hard links with WORM files..........................................................................................124
Using remote replication........................................................................................................124
Backup support for data retention...........................................................................................125
Troubleshooting data retention................................................................................................125
13 Creating X9000 software snapshots........................................................126
File system limits for snap trees and snapshots..........................................................................126
Configuring snapshot directory trees and schedules...................................................................126
Modifying a snapshot schedule.........................................................................................128
Managing software snapshots................................................................................................128
Taking an on-demand snapshot.........................................................................................128
Determining space used by snapshots................................................................................129
Accessing snapshot directories...........................................................................................129
Restoring files from snapshots............................................................................................130
Deleting snapshots...........................................................................................................131
Reclaiming file system space previously used for snapshots....................................................131
Moving files between snap trees.............................................................................................133
Removing snapshot authorization for a snap tree.......................................................................133
Backing up snapshots............................................................................................................134
14 Creating block snapshots.......................................................................135
Setting up snapshots.............................................................................................................135
Preparing the snapshot partition........................................................................................135
Registering for snapshots..................................................................................................136
Discovering LUNs in the array............................................................................................136
Reviewing snapshot storage allocation................................................................................136
Automated block snapshots....................................................................................................136
Creating automated snapshots using the GUI......................................................................137
Creating an automated snapshot scheme from the CLI..........................................................141
6 Contents