DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By...

460
EMC ® Data Protection Advisor Version 6.2 SP2 Report Reference Guide 302-002-212 REV 03

Transcript of DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By...

Page 1: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

EMC® Data Protection AdvisorVersion 6.2 SP2

Report Reference Guide302-002-212

REV 03

Page 2: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Copyright © 2001-2016 EMC Corporation. All rights reserved. Published in the USA.

Published March , 2016

EMC believes the information in this publication is accurate as of its publication date. The information is subject to changewithout notice.

The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind withrespect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for aparticular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicablesoftware license.

EMC², EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and othercountries. All other trademarks used herein are the property of their respective owners.

For the most up-to-date regulatory document for your product line, go to EMC Online Support (https://support.emc.com).

EMC CorporationHopkinton, Massachusetts 01748-91031-508-435-1000 In North America 1-866-464-7381www.EMC.com

2 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 3: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

23

Introduction 27

Overview....................................................................................................... 28

DPA Reports 29

Overview....................................................................................................... 30Run Reports area menu items........................................................................30

Reports by object 55

Backup application reporting........................................................................ 56Data Domain reporting.................................................................................. 56Virtualization reporting..................................................................................57Database reporting........................................................................................57HP EVA reporting........................................................................................... 57ACSLS Server reporting..................................................................................58Recoverability reporting................................................................................ 59EMC File Storage reporting............................................................................ 59EMC Disk Library reporting............................................................................ 59RecoverPoint reporting.................................................................................. 59Tape library reporting.................................................................................... 60Fibre Channel switch reporting...................................................................... 60IP switch reporting........................................................................................ 60Xsigo reporting..............................................................................................61System reporting...........................................................................................61Data Protection Advisor reporting.................................................................. 61Enterprise Application reporting.................................................................... 62

Reports by System Template 63

What are system templates?..........................................................................64Asset Management system templates........................................................... 64

Battery Configuration....................................................................... 64Card Configuration........................................................................... 64Disk / Filesystem Capacity............................................................... 65Disk Array Configuration...................................................................65Disk Configuration........................................................................... 66Disk Count By State..........................................................................66Disk Count By Use............................................................................66Disk Summary..................................................................................67Fan Configuration.............................................................................67Fibre Channel Configuration............................................................. 67Fibre Channel Port Count..................................................................68Filesystem Configuration..................................................................68Filesystem Configuration for Filesystem............................................69Filesystem Configuration Summary.................................................. 71Filesystem Details............................................................................ 71

Preface

Chapter 1

Chapter 2

Chapter 3

Chapter 4

CONTENTS

EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 3

Page 4: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Filesystem Disk Configuration.......................................................... 71Filesystem Summary........................................................................ 72Filesystem Summary By Client..........................................................72Host Configuration........................................................................... 72Host Configuration for Host.............................................................. 73Host Count.......................................................................................73Host OS Distribution........................................................................ 73Host Summary By Class....................................................................73Host Summary By Platform...............................................................74Host Summary By Vendor.................................................................74Host Summary By Version................................................................ 74iSCSI Configuration.......................................................................... 74LUN Configuration............................................................................ 74LUNs And Filesystems On Same Volume for ruleset.......................... 75Memory Configuration......................................................................75Memory Configuration Details.......................................................... 75Multiple Tape Drive Firmware Revisions for ruleset........................... 76Network Interface Configuration....................................................... 76Network Interface Configuration for Interface....................................76Network Interface Count...................................................................77Processor Configuration................................................................... 77Processor Configuration Summary....................................................77PSU Configuration............................................................................77Solid State Storage Configuration.....................................................78Spare Disk Count by Use for ruleset..................................................78Spare Disk Count for ruleset.............................................................78Tape Drive Configuration.................................................................. 78Tape Drive Firmware Revisions......................................................... 78Tape Drive Firmware Summary..........................................................79Tape Drive Interface Summary.......................................................... 79Tape Drive Model Summary..............................................................79Tape Library Config...........................................................................79Thermometer Configuration..............................................................80Xsigo Infiniband Port Configuration.................................................. 80

Capacity Planning system templates............................................................. 80Application Growth.......................................................................... 80Application Usage............................................................................81Avamar Client Usage Statistics......................................................... 81Avamar Garbage Collection Data Recovered..................................... 81Backup Daily Staging By Storage Pool.............................................. 82Backup Daily Total Group Duration................................................... 82Backup Data Backed Up Daily.......................................................... 82Backup Data Backed Up Daily By Device.......................................... 82Backup Data Backed Up Daily By Media Server.................................82Backup Data Backed Up Daily By Server........................................... 82Backup Data Backed Up Weekly.......................................................83Backup Data Backed Up Weekly By Media Server............................. 83Backup Data Backed Up Weekly By Server........................................83Backup Duration of Jobs Backed Up Daily.........................................83Backup Duration of Jobs Backed Up Daily By Media Server...............83Backup Duration of Jobs Backed Up Daily By Server......................... 83Backup Duration of Jobs Backed Up Weekly..................................... 83Backup Duration of Jobs Backed Up Weekly By Media Server........... 84Backup Duration of Jobs Backed Up Weekly By Server...................... 84Backup Files Backed Up Daily.......................................................... 84Backup Files Backed Up Daily By Media Server.................................84

CONTENTS

4 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 5: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Files Backed Up Daily By Server........................................... 84Backup Files Backed Up Weekly....................................................... 84Backup Files Backed Up Weekly By Media Server............................. 84Backup Files Backed Up Weekly By Server........................................85Backup Number of Jobs Backed Up Daily..........................................85Backup Number of Jobs Backed Up Daily By Media Server................ 85Backup Number of Jobs Backed Up Daily By Server.......................... 85Backup Number of Jobs Backed Up Hourly....................................... 85Backup Number of Jobs Backed Up Weekly...................................... 85Backup Number of Jobs Backed Up Weekly By Media Server.............85Backup Number of Jobs Backed Up Weekly By Server....................... 86Capacity Overview for Block............................................................. 86Capacity Overview for File.................................................................86Data Domain Total Replicated Capacity............................................ 86Media Count By Location Trend........................................................ 86Media Count By Pool and Location Trend..........................................87Media Count By Pool and State and Location Trend..........................87Media Count By Pool And State Trend...............................................87Media Count By Pool Trend.............................................................. 87Media Count By State and Location Trend........................................ 88Media Count By State Trend............................................................. 88Media Count Trend...........................................................................88Media Usage By Library Trend.......................................................... 88Media Usage By Pool and Library Trend............................................ 88Media Usage By Pool Trend.............................................................. 89Media Usage Trend.......................................................................... 89Networker Individual Job Size for Data Domain.................................89NetWorker Total Job Size and Used Space for Data Domain.............. 89Pool Capacity Usage.........................................................................89Pool Capacity Usage for Pool............................................................90RecoverPoint Protected Capacity...................................................... 90Save Pool Detailed Usage.................................................................90Save Pool Usage.............................................................................. 90Snapshot Utilization........................................................................ 91Storage Array Capacity..................................................................... 91Storage Array Capacity Usage...........................................................91Storage Array Filling Up for ruleset....................................................91Storage Array Raw Capacity.............................................................. 92Storage Pool Application Growth...................................................... 92Storage Pool Application Usage....................................................... 92Storage Pool Capacity...................................................................... 92Storage Pool Raw Capacity Periodic..................................................93TSM Daily Migration By Storage Pool................................................ 93TSM Daily Reclamation By Storage Pool............................................93

Change Management system templates........................................................ 94Avamar Audit User Changes Details..................................................94Backup Application Change Details..................................................94Backup Application Change Details for ruleset................................. 94Backup Application Change Summary..............................................95Backup Application Configuration Changes for Pools....................... 95Backup Application Last 10 Changes............................................... 95Backup Client Configuration Change Details.....................................95Backup Client Configuration Change Summary.................................96Backup Device Configuration Change Details................................... 96Backup Device Configuration Change Summary............................... 96Backup Group Configuration Change Details.................................... 97

CONTENTS

EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 5

Page 6: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Group Configuration Change Summary................................ 97Backup Job Configuration Change Details.........................................97Backup Job Configuration Change Summary.....................................98Backup Pool Configuration Change Details.......................................98Backup Schedule Configuration Change Details............................... 98Backup Schedule Configuration Change Summary........................... 98Backup Server Configuration Change Details....................................98BTD Change Details..........................................................................99BTD Change Summary...................................................................... 99BTD Last 10 Change Details..............................................................99Celerra Change Details..................................................................... 99Celerra Change Summary............................................................... 100Celerra Configuration Change Details............................................. 100Celerra Last 10 Change Details.......................................................100Data Domain Change Details..........................................................100Data Mover Configuration Change Details...................................... 101Disk Array Configuration Change Details........................................ 101Fileserver Export Change Details.................................................... 101Filesystem Configuration Change Details........................................102Media Location Change Details...................................................... 102Memory Configuration Change Details............................................102NetBackup Storage Unit Configuration Change Details................... 103Network Interface Configuration Change Details.............................103RecoverPoint Change Details..........................................................104RecoverPoint Change Summary......................................................104RecoverPoint Last 10 Changes....................................................... 104Symmetrix Change Details..............................................................105Symmetrix Change Summary..........................................................105Symmetrix Last 10 Change Details................................................. 105Tape Drive Configuration Change Details........................................106Tape Library Configuration Change Details..................................... 106Virtual Host Change Details............................................................107Virtual Host Configuration Change Summary.................................. 107Virtual Host Disk Configuration Change Details.............................. 107Virtual Host Change Details............................................................107Virtual Host Last 10 Changes Details..............................................108Virtual Host Network Interface Configuration Change Details..........108VNX/CLARiiON Change Details....................................................... 108VNX/CLARiiON Change Summary....................................................109VNX/CLARiiON Last 10 Change Details........................................... 109

Chargeback system templates.....................................................................109Chargeback Details........................................................................ 110Chargeback Details By Cost Centre.................................................110Chargeback Details for Cost Centre................................................ 111Chargeback History........................................................................ 111Chargeback Summary.................................................................... 112Chargeback Summary By Cost Centre............................................. 112Chargeback Total Cost Breakdown................................................. 112RecoverPoint Chargeback Details................................................... 112RecoverPoint Chargeback Summary............................................... 113Chargeback Total Cost of Data Retained ........................................ 113

Compliance system templates.....................................................................113Backup and Restore KPIs................................................................113Backup Daily Success Rate Against Target......................................114Backup Daily Success Rate And Data..............................................114Backup Success Rate Against Target.............................................. 114

CONTENTS

6 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 7: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Unprotected/Unconfigured Clients.................................... 114Backup Unsuccessful Clients......................................................... 115Client Additions............................................................................. 115Client Changes...............................................................................115Client Changes Summary............................................................... 115Client Deletions............................................................................. 116Client Modifications....................................................................... 116Clients Without Full Backup............................................................116Compliance Overview.....................................................................116Expired Volumes............................................................................ 116One Strike Failed Clients................................................................ 117One Strike Failed Jobs For Specific Client........................................117Restore Rate Statistics for ruleset...................................................119Strike Summary..............................................................................119Success Rate Against Target for ruleset.......................................... 120Three Strike Failed Clients.............................................................. 120Three Strike Failed Clients for ruleset............................................. 121Three Strike Failed Jobs For Specific Client..................................... 121Top 10 Most Exposed Jobs............................................................. 123Top 5 Most Exposed Jobs............................................................... 123Two Strike Failed Clients................................................................ 123Two Strike Failed Jobs For Specific Client........................................124Unprotected Clients....................................................................... 126Volumes To Be Destroyed...............................................................126

Configuration system templates.................................................................. 126Array Fan-out Ratio.........................................................................126Avamar Retention Policy Configuration...........................................126Backup Client Configuration...........................................................127Backup Client Count.......................................................................129Backup Client Count By OS Type.....................................................130Backup Client Count By Server....................................................... 130Backup Device Config.................................................................... 130Backup Device Config in Jukebox................................................... 131Backup Device Count By Server......................................................132Backup Device Count By Type........................................................ 132Backup Device Writable Count....................................................... 132Backup Group Configuration.......................................................... 132Backup Group Count...................................................................... 134Backup Group Count By Server.......................................................134Backup Job Configuration...............................................................134Backup Jukebox Config.................................................................. 135Backup Jukebox Contents.............................................................. 135Backup Pool Configuration.............................................................136Backup Schedule Configuration..................................................... 138Backup Server Client Group Mapping............................................. 139Backup Server Configuration..........................................................140Backup Server Group Job Mapping................................................. 142Backup Server Server Count........................................................... 142Backup Server Server Count By Application....................................142Backup Server Server Count By Version..........................................142Celerra Filesystem to LUN Mapping................................................ 142Celerra Replication Visualization....................................................142Celerra Storage Pool Configuration.................................................143Celerra Volume Configuration.........................................................143Cluster Application Configuration for Application........................... 144Cluster Configuration..................................................................... 144

CONTENTS

EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7

Page 8: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Data Domain Boost Details.............................................................144Data Domain Boost Files................................................................ 144Data Domain Mtree To Tenant Unit Mapping...................................144Data Domain Network DNS.............................................................145Data Domain NTP Configuration..................................................... 145Data Domain Replication Configuration..........................................145Data Domain Tenant Unit Configuration..........................................145Data Domain VTL Access Group Configuration................................ 146Data Mover Configuration...............................................................146EDL Configuration Options............................................................. 146Enclosure Configuration................................................................. 146Exported LUNs............................................................................... 147Fibre Channel Device Configuration................................................147Fibre Channel Device Mapping....................................................... 147Fileserver Exports...........................................................................148Filesystem Mount Configuration..................................................... 148Imported LUNs............................................................................... 149iSCSI iSNS Configuration................................................................149iSCSI Portal Configuration.............................................................. 149Least LUNs Per Port........................................................................ 150LUN Capacity Per Node...................................................................150LUN Capacity Per Port.....................................................................150LUN Mapping................................................................................. 150LUN Source Ports........................................................................... 150LUN Source Ports for ruleset...........................................................151LUNs Per Node............................................................................... 151LUNs Per Port................................................................................. 151Mirror Configuration.......................................................................151MTree Details.................................................................................151MTree Quota Configuration............................................................ 151NetBackup Catalog File Backup Configuration................................ 152NetBackup Catalog Backup Configuration...................................... 152NetBackup Disaster Recovery Configuration................................... 152NetBackup Disk Pool Configuration................................................ 153NetBackup Disk Volume Configuration........................................... 154NetBackup Global Configuration.................................................... 154NetBackup Lifecycle Policy Configuration....................................... 155NetBackup Lifecycle Policy Destination.......................................... 155NetBackup Media Server Configuration Details.............................. 155NetBackup Server Configuration Details......................................... 156NetBackup Storage Server Configuration........................................156NetBackup Storage Unit Configuration........................................... 157NetBackup Storage Unit Group Configuration................................. 157NetBackup VM Rule Configuration..................................................158Networker Client Storage Nodes Configuration............................... 158NetWorker VBA Configuration.........................................................158RecoverPoint Consistency Group Copy Details................................158RecoverPoint Consistency Group Copy Details for Consistency Group...................................................................................................... 159RecoverPoint Consistency Group Details........................................ 160RecoverPoint Replication Set Configuration....................................161RecoverPoint RPA Details............................................................... 161RecoverPoint Splitter Details.......................................................... 162Remote Mirror Configuration.......................................................... 162Save Pool Configuration................................................................. 162Shared Memory Configuration........................................................162

CONTENTS

8 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 9: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Symmetrix LUN to Data Domain vDisks...........................................163Tape Library Drive Count By Library................................................ 163Tape Library Firmware Summary.....................................................164Tape Library Model Summary......................................................... 164Tape Library Slot Count By Library.................................................. 164TSM Copy Group Configuration.......................................................164TSM Defined Server Configuration.................................................. 165TSM LAN Free Server Configuration.................................................166TSM Management Class Configuration........................................... 166TSM Policy Set Configuration..........................................................167Virtual Data Mover Configuration....................................................167Virtual Host Configuration.............................................................. 167Virtual Host Disk Configuration...................................................... 168Virtual Host Network Interface Configuration.................................. 168Virtualization Manager Configuration............................................. 168VNX/CLARiiON RAID Group Configuration....................................... 169VNX/CLARiiON Storage Pool Configuration..................................... 169Webserver Configuration................................................................170Xsigo Virtual To Physical Port Mapping...........................................170

Data Protection system templates............................................................... 170Active Clone Job Details................................................................. 170Application Exposure for RPO missed ruleset................................. 171Application Exposure for RTE high ruleset.......................................171Avamar Data Retained by Client..................................................... 171Avamar Domain Footprint...............................................................171Avamar Garbage Collection Jobs.....................................................171Avamar Replication Summary ........................................................172Backup 2-Day Comparison............................................................. 173Backup Active Clients.....................................................................173Backup Active Groups.................................................................... 173Backup Active Jobs.........................................................................174Backup All Clients.......................................................................... 174Backup All Groups..........................................................................177Backup All Jobs - No Restarts......................................................... 177Backup All Jobs.............................................................................. 179Backup All Jobs for Specific Client.................................................. 181Backup All Large Jobs.....................................................................184Backup All Long Running Jobs........................................................ 186Backup All Slow Jobs......................................................................188Backup Average Details For Specific Job......................................... 190Backup Average Full Details By Client.............................................191Backup Client Configuration for Pool.............................................. 191Backup Client De-Dupe Rate Distribution........................................193Backup Client De-Dupe Ratios........................................................193Backup Client Size Monthly Comparison........................................ 193Backup Client Summary................................................................. 194Backup Clients Not Backed Up....................................................... 194Backup Cumulative Number Of Completed Jobs............................. 194Backup Cumulative Size Of Completed Jobs................................... 194Backup Data Domain Clone Details................................................ 195Backup Device Configuration for Pool.............................................195Backup Failed Clients.....................................................................196Backup Failed Groups.................................................................... 198Backup Failed Jobs.........................................................................198Backup Failed Jobs For Client......................................................... 201Backup Failed Jobs for Client for ruleset......................................... 202

CONTENTS

EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 9

Page 10: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Failed Jobs for ruleset........................................................ 203Backup Full History of Specific Job................................................. 203Backup Group Configuration for Pool..............................................204Backup Group Job Status Details ................................................... 206Backup Group Status..................................................................... 207Backup Group Summary.................................................................207Backup Hourly Job Status...............................................................207Backup Job Attempts......................................................................208Backup Job Attempts for Specific Job..............................................210Backup Job Change Ratio Aggregate...............................................210Backup Job Change Ratios............................................................. 211Backup Job Change Ratios By Client............................................... 211Backup Job Change Ratios for Client...............................................212Backup Job Configuration for Pool.................................................. 213Backup Job Deduplication Ratio for Client...................................... 213Backup Job Details for Specific Volume.......................................... 213Backup Job Device Mapping...........................................................215Backup Job Error Details.................................................................215Backup Job Error Details for Specific Job.........................................216Backup Job Error Distribution......................................................... 216Backup Job Error Summary............................................................. 216Backup Job Media Details.............................................................. 216Backup Job Status By Server.......................................................... 217Backup Job Summary..................................................................... 217Backup Job Summary for Group Run............................................... 217Backup Last 5 Runs of Job.............................................................. 217Backup Last n Runs of Client.......................................................... 219Backup Last n Successful Runs of Client........................................ 221Backup Last Successful Full Run of Client.......................................223Backup Last Successful Run of Client............................................. 226Backup Last Successful Run of Job................................................. 228Backup Missed Clients...................................................................230Backup Missed Jobs.......................................................................230Backup Open Files......................................................................... 232Backup Open Files for Specific Job................................................. 233Backup Partial Clients.................................................................... 233Backup Partial Groups....................................................................235Backup Problem Clients................................................................. 235Backup Protected versus Avg Incremental...................................... 235Backup Protected versus Backed Up.............................................. 236Backup Report Card....................................................................... 236Backup Replication Sync Times by Client........................................236Backup Restore Details.................................................................. 236Backup Running Jobs..................................................................... 237Backup Server Error Details............................................................ 238Backup Server Group Client Mapping............................................. 238Backup Successful Clients............................................................. 239Backup Successful Groups.............................................................241Backup Successful Jobs................................................................. 241Backup Successful Jobs with failed SLA for ruleset......................... 244Backup to Data Domain - Clients with Low Dedup Ratio..................244Backup Top 10 Largest Clients....................................................... 244Backup Top 10 Least Successful Clients.........................................244Backup Top 10 Longest Running Clients.........................................244Backup Top 10 Most Unreliable Clients.......................................... 245Backup Top 10 Smallest Clients..................................................... 245

CONTENTS

10 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 11: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup VMs Not Backed Up........................................................... 245Clients with Low Dedup Ratio......................................................... 245Clone Attempts.............................................................................. 245Clone Attempts for Specific Clone Operation.................................. 246Clone Job Media Details................................................................. 247Clone Job Media Details for Clone Operation.................................. 247Clone Operations........................................................................... 247Clone Summary..............................................................................248Successful Clone Operations..........................................................248Cloned Job Details..........................................................................249Cloned Job Details For Clone Operation.......................................... 250Estimated Protected Backup Capacity............................................ 250Estimated Protected Backup Capacity Details.................................250Exposure Details............................................................................ 251Exposure Time Exceeds RPO for ruleset.......................................... 251Failed Clone Operations................................................................. 252Failed Maintenance Job Details...................................................... 252Failed Restore Jobs.........................................................................253Failed Staging Operations.............................................................. 254Filesystems Not Backed Up............................................................ 254Historical Successful Jobs.............................................................. 254Hosts Not Backed Up..................................................................... 257Last 10 Failed Backups.................................................................. 257Legato Networker Bootstrap Report................................................ 258Maintenance Job Attempts............................................................. 259Maintenance Job Attempts for Specific Job..................................... 260Maintenance Job Details................................................................ 260Maintenance Job Errors.................................................................. 261Maintenance Job Summary.............................................................261Missed Restore Jobs.......................................................................261NetBackup Backup Job Disk Media Details..................................... 262NetBackup Clone Job Disk Media Details........................................263NetBackup Failed Restarted Clone Operations................................263NetBackup Last Restarted Job for Specific Backup Job....................264NetBackup Last Restarted Job for Specific Clone Operation............ 265NetBackup Last Restarted Job For Specific Job................................266NetBackup Last Restarted Job for Specific Maintenance Job........... 268NetBackup Last Restarted Job for Specific Restore Job....................268NetBackup Last Restarted Job for Specific Vault Job....................... 269NetBackup Restore Job Disk Media Details.....................................270NetBackup Vault Attempts............................................................. 270NetBackup Vault Attempts for Specific Job..................................... 271NetBackup Vault Ejects.................................................................. 272NetBackup Vault Job Disk Media Details.........................................272NetBackup Vault Jobs.....................................................................273NetBackup Vault Preview............................................................... 273Networker Data Domain Details for Job...........................................274Networker Data Domain Details for Server...................................... 274Networker Job Size by Client for Data Domain.................................275RecoverPoint Protected Capacity.................................................... 275Restore Job Attempts......................................................................275Restore Job Attempts for Specific Job..............................................276Restore Job Error Details.................................................................277Restore Job Error Details For Specific Job........................................ 277Restore Job Media Details.............................................................. 277Restore Job Summary..................................................................... 278

CONTENTS

EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 11

Page 12: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Restore Top 10 Largest Clients....................................................... 278Restore Top 10 Least Successful Clients.........................................278Snap Job Details.............................................................................278Snap Job Summary.........................................................................280Staging Media Details.................................................................... 280Staging Operations........................................................................ 281Staging Summary...........................................................................281Successful Maintenance Job Details...............................................281Successful Restore Jobs................................................................. 282Successful Staging Operations.......................................................283Top 10 Backup Clients By Avg Daily Change................................... 283Top 10 Backup Clients with Best De-Dupe Rate.............................. 284Top 10 Backup Clients with Worst De-Dupe Rate............................ 284TSM Backup Set Details................................................................. 284TSM Command Event Details..........................................................285TSM Database Backup Errors......................................................... 285TSM Database Backups..................................................................285TSM Delete Volumes...................................................................... 286TSM Expiration Errors..................................................................... 286TSM Expirations............................................................................. 286TSM Failed Migration Jobs.............................................................. 287TSM Failed Reclamation Jobs..........................................................287TSM Migrated Item Count by Storage Pool...................................... 288TSM Migrated Size by Storage Pool................................................ 288TSM Migration Errors For Specific Job............................................. 288TSM Migration Jobs........................................................................ 288TSM Migration Summary................................................................ 289TSM Move Errors............................................................................ 289TSM Moves.................................................................................... 289TSM Reclaimed Item Count by Storage Pool....................................290TSM Reclaimed Size by Storage Pool.............................................. 290TSM Reclamation Errors For Specific Job......................................... 290TSM Reclamation Jobs....................................................................290TSM Reclamation Summary............................................................291TSM Storage Pool Copies............................................................... 291TSM Storage Pool Copy Errors.........................................................292TSM Successful Migration Jobs.......................................................292TSM Successful Reclamation Jobs.................................................. 292TSM Top 10 Backups with Worst Idle Wait Times............................ 293TSM Top 10 Backups with Worst Media Wait Times........................ 293TSM Top 10 Clients with Worst Idle Wait Times...............................294TSM Top 10 Clients with Worst Media Wait Times........................... 294Uncloned Backups......................................................................... 294Vault Job Media Details.................................................................. 296

Database system templates........................................................................ 296All Database Changes.................................................................... 296Connection Status..........................................................................297Control File Details......................................................................... 297Database Change Summary........................................................... 297Database Config Changes for ruleset..............................................298Database Details............................................................................298Database Details For Server........................................................... 298Database Last 10 Changes.............................................................299Database Parameter Change Details.............................................. 299Database Parameters.....................................................................299Database Schema Details For Server.............................................. 299

CONTENTS

12 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 13: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Database Server Details................................................................. 300Database Server Parameter Change Details....................................300Database Server Parameters.......................................................... 300Datafile Configuration Change Details............................................ 300Datafile Details.............................................................................. 301Datafile Details for Database..........................................................301Datafile Details for Tablespace.......................................................302Datafile Utilization......................................................................... 302Datafile Utilization Trend Chart.......................................................303Datafile Utilization for Tablespace..................................................303Index Configuration Change Details................................................303Index Details For Database.............................................................304Index Details For Schema............................................................... 304Index Details For Tablespace..........................................................304Index Details for Table....................................................................305Logfile Configuration Change Details..............................................305Logfile Details................................................................................ 305Partition Details for Database.........................................................306Partition Details for Index...............................................................306Partition Details for Table............................................................... 306Table Configuration Change Details................................................307Table Details for Database............................................................. 307Table Details for Schema................................................................307Table Details for Tablespace.......................................................... 308Tablespace Configuration Change Details...................................... 308Tablespace Details.........................................................................309Tablespace Details for Database.................................................... 309Tablespace Utilization....................................................................309Top 10 Growing Tables by Rows..................................................... 310Top 10 Largest Database Tables By Row Count...............................310Top 10 Largest Database Tables By Size.........................................310

DPA system templates.................................................................................311Agent Errors................................................................................... 311Analysis Engine History.................................................................. 311Analysis Engine Performance......................................................... 311DPA Client License Details for ruleset............................................. 312DPA Collector Log...........................................................................312DPA Listener Latency......................................................................312DPA Listener Request Rate............................................................. 312DPA Reporter Median Report Run Time........................................... 312DPA Server Logs............................................................................. 313HTTP Request Performance Statistics............................................. 313Listener Performance..................................................................... 313Node List....................................................................................... 314Node Topology...............................................................................314Objects with Replication Exposures................................................314Publisher Performance................................................................... 314Replication Alerts by Age by Group.................................................314Replication Alerts by Group............................................................ 315Report History................................................................................ 315Request History..............................................................................315Scheduled Report History...............................................................316Unsupported Agents...................................................................... 316

Licensing system templates........................................................................ 316Expired Licenses for ruleset............................................................316License Conformance.....................................................................316

CONTENTS

EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 13

Page 14: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

License Details...............................................................................317License Details - Expired................................................................ 317License Summary...........................................................................317Nearly Expired Licenses for ruleset................................................. 318

Media management system templates........................................................ 318Backup Device Number Of Volumes Mounted By Device.................318Backup Device Number Of Volumes Mounted By Node...................318Backup Device Number Of Volumes Mounted Daily By Device........ 318Backup Jukebox Number Of Volumes Mounted Daily...................... 319Empty Media By Jukebox................................................................ 319Empty Media By Jukebox RAG.........................................................319Empty Media by Pool and Jukebox..................................................319Media Age Distribution...................................................................319Media Contents..............................................................................319Media Count.................................................................................. 320Media Count Available Volumes By Jukebox................................... 320Media Count By Jukebox and State.................................................320Media Count By Pool...................................................................... 321Media Count By Pool and State...................................................... 321Media Count By Pool and State for ruleset......................................321Media Count By Server................................................................... 321Media Count By State.....................................................................321Media Count of Offline Expired Volumes.........................................322Media Count of Online/Offline Volumes......................................... 322Media Count Volumes Used By Jukebox......................................... 322Media Details.................................................................................322Media Details For Cleaning Tapes...................................................323Media Details For Empty Volumes.................................................. 324Media Details For Frozen Volumes..................................................325Media Details For Full Volumes.......................................................327Media Details For Offline Expired Volumes..................................... 328Media Details for Offline Volumes.................................................. 329Media Details For Online Volumes..................................................330Media Details For Partial Volumes.................................................. 331Media Details For Used Volumes.................................................... 332Media Details of Available Volumes............................................... 333Media Details Top 10 Oldest Volumes............................................ 334Media Details With Retention Over 8 Years.....................................335Media Retention Distribution......................................................... 336Media Size Distribution..................................................................336Media Summary.............................................................................337Media Usage..................................................................................337Media Usage By Pool......................................................................337Media Usage By Server...................................................................337Media Reclamation Distribution..................................................... 337RPO Violation Details..................................................................... 337Root Cause.....................................................................................338Root Cause for CG Details...............................................................338Root Cause for Job Details.............................................................. 338TSM DR Media................................................................................339Volume Expiration Report...............................................................339

Operations system templates......................................................................339Backup Device Availability............................................................. 339Backup Device Availability By Server..............................................339Backup Device Availability RAG...................................................... 340Backup Mount Requests................................................................ 340

CONTENTS

14 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 15: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Empty Media plus Device Availability............................................. 340Performance system templates................................................................... 340

Aggregate Disk Activity...................................................................341Aggregate Disk Operations.............................................................341Aggregate Disk Performance.......................................................... 341Aggregate Fibre Channel Device Performance.................................341Aggregate Fibre Channel Port Performance..................................... 341Aggregate LUN Performance........................................................... 341Aggregate Processor Utilization......................................................342Aggregate Tape Drive Performance................................................. 342Aggregate Tape Library Drive Performance......................................342Aggregate Virtual Fibre Channel Port Performance.......................... 342Backup Client Performance Distribution......................................... 342Backup Client Slowest/Fastest Jobs for Client................................ 342Backup Device Avg/Max Throughput by Device.............................. 344Backup Device Performance Summary........................................... 344Backup Device Performance Summary By Device............................345Backup Device Throughput Aggregate............................................ 345Backup Device Throughput by Device.............................................345Backup Device Throughput for Device............................................ 345Backup Top 10 Fastest Clients........................................................346Backup Top 10 Slowest Clients...................................................... 346Celerra Replication Performance.................................................... 347Celerra Replication Performance Summary..................................... 347Data Domain Average Replicated Capacity..................................... 347Data Domain Data Transfer Rate.....................................................347Data Domain Replication Time Lag ................................................ 348Disk Activity By Disk.......................................................................348Disk Activity By Host...................................................................... 348Disk Operations by Disk................................................................. 348Disk Operations by Host.................................................................348Disk Performance By Disk...............................................................349Disk Performance By Host.............................................................. 349DPA Reporter Median Report Run Time........................................... 349Fibre Channel Device Performance................................................. 349Fibre Channel Device Performance By Node....................................349Fibre Channel Device Performance Summary..................................350Fibre Channel Port Performance..................................................... 350Fibre Channel Port Performance By Node........................................350Fibre Channel Port Performance By Port..........................................350Fileserver Average Response Times................................................ 351Fileserver Cache Hit Rates.............................................................. 351Fileserver Cache Hit Rates By Node................................................ 351Fileserver Client Performance......................................................... 351Fileserver Data Throughput............................................................ 351Fileserver Data Throughput By Protocol.......................................... 352Fileserver Filesystem Performance..................................................352Fileserver Operations..................................................................... 352Fileserver Operations By Protocol................................................... 352Fileserver Operations with Direction............................................... 353Fileserver Performance Summary................................................... 353Filesystem Disk Performance..........................................................353Filesystem Operations By Partition................................................. 354Filesystem Operations by Direction................................................ 354Filesystem Performance Summary..................................................354Filesystem Throughput by Partition................................................ 354

CONTENTS

EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 15

Page 16: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Filesystem Throughput with Direction.............................................355Host Performance...........................................................................355Host Performance During Backup................................................... 355Host Performance For Client........................................................... 355LUN Operations..............................................................................356LUN Operations By LUN.................................................................. 356LUN Performance........................................................................... 356LUN Performance By Node..............................................................356LUN Throughput............................................................................. 357LUN Throughput By LUN................................................................. 357Mirror Performance........................................................................ 357Process Memory Usage For Specific Process...................................357Processor Utilization By CPU.......................................................... 357Processor Utilization By Node........................................................ 358RecoverPoint Consistency Group Data Lag......................................358RecoverPoint Consistency Group High Load Ratio...........................358RecoverPoint Consistency Group Incoming Write Rates.................. 358RecoverPoint Consistency Group Incoming Write Rates for Last Day...................................................................................................... 359RecoverPoint Consistency Group Journal Lag.................................. 359RecoverPoint Consistency Group Throughput................................. 359RecoverPoint Consistency Group Time Lag..................................... 359RecoverPoint Consistency Group Transaction Lag...........................360RecoverPoint RPA Compression......................................................360RecoverPoint RPA Latency.............................................................. 360RecoverPoint RPA Throughput........................................................ 360RecoverPoint RPA Writes................................................................ 361RecoverPoint RPA Site Compression...............................................361RecoverPoint RPA Site Latency....................................................... 361RecoverPoint RPA Site Packet Loss.................................................361RecoverPoint RPA Site Throughput................................................. 361RecoverPoint RPA WAN Throughput................................................ 362RecoverPoint RPA WAN Throughput for Last Day............................. 362Remote Mirror Performance............................................................362Server Performance During Backup................................................ 362Solid State Storage Performance.................................................... 363Tape Drive Performance By Drive.................................................... 363Tape Drive Performance By Node....................................................363Tape Drive Performance Summary.................................................. 363Tape Drive Throughput on Server During Backup............................ 364Tape Library Drive Performance...................................................... 364Tape Library Drive Performance By Node........................................ 364Tape Library Drive Performance Summary.......................................364Total Throughput............................................................................365Virtual Fibre Channel Port Performance By Node.............................365Virtual Fibre Channel Port Performance By Port...............................365Virtual Host Disk Performance........................................................365Virtual Host Network Interface Performance................................... 366Virtual Host Processor Utilization................................................... 366Webserver Response Time............................................................. 366Xsigo Aggregate Infiniband Port Performance................................. 366Xsigo Infiniband Port Performance by Node....................................366Xsigo Infiniband Port Performance by Port......................................367Xsigo Virtual Port Queue Depth Summary.......................................367

Provisioning system templates....................................................................367Fileserver Top 10 Most Available Aggregates.................................. 367

CONTENTS

16 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 17: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Recoverability system templates................................................................. 368All Nodes Of Type Symmatrix CG.................................................... 368Masking Configuration for Storage Array........................................ 368Masking Configuration for Initiator................................................. 368MirrorView Configuration................................................................369MirrorView/A Performance............................................................. 369MirrorView/A Performance for CG................................................... 370RDF Configuration.......................................................................... 370RDF Configuration for CG................................................................ 371RDF Configuration for DG................................................................371RDFG Configuration........................................................................ 372RDFG Performance......................................................................... 372Recoverability Detailed Exposures..................................................372Recoverability Detailed Exposures for ruleset................................. 373Recoverability Replicated Object Process View...............................373Recoverability Replicated Object Storage Mapping.........................374Recoverability Excludes..................................................................374Recoverability Exposures Summary................................................ 375Recoverability Gaps....................................................................... 375Recoverability Host Analysis Status................................................376Recoverability Obsolete Recovery Points........................................ 376Recoverability Replication Configuration........................................ 376Server to Storage Configuration......................................................377Recoverability Server To Storage Mappings Topology..................... 377Recoverability Status..................................................................... 377Recoverability Status By Object......................................................377Recoverability Status Monitor By Client.......................................... 378Recoverability Storage To Server Mappings Topology..................... 378Recoverability Tasks ......................................................................378Recoverability Unprotected Nodes................................................. 378Recoverability Visualization........................................................... 378Recoverability Visualization Details................................................379Remote Replication RPO for MV/A.................................................. 379Remote Replication RPO for SRDF/A............................................... 379Remote Replication RPO forecast for MV/A.....................................380Remote Replication RPO forecast for SRDF/A.................................. 380Replication RPO Compliance.......................................................... 380Storage Replication Status............................................................. 381

Resource Utilization system templates........................................................ 381Aggregate Network Interface Performance...................................... 381Aggregate Virtual Network Interface Performance........................... 381BTD Storage Utilization By Node.....................................................381Backup Client Occupancy...............................................................382Backup Client Occupancy by Pool.................................................. 382Backup Device Utilization by Device...............................................382Backup Server Utilization............................................................... 382CG Utilization................................................................................. 382Client Occupancy Summary............................................................383Client Occupancy Trend..................................................................383Current Memory Usage By Node..................................................... 383Data Domain Average Hourly Data Ingested....................................383Data Domain Boost Statistics.........................................................383Data Domain Boost Storage Unit Statistics..................................... 384Data Domain Client Deduplication Ratio.........................................384Data Domain Compression Factor...................................................384Data Domain Daily Compression Statistics..................................... 384

CONTENTS

EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 17

Page 18: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Data Domain Data Ingested............................................................385Data Domain Data Written To......................................................... 385Data Domain DeDuplication Ratio.................................................. 385Data Domain File Distribution By Count ......................................... 385Data Domain File Distribution By Size ............................................386Data Domain Reduction Ratios....................................................... 386Data Domain System Utilization..................................................... 386Data Domain Utilization................................................................. 386DataProtector Database Usage.......................................................387DataProtector System Dynamics.....................................................387EDL 3D Compression Ratio............................................................. 387EDL 3D DeDupe Queue...................................................................388EDL 3D Total Reduction Ratio......................................................... 388Fabric Utilization............................................................................ 388Fibre Channel Port Utilization......................................................... 388Filesystem Aggregate Utilization.....................................................388Filesystem Average Disk Activity.....................................................388Filesystem Average Disk Activity for ruleset.................................... 389Filesystem Disk Activity..................................................................389Filesystem Peak Snapshot Utilization.............................................389Filesystem Snapshot Utilization..................................................... 389Filesystem Utilization..................................................................... 389Filesystem Utilization By Node....................................................... 390Filesystem Utilization By Partition.................................................. 390Filesystem Utilization Current.........................................................390Filesystem Utilization for ruleset.................................................... 390HP VLS Capacity Utilization Trend...................................................391HP VLS Throughput........................................................................ 391MTree Daily Compression Statistics................................................391MTree Quota Utilization..................................................................391Memory Utilization.........................................................................391Memory Utilization By Node........................................................... 391Memory Utilization Current.............................................................392Network Interface Performance By Interface................................... 392Network Interface Performance By Node.........................................392Network Interface Performance Summary....................................... 392Network Interface Utilization By Interface and Direction................. 393NetWorker VBA Utilization..............................................................393Process CPU Utilization.................................................................. 393Process CPU Utilization For Specific Process...................................393Process Memory Usage.................................................................. 393RecoverPoint Journal Utilization..................................................... 394System Statistics RAG.................................................................... 394TSM Client Occupancy Summary.................................................... 394TSM Database Utilization............................................................... 394TSM Storage Pool Utilization.......................................................... 395Tape Library Aggregate Utilization.................................................. 395Tape Library Aggregate Utilization Trend.........................................395Tape Library Capacity Utilization.................................................... 395Tape Library Compression Ratio..................................................... 395Tape Library Deduplication Ratio....................................................396Tape Library Slot Utilization Trend.................................................. 396Tape Library Throughput.................................................................396Tape Library Usage By Library.........................................................396Tape Library Utilization...................................................................397Tape Library Utilization Trend......................................................... 397

CONTENTS

18 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 19: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Tape Library Volume Utilization Trend............................................ 397Top 10 Offending Clients................................................................397Top 10 Offending Jobs....................................................................398Top 5 Busiest Servers.....................................................................398VTL Aggregate Storage Utilization...................................................398Virtual Fibre Channel Port Utilization.............................................. 398Virtual Host Memory Utilization......................................................398Virtual Network Interface Performance By Interface........................ 399Virtual Network Interface Performance By Node..............................399Virtual Network Interface Performance Summary............................ 399Xsigo Infiniband Port Utilization..................................................... 399

ROI system templates..................................................................................400Deduplication Cost Savings............................................................400Deduplication ROI Trend................................................................ 400

Scheduling system templates..................................................................... 400Active Clone Job Distribution.......................................................... 401Backup Active Job Distribution....................................................... 401Backup Client Schedule................................................................. 401Backup Device Scheduling.............................................................403Backup Device Shared Usage.........................................................403Backup Device Usage.....................................................................403Backup Group Forecast.................................................................. 403Backup Job Distribution................................................................. 404Backup Job Distribution By Media Server........................................404Backup Job Forecast.......................................................................404Backup Job Forecast versus Actual................................................. 404Backup Job Forecast versus Actual Summary..................................405Backup Job Schedule..................................................................... 405Backup Job Schedule For Specific Client.........................................407Backup Size Distribution................................................................409Backup Size Distribution By Media Server...................................... 410Maintenance Job Schedule.............................................................410TSM Server Side Process Scheduling..............................................410TSM Storage Pool Migration Schedule............................................ 410TSM Storage Pool Reclamation Schedule....................................... 411

Service Level Management system templates..............................................411Backup Daily Success Rate.............................................................411Backup Jobs with Last Resolution...................................................411Clone SLA Status............................................................................413Backup SLA Summary.................................................................... 414Backup SLA Summary By Client......................................................415Restore Jobs with Last Resolution...................................................415

Status system templates............................................................................. 417ACSLS ACS Status.......................................................................... 417ACSLS Lock Status......................................................................... 417ACSLS Port Status.......................................................................... 417ACSLS Server Status.......................................................................418Backup Client Physical Occupancy................................................. 418Backup Client Status......................................................................418Backup Device Downed Devices.....................................................418Backup Device Errors..................................................................... 419Backup Device Status.................................................................... 419Backup Pool Status........................................................................420Backup Server Error Summary........................................................ 421Backup Server Status..................................................................... 421Backup Unavailable Device Count for ruleset................................. 421

CONTENTS

EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 19

Page 20: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Battery Status................................................................................ 421Battery Summary............................................................................422BTD Capacity..................................................................................422BTD Health Status.......................................................................... 422BTD Usage..................................................................................... 422Card Status.................................................................................... 422Celerra Replication Status.............................................................. 423Client Occupancy........................................................................... 423Client Occupancy by Server Trend.................................................. 423Cluster Resource Status................................................................. 423Cluster Status for Cluster................................................................424Collector Status for ruleset............................................................. 424Data Domain Active Streams.......................................................... 424Data Domain Boost Option Status.................................................. 424Data Domain Filesystem Archive Unit Status.................................. 425Data Domain Filesystem Cleaning Status........................................425Data Domain Filesystem Options....................................................425Data Domain Modes.......................................................................425Data Domain System Capacity Licenses......................................... 426Data Domain System Licenses....................................................... 426Data Domain System User Status................................................... 426DataProtector Database Status...................................................... 426DataProtector Datafile Usage......................................................... 426DataProtector Purge Preview.......................................................... 427DataProtector Record File Usage.....................................................427DataProtector Service Status..........................................................427Device Availability for ruleset......................................................... 427Disk Array Status............................................................................428Disk Failed for ruleset.....................................................................428Disk Status.................................................................................... 428EDL Failover Status.........................................................................428Fan Status......................................................................................429Fan Summary................................................................................. 429Fibre Channel Port Status............................................................... 429Fibre Channel Port Summary By Node.............................................430Fileserver Status............................................................................ 430Filesystem Disk Status................................................................... 430Filesystem Quota Status.................................................................430Filesystem Snapshot Status........................................................... 431Filesystem Status...........................................................................431Filesystem Status Summary........................................................... 432Host Status.................................................................................... 432IP Duplex Mismatch for ruleset.......................................................432iSCSI Status................................................................................... 432LUN Status..................................................................................... 433MTree Retention Lock Status.......................................................... 433Mirror Status.................................................................................. 433NetBackup Device Cleaning Status.................................................434NetBackup Disk Pool Status........................................................... 434NetBackup Disk Volume Status...................................................... 434NetBackup Storage Server Status...................................................435Network Interface Link Pair.............................................................435Network Interface Link Pair Autonegotiation Status........................ 435Network Interface Link Pair Duplex Status...................................... 436Network Interface Status................................................................ 436Network IP Configuration................................................................437

CONTENTS

20 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 21: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Network IP Configuration for IP.......................................................437Orphaned LUNs..............................................................................437Process Count................................................................................ 438Process Count By Host................................................................... 438Process Count Current....................................................................438Process Status............................................................................... 438Processor Status............................................................................ 439Processor Status Details................................................................ 439PSU Status.....................................................................................439PSU Summary................................................................................ 439RecoverPoint Consistency Group Copy Status.................................439RecoverPoint Consistency Group Copy Status for Active RPAs.........440RecoverPoint Event Details.............................................................441RecoverPoint Event Summary......................................................... 441RecoverPoint Last 10 Event Details.................................................441RecoverPoint RPA Active Consistency Groups................................. 442RecoverPoint Volumes................................................................... 442RecoverPoint Volumes for Replication Sets.....................................442Remote Mirror Status..................................................................... 443Replication Status..........................................................................443Tape Drive Cleaning Summary........................................................ 443Tape Drive Count By State.............................................................. 443Tape Drive Count By Status............................................................ 443Tape Drive Status........................................................................... 444Tape Library CAP Status................................................................. 444Tape Library CAP Status Summary.................................................. 444Tape Library Empty Volume Count.................................................. 445Tape Library Slot Status................................................................. 445Tape Library Status Details.............................................................445Tape Library Status Summary......................................................... 446Tape Library Volume Status............................................................446Thermometer Status.......................................................................447Thermometer Summary.................................................................. 447Thermometer Trend........................................................................447Thermometer Trend for Specific Thermometer................................ 447TSM Client Filespaces.................................................................... 447TSM Client Occupancy....................................................................448TSM Database Status..................................................................... 448TSM Database Usage..................................................................... 449TSM Database Volume Status........................................................ 449TSM Defined Server Status............................................................. 449TSM Identify Duplicate Process Details...........................................450TSM Identify Duplicate Process Trend.............................................450TSM Replication Node Status......................................................... 450TSM Replication Process Details.....................................................451TSM Replication Process Summary.................................................451TSM Device Path Status..................................................................452TSM Filespace Summary.................................................................452TSM LAN Free Server Status............................................................452TSM Recovery Log Usage................................................................453Virtual Host Top 10 Longest Time Since Last Power On................... 453VTL Status......................................................................................453Xsigo Infiniband Port Status........................................................... 454

Troubleshooting system templates..............................................................454Aggregate Fibre Channel Port Errors................................................454Fibre Channel Port Errors By Node.................................................. 454

CONTENTS

EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 21

Page 22: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Fibre Channel Port Errors By Port.................................................... 454Network Interface Errors................................................................. 455Network Interface Errors By Interface..............................................455Network Interface Errors By Interface for ruleset............................. 455Network Interface Errors By Node................................................... 456RecoverPoint RPA Packet Loss........................................................456Tape Drive Error Count....................................................................456Tape Drive Error Count By Node...................................................... 456Tape Drive Error Trend.................................................................... 456Tape Library Errors......................................................................... 457

Viewlet system templates............................................................................457Backup KPIs...................................................................................457Backup Size Distribution for Backup KPIs.......................................457Data Backed Up Daily for Backup KPIs............................................458Data Collection Agent Errors...........................................................458Data Collection Agent Health..........................................................458Data Collection Agents Down......................................................... 458Objects Not Meeting RPOs..............................................................458RecoverPoint Protected Capacity by System................................... 458RecoverPoint Protected Capacity by CG.......................................... 459Unprotected Clients for Backup KPIs.............................................. 459

CONTENTS

22 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 23: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Preface

As part of an effort to improve its product lines, EMC periodically releases revisions of itssoftware and hardware. Therefore, some functions described in this document might notbe supported by all versions of the software or hardware currently in use. The productrelease notes provide the most up-to-date information on product features.

Contact your EMC technical support professional if a product does not function properlyor does not function as described in this document.

Note

This document was accurate at publication time. Go to EMC Online Support (https://support.emc.com) to ensure that you are using the latest version of this document.

PurposeThis document provides a reference of all the predefined system reports that are installedwith DPA.

The management system governing the design and development of this product is ISO9001:2008 certified.

AudienceThis document is intended for system administrators. Readers of this document must befamiliar with the following tasks:

l Identifying the different hardware and software components that make up the backupand replication environment.

l Following procedures to configure backup and replication operations.

l Following guidelines to locate problems and implement solutions.

Revision historyThe following table presents the revision history of this document.

Table 1 Revision history

Revision Date Description

01 October 29, 2015 First release of this document for EMC Data ProtectionAdvisor 6.2 SP2

02 February 15, 2016 Addition of the following reports:

l Backup Jobs with Last Resolution on page 411

l Restore Jobs with Last Resolution on page 415

03 March 25, 2016 Update to Overview on page 28

Related documentationThe DPA documentation set includes the following publications:

l EMC Data Protection Advisor Custom Reporting Guide

l EMC Data Protection Advisor Data Collection Reference Guide

EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 23

Page 24: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l EMC Data Protection Advisor Installation and Administration Guide

l EMC Data Protection Advisor Migrator Technical Notes

l EMC Data Protection Advisor online help system

l EMC Data Protection Advisor Product Guide

l EMC Data Protection Advisor Release Notes

l EMC Data Protection Advisor Report Reference Guide

l EMC Programmers' Guide to Using DPA REST API

l EMC Data Protection Advisor Software Compatibility Guide

l Other Technical Notes/White Papers

Special notice conventions that are used in this documentEMC uses the following conventions for special notices:

NOTICE

Addresses practices that are not related to personal injury.

Note

Presents information that is important, but not hazard-related.

Typographical conventionsEMC uses the following type style conventions in this document:

Table 2 Style conventions

Bold Used for names of interface elements, such as names of buttons, fields,tab names, and menu paths (what the user specifically selects orclicks)

Italic Used for full titles of publications that are referenced in text

Monospace Used for:

l System code

l System output, such as an error message or script

l Pathnames, file names, prompts, and syntax

l Commands and options

Monospace italic Used for variables

Monospace bold Used for user input

[ ] Square brackets enclose optional values

| Vertical bar indicates alternate selections - the bar means “or”

{ } Braces enclose content that the user must specify, such as x or y or z

... Ellipses indicate non-essential information that is omitted from theexample

Where to get helpEMC support, product, and licensing information can be obtained as follows:

Preface

24 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 25: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Product informationFor documentation, release notes, software updates, or information about EMC products,go to EMC Online Support at https://support.emc.com.

Technical supportGo to EMC Online Support and click Service Center. Several options for contacting EMCTechnical Support appear on the site. Note that to open a service request, you must havea valid support agreement. Contact your EMC sales representative for details aboutobtaining a valid support agreement or with questions about your account.

Online communitiesGo to EMC Community Network at https://community.emc.com for peer contacts,conversations, and content on product support and solutions. Interactively engage onlinewith customers, partners, and certified professionals for all EMC products.

Your commentsYour suggestions help to improve the accuracy, organization, and overall quality of theuser publications. Send your opinions of this document to [email protected].

Preface

EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 25

Page 26: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Preface

26 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 27: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

CHAPTER 1

Introduction

This chapter contains the following topic:

l Overview............................................................................................................... 28

Introduction 27

Page 28: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

OverviewDPA includes several hundred predefined system templates and control panels, whichyou can use to run reports on selected users in your backup and replication environment.Use these system templates to quickly and easily retrieve information and monitor yourenvironment.

This document provides reference information on the predefined system templatesorganized as follows:

l The reports that are available by object supported by DPA.

l The system templates that are available in DPA and the reports within each systemtemplate.

l The reports that are available through the Run Reports area and the system templatethat is used to generate the report.

Introduction

28 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 29: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

CHAPTER 2

DPA Reports

This chapter contains the following topics:

l Overview............................................................................................................... 30l Run Reports area menu items................................................................................30

DPA Reports 29

Page 30: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

OverviewThis appendix lists the reports that are available through the Run Reports area and showsthe system template that is used to generate the report. Reports by System Template onpage 63 provides detailed information on the system templates available in DPA.

Reports provide detailed information derived from the various objects in the DPA objectinventory. When a report menu item is selected, the appropriate objects are passed to asystem template which defines how the report is generated. The report results are thendisplayed. You can run reports on group objects or on single objects. When generating areport from a group object, all objects within the group are passed to the system templateand the report results include data for all of the hosts within that group.

The contents of the Run Reports area that displays varies depending on the object that isselected.

Run Reports area menu itemsThe following table lists the available Run Reports area menu items.

Table 3 Run Reports area menu items

Run Reports area menu Item System Template used to generate the report

Access Group Configuration Data Domain VTL Access Group Configuration on page146

ACSLS ACS Status ACSLS ACS Status on page 417

ACSLS Lock Status ACSLS Lock Status on page 417

ACSLS Port Status ACSLS Port Status on page 417

ACSLS Server Status ACSLS Server Status on page 418

Active Clients Backup Active Clients on page 173

Active Clone Job Distribution Active Clone Job Distribution on page 401

Active Clones Active Clone Job Details on page 170

Active Job Distribution Backup Active Job Distribution on page 401

Active Jobs Backup Active Jobs on page 174

Active Streams Data Domain Active Streams on page 424

Aggregate Data Change Ratio Backup Job Change Ratio Aggregate on page 210

Aggregate Device Throughput Backup Device Throughput Aggregate on page 345

Aggregate Disk Activity Aggregate Disk Activity on page 341

Aggregate Disk Performance Aggregate Disk Performance on page 341

Aggregate Fibre Channel DevicePerformance

Aggregate Fibre Channel Device Performance on page 341

Aggregate Fibre Channel Port Errors Aggregate Fibre Channel Port Errors on page 454

Aggregate Fibre Channel PortPerformance

Aggregate Fibre Channel Port Performance on page 341

DPA Reports

30 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 31: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Aggregate Infiniband PortPerformance

Xsigo Aggregate Infiniband Port Performance on page 366

Aggregate Network Interface Errors Network Interface Errors on page 455

Aggregate Network InterfacePerformance

Aggregate Network Interface Performance on page 381

Aggregate Processor Utilization Aggregate Processor Utilization on page 342

Aggregate Status NetBackup Device Cleaning Status on page 434

Aggregate Tape Drive Performance Aggregate Tape Drive Performance on page 342

Aggregate Utilization Filesystem Aggregate Utilization on page 388

Aggregate Utilization By Aggregate Network Interface Performance By Interface on page 392

Aggregate Virtual Fibre Channel PortPerformance

Aggregate Virtual Fibre Channel Port Performance on page342

Aggregate Virtual Network InterfacePerformance

Aggregate Virtual Network Interface Performance on page381

Alerts During Backup Analysis Events During Backup

All Media Details on page 322

All Clients Backup All Clients on page 174

All Groups Backup All Groups on page 177

All Jobs Backup All Jobs on page 179

All Jobs - No Restarts Backup All Jobs - No Restarts on page 177

All Maintenance Jobs Maintenance Job Details on page 260

Analysis Engine History Analysis Engine History on page 311

Analysis Engine Performance Analysis Engine Performance on page 311

Application Configuration Cluster Application Configuration for Application on page144

Application Configuration Changesfor Pools

Backup Application Configuration Changes for Pools onpage 95

Application Error Details Backup Server Error Details on page 238

Application Growth Application Growth on page 80

Application Usage Application Usage on page 81

Application Usage Storage Pool Application Usage on page 92

Array Fan-out Ratio Array Fan-out Ratio on page 126

Attempts Clone Attempts for Specific Clone Operation on page 246

Attempts Restore Job Attempts for Specific Job on page 276

Audit User Changes Avamar Audit User Changes Details on page 94

DPA Reports

Run Reports area menu items 31

Page 32: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Available Media Details of Available Volumes on page 333

Available Volumes Media Details of Available Volumes on page 333

Average Hourly Data Ingested Data Domain Average Hourly Data Ingested on page 383

Average Job Run Backup Average Details For Specific Job on page 190

Backup and Restore KPIs Backup and Restore KPIs on page 113

Backup Client Deduplication RatioDetails

Backup Client De-Dupe Ratios on page 193

Backup Client Occupancy Backup Client Occupancy on page 382

Backup Device Status Backup Device Status on page 419

Backup Job Details for Volume Backup Job Details for Specific Volume on page 213

Backup Job Devices Backup Job Device Mapping on page 215

Backup Job Error Details Backup Job Error Details on page 215

Backup Job Error Distribution Backup Job Error Distribution on page 216

Backup Job Error Summary Backup Job Error Summary on page 216

Backup Server Details Backup Server Configuration on page 140

Backup Jobs with Last Resolution Backup Jobs with Last Resolution on page 411

Battery Configuration Battery Configuration on page 64

Battery Status Battery Status on page 421

Boost Files Data Domain Boost Files on page 144

Boost File Replication Statistics Data Domain Boost Statistics on page 383

Boost File Unit Statistics Data Domain Boost Storage Unit Statistics on page 384

Boost Option Status Data Domain Boost Option Status on page 424

Capacity Overview Network Interface Configuration on page 76

Capacity Overview for Block Capacity Overview for Block on page 86

Capacity Overview for File Capacity Overview for File on page 86

Capacity Utilization HP VLS Capacity Utilization Trend on page 391

Card Configuration Card Configuration on page 64

Card Status Card Status on page 422

Catalog Backup Configuration NetBackup Catalog Backup Configuration on page 152

Catalog File Backup Configuration NetBackup Catalog File Backup Configuration on page152

CG Utilization CG Utilization on page 382

Change Details BTD Change Details on page 99

Change Ratios By Client Backup Job Change Ratios By Client on page 211

DPA Reports

32 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 33: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Change Ratios By Job Backup Job Change Ratios for Client on page 212

Change Ratios By Job Backup Job Change Ratios on page 211

Chargeback Details By Cost Centre Chargeback Details By Cost Centre on page 110

Chargeback Details RecoverPoint Chargeback Details on page 112

Chargeback Details By Client Chargeback Details on page 110

Chargeback Total Cost of DataRetained

Chargeback Total Cost of Data Retained on page 113

Chargeback Summary Chargeback Summary on page 112

Chargeback Summary RecoverPoint Chargeback Summary on page 113

Chargeback Summary By Cost Centre Chargeback Details By Cost Centre on page 110

Cleaning Tapes Media Details For Cleaning Tapes on page 323

Client Configuration Backup Client Configuration for Pool on page 191

Client Configuration Change Details Backup Client Configuration Change Details on page 95

Client Configuration Changes Client Changes on page 115

Client Count Backup Client Count on page 129

Client Count By OS Type Backup Client Count By OS Type on page 130

Client Count By Server Backup Client Count By Server on page 130

Client Details Backup Client Configuration on page 127

Client Details Backup Server Group Client Mapping on page 238

Client Details Chargeback Details for Cost Centre on page 111

Client Occupancy by Pool Backup Client Occupancy by Pool on page 382

Client Occupancy by Server Trend Client Occupancy by Server Trend on page 423

Client Occupancy Details Client Occupancy on page 423

Client Occupancy Summary Client Occupancy Summary on page 383

Client Occupancy Trend Client Occupancy Trend on page 383

Client Schedule Backup Client Schedule on page 401

Client Status Backup Client Status on page 418

Client Storage Nodes Configuration Networker Client Storage Nodes Configuration on page158

Client Summary Backup Client Summary on page 194

Client Usage Statistics Avamar Client Usage Statistics on page 81

Clients Not Backed Up Backup Clients Not Backed Up on page 194

Clients with Low Dedup Ratio Clients with Low Dedup Ratio on page 245

Clients Without Full Backup Clients Without Full Backup on page 116

DPA Reports

Run Reports area menu items 33

Page 34: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Replication Sync Times by Client Backup Replication Sync Times by Client on page 236

Clone Operations Clone Operations on page 247

Clone Summary Clone Summary on page 248

Clone SLA Status Clone SLA Status on page 413

Cloned Backups Cloned Job Details on page 249

Cloned Backups Cloned Job Details For Clone Operation on page 250

Cluster Configuration Cluster Configuration on page 144

Cluster Resource Status Cluster Resource Status on page 423

Cluster Status Cluster Status for Cluster on page 424

Collector Errors DPA Client License Details for ruleset on page 312

Collector Logs DPA Collector Log on page 312

Compression Factor Data Domain Boost Storage Unit Statistics on page 384

Compression Ratio EDL 3D Compression Ratio on page 387

Configuration Webserver Configuration on page 170

Configuration Options EDL Configuration Options on page 146

Connection Status Connection Status on page 297

Consistency Group Copy Details RecoverPoint Consistency Group Copy Details on page158

Consistency Group Copy Details RecoverPoint Consistency Group Copy Details forConsistency Group on page 159

Consistency Group Copy Status RecoverPoint Consistency Group Copy Status on page439

Consistency Group Copy StatusDetails

RecoverPoint Consistency Group Copy Status for ActiveRPAs on page 440

Consistency Group Data Lag RecoverPoint Consistency Group Data Lag on page 358

Consistency Group Details RecoverPoint Consistency Group Details on page 160

Consistency Group High Load Ratio RecoverPoint Consistency Group High Load Ratio on page358

Consistency Group Journal Lag RecoverPoint Consistency Group Journal Lag on page 359

Consistency Group Incoming WriteRates

RecoverPoint Consistency Group Incoming Write Rates onpage 358

Consistency Group Incoming WriteRates for Last Day

RecoverPoint Consistency Group Incoming Write Rates forLast Day on page 359

Consistency Group Throughput RecoverPoint Consistency Group Throughput on page 359

Consistency Group Time Lag RecoverPoint Consistency Group Time Lag on page 359

DPA Reports

34 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 35: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Consistency Group Transaction Lag RecoverPoint Consistency Group Transaction Lag on page360

Control File Configuration Control File Details on page 297

CPU Utilization Process CPU Utilization on page 393

CRR Consistency Group Details RecoverPoint Consistency Group Details on page 160

Daily Compression Statistics Data Domain Daily Compression Statistics on page 384

Daily Migration By Storage Pool TSM Daily Migration By Storage Pool on page 93

Daily Reclamation By Storage Pool TSM Daily Reclamation By Storage Pool on page 93

Daily Staging By Storage Pool Backup Daily Staging By Storage Pool on page 82

Daily Success Rate Backup Daily Success Rate on page 411

Daily Success Rate Against Target Backup Daily Success Rate Against Target on page 114

Data Backed Up Daily Backup Data Backed Up Daily on page 82

Data Backed Up Daily By Device Backup Data Backed Up Daily By Device on page 82

Data Backed Up Daily By MediaServer

Backup Data Backed Up Daily By Media Server on page82

Data Backed Up Daily By Server Backup Data Backed Up Daily By Server on page 82

Data Backed Up Weekly Backup Data Backed Up Weekly on page 83

Data Backed Up Weekly By MediaServer

Backup Data Backed Up Weekly By Media Server on page83

Data Backed Up Weekly By Server Backup Data Backed Up Weekly By Server on page 83

Data Change Ratio By Client Backup Job Change Ratios By Client on page 211

Data Change Ratio By Job Backup Job Change Ratios on page 211

Data Domain Boost Statistics Data Domain Boost Statistics on page 383

Data Domain Clone Details Backup Data Domain Clone Details on page 195

Data Domain Data Ingested Data Domain Data Ingested on page 385

Data Domain Data Written To Data Domain Data Written To on page 385

Data Domain DeDuplication Ratio Data Domain DeDuplication Ratio on page 385

Data Domain File Distribution byCount

Data Domain File Distribution By Count on page 385

Data Domain File Distribution by Size Data Domain File Distribution By Size on page 386

Data Domain System Utilization Data Domain System Utilization on page 386

Data Domain Reduction Ratios Data Domain Reduction Ratios on page 386

Data Domain ReplicationConfiguration

Data Domain Replication Configuration on page 145

Data Domain Utilization Data Domain Utilization on page 386

DPA Reports

Run Reports area menu items 35

Page 36: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Data Mover Change Details Data Mover Configuration Change Details on page 101

Data Mover Configuration Data Mover Configuration on page 146

Data Recovered Avamar Garbage Collection Data Recovered on page 81

Database Change Details All Database Changes on page 296

Database Configuration Database Details on page 298

Database Configuration Database Details For Server on page 298

Database Parameter Change Details Database Parameter Change Details on page 299

Database Parameters Database Parameters on page 299

Database Server Parameters Database Server Parameters on page 300

Database Status DataProtector Database Status on page 426

Database Usage DataProtector Database Usage on page 387

Database Utilization TSM Database Utilization on page 394

Datafile Change Details Datafile Configuration Change Details on page 300

Datafile Configuration Datafile Details on page 301

Datafile Details Datafile Details for Database on page 301

Datafile Details Datafile Details for Tablespace on page 302

Datafile Usage DataProtector Datafile Usage on page 426

Datafile Utilization Datafile Utilization on page 302

Datafile Utilization Datafile Utilization Trend Chart on page 303

Datafile Utilization Trend Datafile Utilization for Tablespace on page 303

DB Backups TSM Database Backups on page 285

De-Dupe Details By Client Backup Client De-Dupe Ratios on page 193

De-Dupe Details By Job Backup Job Deduplication Ratio for Client on page 213

DeDupe Queue EDL 3D DeDupe Queue on page 388

Deduplication Cost Savings Deduplication Cost Savings on page 400

Deduplication ROI Trend Deduplication ROI Trend on page 400

Detailed Battery Status Battery Status on page 421

Detailed CAP Status Tape Library CAP Status on page 444

Detailed Fan Status Fan Status on page 429

Detailed PSU Status PSU Status on page 439

Detailed Thermometer Status Thermometer Status on page 447

Device Cleaning Status NetBackup Device Cleaning Status on page 434

Device Configuration Backup Device Config on page 130

DPA Reports

36 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 37: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Device Configuration Backup Device Configuration for Pool on page 195

Device Configuration Change Details Backup Device Configuration Change Details on page 96

Device Errors Backup Device Errors on page 419

Device Performance Summary Backup Device Performance Summary on page 344

Device Performance Summary ByDevice

Backup Device Performance Summary By Device on page345

Device Schedule (mounts) Backup Device Usage on page 403

Device Schedule (performance) Backup Device Scheduling on page 403

Device Status Backup Device Status on page 419

Device Summary By Device Backup Device Performance Summary By Device on page345

Device Throughput By Device Backup Device Throughput by Device on page 345

Device Utilization Backup Device Utilization by Device on page 382

Disk Activity By Disk Disk Activity By Disk on page 348

Disk Activity By Host Disk Activity By Host on page 348

Disk Array Configuration Disk Array Configuration on page 65

Disk Array Status Disk Array Status on page 428

Disk Configuration Disk Configuration on page 66

Disk Media Details NetBackup Backup Job Disk Media Details on page 262

Disk Performance By Disk Disk Performance By Disk on page 349

Disk Performance By Host Disk Performance By Host on page 349

Disk Pool Configuration NetBackup Disk Pool Configuration on page 153

Disk Pool Status NetBackup Disk Pool Status on page 434

Disk Status Disk Status on page 428

Disk Summary Disk Summary on page 67

Disk Volume Configuration NetBackup Disk Volume Configuration on page 154

Disk Volume Status NetBackup Disk Volume Status on page 434

Domain Footprint Avamar Domain Footprint on page 171

Duration of Backups Daily Backup Duration of Jobs Backed Up Daily on page 83

Duration of Backups Daily By MediaServer

Backup Duration of Jobs Backed Up Daily By MediaServer on page 83

Duration of Backups Daily By Server Backup Duration of Jobs Backed Up Daily By Server onpage 83

Duration of Backups Weekly Backup Duration of Jobs Backed Up Weekly on page 83

DPA Reports

Run Reports area menu items 37

Page 38: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Duration of Backups Weekly ByMedia Server

Backup Duration of Jobs Backed Up Weekly By MediaServer on page 84

Duration of Backups Weekly ByServer

Backup Duration of Jobs Backed Up Weekly By Server onpage 84

EMC File Storage Change Details Celerra Change Details on page 99

Empty Media Details For Empty Volumes on page 324

Error Details TSM Migration Errors For Specific Job on page 288

Error Details TSM Reclamation Errors For Specific Job on page 290

Error Trend Tape Drive Error Trend on page 456

Errors Backup Job Error Details for Specific Job on page 216

Errors Restore Job Error Details For Specific Job on page 277

Errors Tape Drive Error Trend on page 456

Errors By Node Tape Drive Error Count By Node on page 456

Estimated Protected Backup Capacity Estimated Protected Backup Capacity on page 250

Estimated Protected Backup CapacityDetails

Estimated Protected Backup Capacity Details on page250

Events Array Fan-out Ratio on page 126

Events Backup Daily Success Rate on page 411

Events BTD Storage Utilization By Node on page 381

Exclusion Details Recoverability Excludes on page 374

Expirations TSM Expirations on page 286

Expired Licenses License Details - Expired on page 317

Exported LUNs Exported LUNs on page 147

Exposure Details Exposure Details on page 251

Exposure Details Recoverability Detailed Exposures on page 372

Exposure Summary Recoverability Exposures Summary on page 375

Failed Clients Backup Failed Clients on page 196

Failed Jobs Backup Failed Jobs on page 198

Failover Status EDL Failover Status on page 428

Failure Details One Strike Failed Jobs For Specific Client on page 117

Failure Details Three Strike Failed Jobs For Specific Client on page 121

Failure Details Two Strike Failed Jobs For Specific Client on page 124

Fan Configuration Fan Configuration on page 67

Fan Status Fan Status on page 429

DPA Reports

38 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 39: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Fibre Channel Device Configuration Fibre Channel Device Configuration on page 147

Fibre Channel Device Mapping Fibre Channel Device Mapping on page 147

Fibre Channel Device Performance Fibre Channel Device Performance on page 349

Fibre Channel Device Performance ByNode

Fibre Channel Device Performance By Node on page 349

Fibre Channel Device PerformanceSummary

Fibre Channel Device Performance Summary on page 350

Fibre Channel Port Configuration Fibre Channel Configuration on page 67

Fibre Channel Port Errors By Node Fibre Channel Port Errors By Node on page 454

Fibre Channel Port Errors By Port Fibre Channel Port Errors By Port on page 454

Fibre Channel Port Performance ByNode

Fibre Channel Port Performance By Node on page 350

Fibre Channel Port Performance ByPort

Fibre Channel Port Performance By Port on page 350

Fibre Channel Port Status Fibre Channel Port Status on page 429

Fibre Channel Port Utilization Fibre Channel Port Utilization on page 388

Fileserver Average Response Times Fileserver Average Response Times on page 351

Fileserver Cache Hit Rates Fileserver Cache Hit Rates on page 351

Fileserver Cache Hit Rates By Node Fileserver Cache Hit Rates By Node on page 351

Fileserver Client Performance Fileserver Client Performance on page 351

Fileserver Exports Fileserver Exports on page 148

Fileserver Filesystem Performance Fileserver Filesystem Performance on page 352

Fileserver Operations Fileserver Operations on page 352

Fileserver Operations By Protocol Fileserver Operations By Protocol on page 352

Fileserver Operations with Direction Fileserver Operations with Direction on page 353

Fileserver Performance Summary Fileserver Performance Summary on page 353

Fileserver Status Fileserver Status on page 430

Filesystem Archive Unit Status Data Domain Filesystem Archive Unit Status on page 425

Filesystem Configuration Filesystem Configuration on page 68

Filesystem Configuration Filesystem Configuration for Filesystem on page 69

Filesystem Configuration Summary Filesystem Configuration Summary on page 71

Filesystem Details Filesystem Details on page 71

Filesystem Details Filesystem Status on page 431

Filesystem Mount Configuration Filesystem Mount Configuration on page 148

DPA Reports

Run Reports area menu items 39

Page 40: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Filesystem Performance Summary Filesystem Performance Summary on page 354

Filesystem Summary Filesystem Status Summary on page 432

Filesystem Options Data Domain Filesystem Options on page 425

Filesystem to LUN Mapping Celerra Filesystem to LUN Mapping on page 142

Filesystems Not Backed Up Filesystems Not Backed Up on page 254

Frozen Media Details For Frozen Volumes on page 325

Full Media Details For Full Volumes on page 327

Full Job History Backup Full History of Specific Job on page 203

Gaps Recoverability Gaps on page 375

Garbage Collection Jobs Avamar Garbage Collection Jobs on page 171

Grid Utilization BTD Storage Utilization By Node on page 381

Group Configuration Backup Group Configuration for Pool on page 204

Group Configuration Change Details Backup Group Configuration Change Details on page 97

Group Configuration Changes Backup Group Configuration Change Details on page 97

Group Count Backup Group Count on page 134

Group Count By Server Backup Group Count By Server on page 134

Group Details Backup Group Configuration on page 132

Group Forecast Backup Group Forecast on page 403

Group Job Status Backup Group Job Status Details on page 206

Group Membership Backup Server Client Group Mapping on page 139

Group Status Backup Group Status on page 207

Group Summary Backup Group Summary on page 207

Host Configuration Host Configuration on page 72

Host Configuration Host Configuration for Host on page 73

Host Status Host Status on page 432

Host Utilization Host Performance For Client on page 355

Host Utilization During Backup Host Performance During Backup on page 355

Imported LUNs Imported LUNs on page 149

Index Change Details Index Configuration Change Details on page 303

Index Configuration Details Index Details for Table on page 305

Index Details Index Details for Table on page 305

Index Details Index Details For Schema on page 304

Index Details Index Details For Tablespace on page 304

DPA Reports

40 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 41: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Infiniband Port Configuration Xsigo Infiniband Port Configuration on page 80

Infiniband Port Performance by Node Xsigo Infiniband Port Performance by Node on page 366

Infiniband Port Performance by Port Xsigo Infiniband Port Performance by Port on page 367

Infiniband Port Status Xsigo Infiniband Port Status on page 454

Infiniband Port Utilization Xsigo Infiniband Port Utilization on page 399

iSCSI Adapter Configuration iSCSI Configuration on page 74

iSCSI Adapter Status iSCSI Status on page 432

iSNS Servers iSCSI iSNS Configuration on page 149

Job Attempts Backup Job Attempts for Specific Job on page 210

Job Configuration Backup Job Configuration for Pool on page 213

Job Configuration Change Details Backup Job Configuration Change Details on page 97

Job Configuration Changes Backup Job Configuration Change Details on page 97

Job Details Backup All Jobs for Specific Client on page 181

Job Details Backup Client Slowest/Fastest Jobs for Client on page342

Job Details Backup Failed Jobs For Client on page 201

Job Details Backup Job Configuration on page 134

Job Details Backup Server Group Job Mapping on page 142

Job Distribution Backup Job Distribution on page 404

Job Distribution By Media Server Backup Job Distribution By Media Server on page 404

Job Forecast Backup Job Forecast on page 404

Job Forecast versus Actual Backup Job Forecast versus Actual on page 404

Job Forecast versus Actual Summary Backup Job Forecast versus Actual Summary on page 405

Job Schedule Backup Job Schedule on page 405

Job Schedule Backup Job Schedule For Specific Client on page 407

Job Summary Backup Job Summary on page 217

Job Summary Backup Job Summary for Group Run on page 217

Journal Utilization RecoverPoint Journal Utilization on page 394

Jukebox Configuration Backup Jukebox Config on page 135

Last 5 Runs Backup Last 5 Runs of Job on page 217

Last Successful Backup Backup Last Successful Run of Job on page 228

License Details License Details on page 317

License Conformance License Conformance on page 316

DPA Reports

Run Reports area menu items 41

Page 42: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

License Details License Details on page 317

License Summary License Summary on page 317

Lifecycle Policy Configuration NetBackup Lifecycle Policy Configuration on page 155

Lifecycle Policy Destinations NetBackup Lifecycle Policy Destination on page 155

Listener Latency DPA Listener Latency on page 312

Listener Performance Listener Performance on page 313

Listener Request Rate DPA Listener Request Rate on page 312

Logfile Change Details Logfile Configuration Change Details on page 305

Logfile Configuration Logfile Details on page 305

Long Running Jobs Backup All Long Running Jobs on page 186

LUN Configuration LUN Configuration on page 74

LUN Mappings LUN Mapping on page 150

LUN Status LUN Status on page 433

Maintenance Job Maintenance Job Details on page 260

Maintenance Job Attempts Maintenance Job Attempts for Specific Job on page 260

Maintenance Job Errors Maintenance Job Errors on page 261

Maintenance Job Schedule Maintenance Job Schedule on page 410

Maintenance Job Summary Maintenance Job Summary on page 261

Masking Configuration Masking Configuration for Storage Array on page 368

Masking Configuration Masking Configuration for Initiator on page 368

Media Age Distribution Media Age Distribution on page 319

Media Contents Media Contents on page 319

Media Count Media Count Trend on page 88

Media Count By Location Media Count By Location Trend on page 86

Media Count By Pool Media Count By Pool Trend on page 87

Media Count By Pool and Location Media Count By Pool and Location Trend on page 87

Media Count By Pool and State Media Count By Pool And State Trend on page 87

Media Count By Pool and State andLocation

Media Count By Pool and State and Location Trend onpage 87

Media Count By State Media Count By State Trend on page 88

Media Count By State and Location Media Count By State and Location Trend on page 88

Media Details Backup Job Media Details on page 216

Media Details Clone Job Media Details on page 247

DPA Reports

42 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 43: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Media Details Clone Job Media Details for Clone Operation on page 247

Media Details Staging Media Details on page 280

Media Details With Retention Over 8Years

Media Details With Retention Over 8 Years on page 335

Media Location Changes Media Location Change Details on page 102

Media Retention Distribution Media Retention Distribution on page 336

Media Size Distribution Media Size Distribution on page 336

Media To Be Destroyed Volumes To Be Destroyed on page 126

Media To Be Recycled Expired Volumes on page 116

Media Usage Media Usage Trend on page 89

Media Usage By Library Media Usage By Library Trend on page 88

Media Usage By Pool Media Usage By Pool Trend on page 89

Media Usage By Pool and Library Media Usage By Pool and Library Trend on page 88

Memory Configuration Memory Configuration Details on page 75

Memory Configuration Shared Memory Configuration on page 162

Memory Configuration ChangeDetails

Memory Configuration Change Details on page 102

Memory Status Current Memory Usage By Node on page 383

Memory Usage Process Memory Usage on page 393

Memory Utilization Memory Utilization By Node on page 391

Migration Jobs TSM Migration Jobs on page 288

Migration Summary TSM Migration Summary on page 289

Mirror Configuration Mirror Configuration on page 151

Mirror Performance Mirror Performance on page 357

Mirror Status Mirror Status on page 433

MirrorView Configuration MirrorView Configuration on page 369

MirrorView/A Performance MirrorView/A Performance on page 369

MirrorView/A Performance for CG MirrorView/A Performance for CG on page 370

Missed Clients Backup Missed Clients on page 230

Missed Jobs Backup Missed Jobs on page 230

Modes Data Domain Modes on page 425

Most Exposed Jobs Top 10 Most Exposed Jobs on page 123

Mount Requests Backup Mount Requests on page 340

Moves TSM Moves on page 289

DPA Reports

Run Reports area menu items 43

Page 44: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

MTree Daily Compression Statistics MTree Daily Compression Statistics on page 391

MTree Quota Utlization MTree Quota Utilization on page 391

MTree Retention Lock Status MTree Retention Lock Status on page 433

NetBackup Disk Media Details NetBackup Clone Job Disk Media Details on page 263

NetBackup Disaster RecoveryConfiguration

NetBackup Disaster Recovery Configuration on page 152

NetBackup Global Configuration NetBackup Global Configuration on page 154

NetBackup Master ServerConfiguration Settings

NetBackup Server Configuration Details on page 156

NetBackup Media ServerConfiguration Details

NetBackup Media Server Configuration Details on page155

NetBackup Storage ServerConfiguration Details

NetBackup Storage Server Configuration on page 156

NetBackup VM Rule Configuration NetBackup VM Rule Configuration on page 158

Network Interface Configuration Network Interface Configuration on page 76

Network Interface Configuration Network Interface Configuration for Interface on page 76

Network Interface ConfigurationChange Details

Network Interface Configuration Change Details on page103

Network Interface Errors By Interface Network Interface Errors By Interface on page 455

Network Interface Errors By Node Network Interface Errors By Node on page 456

Network Interface IP Network IP Configuration on page 437

Network Interface Link Pair Network Interface Link Pair on page 435

Network Interface Link PairAutonegotiation Status

Network Interface Link Pair Autonegotiation Status onpage 435

Network Interface Link Pair DuplexStatus

Network Interface Link Pair Duplex Status on page 436

Network Interface Performance ByInterface

Network Interface Performance By Interface on page 392

Network Interface Performance ByNode

Network Interface Performance By Node on page 392

Network Interface Status Network Interface Status on page 436

Network IP Configuration Network IP Configuration for IP on page 437

NetWorker Bootstraps Legato Networker Bootstrap Report on page 258

Node Topology Node Topology on page 314

Node Utilization Filesystem Utilization By Node on page 390

Number of Files Backed Up Daily Backup Files Backed Up Daily on page 84

DPA Reports

44 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 45: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Number of Files Backed Up Daily ByMedia Server

Backup Files Backed Up Daily By Media Server on page84

Number of Files Backed Up Daily ByServer

Backup Files Backed Up Daily By Server on page 84

Number of Files Backed Up Weekly Backup Files Backed Up Weekly on page 84

Number of Files Backed Up WeeklyBy Media Server

Backup Files Backed Up Weekly By Media Server on page84

Number of Files Backed Up WeeklyBy Server

Backup Files Backed Up Weekly By Server on page 85

Number of Jobs Backed Up Daily Backup Number of Jobs Backed Up Daily on page 85

Number of Jobs Backed Up Daily ByMedia Server

Backup Number of Jobs Backed Up Daily By MediaServer on page 85

Number of Jobs Backed Up Daily ByServer

Backup Number of Jobs Backed Up Daily By Server onpage 85

Number of Jobs Backed Up Weekly Backup Number of Jobs Backed Up Weekly on page 85

Number of Jobs Backed Up Weekly ByMedia Server

Backup Number of Jobs Backed Up Weekly By MediaServer on page 85

Number of Jobs Backed Up Weekly ByServer

Backup Number of Jobs Backed Up Weekly By Server onpage 86

Objects with Replication Exposures Objects with Replication Exposures on page 314

Obsolete Recovery Points Recoverability Obsolete Recovery Points on page 376

Offline Media Details for Offline Volumes on page 329

Offline Expired Volumes Media Details For Offline Expired Volumes on page 328

Online Media Details For Online Volumes on page 330

Open Files Backup Open Files on page 232

Open Files Backup Open Files for Specific Job on page 233

Orphaned LUNs Orphaned LUNs on page 437

Partial Media Details For Partial Volumes on page 331

Partially Successful Clients Backup Partial Clients on page 233

Partition Details Partition Details for Database on page 306

Partition Details Partition Details for Index on page 306

Partition Details Partition Details for Table on page 306

Performance Summary Celerra Replication Performance Summary on page 347

Performance Trend Celerra Replication Performance on page 347

Policy Configuration Changes Backup Group Configuration Change Details on page 97

Pool Capacity Usage Graph Pool Capacity Usage on page 89

DPA Reports

Run Reports area menu items 45

Page 46: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Pool Capacity Usage Graph Pool Capacity Usage for Pool on page 90

Pool Configuration Backup Pool Configuration on page 136

Pool Configuration Changes Backup Pool Configuration Change Details on page 98

Pool Status Backup Pool Status on page 420

Portal Configuration iSCSI Portal Configuration on page 149

Problem Clients Backup Problem Clients on page 235

Process Status Process Status on page 438

Processor Configuration Processor Configuration on page 77

Processor Status Processor Status on page 439

Processor Utilization By CPU Processor Utilization By CPU on page 357

Processor Utilization By Node Processor Utilization By Node on page 358

Protected Capacity RecoverPoint Protected Capacity on page 90

PSU Configuration PSU Configuration on page 77

PSU Status PSU Status on page 439

Publisher Performance Publisher Performance on page 314

Purge Preview DataProtector Purge Preview on page 427

Quota Status Filesystem Quota Status on page 430

RPA Site Compression RecoverPoint RPA Site Compression on page 361

RPA Site Latency RecoverPoint RPA Site Latency on page 361

RPA Site Packet Loss RecoverPoint RPA Site Packet Loss on page 361

RPA Site Throughput RecoverPoint RPA Site Throughput on page 361

RPA WAN Throughput RecoverPoint RPA WAN Throughput on page 362

RPA WAN Throughput for Last Day RecoverPoint RPA WAN Throughput for Last Day on page362

RDF Configuration for CG RDF Configuration for CG on page 371

RDF Configuration for DG RDF Configuration for DG on page 371

RDF Configuration for Symmetrix RDF Configuration on page 370

RDFG Performance RDFG Performance on page 372

Recall List Media Details For Offline Expired Volumes on page 328

Reclamation Jobs TSM Reclamation Jobs on page 290

Reclamation Summary TSM Reclamation Summary on page 291

Record File Usage DataProtector Record File Usage on page 427

Recoverability Status Monitor byClient

Recoverability Status Monitor By Client on page 378

DPA Reports

46 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 47: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Recoverability Solutions EnablerManaged Storage Arrays

Recoverability Solutions Enabler Managed Storage Arrays

Recoverability Visualization Recoverability Visualization on page 378

Recoverability Visualization Details Recoverability Visualization Details on page 379

RecoverPoint Change Details RecoverPoint Change Details on page 104

Recycle List Media Details Top 10 Oldest Volumes on page 334

Remote Mirror Configuration Remote Mirror Configuration on page 162

Remote Mirror Performance Remote Mirror Performance on page 362

Remote Mirror Status Remote Mirror Status on page 443

Remote Replication RPO forecast forMV/A

Remote Replication RPO forecast for MV/A on page 380

Remote Replication RPO forecast forSRDF/A

Remote Replication RPO forecast for SRDF/A on page 380

Replication alerts by group Replication Alerts by Group on page 315

Replication Configuration Celerra Configuration Change Details on page 100

Replication Configuration Recoverability Replication Configuration on page 376

Replication Performance Summary Celerra Replication Performance Summary on page 347

Replication Performance Trend Celerra Replication Performance on page 347

Replication Process View Recoverability Replicated Object Process View on page373

Replication RPO Compliance Replication RPO Compliance on page 380

Replication Set Configuration RecoverPoint Replication Set Configuration on page 161

Replication Status Replication Status on page 443

Replication Summary Avamar Replication Summary on page 172

Replication Time Lag Data Domain Replication Time Lag on page 348

Report Card Backup Report Card on page 236

Report History Report History on page 315

Reporter Median Report Run Time DPA Reporter Median Report Run Time on page 312

Request History Request History on page 315

Request Summary Request Summary

Restore Details Backup Restore Details on page 236

Restore Disk Media NetBackup Restore Job Disk Media Details on page 270

Restore Job Error Details Restore Job Error Details on page 277

Restore Jobs with Last Resolution Restore Jobs with Last Resolution on page 415

DPA Reports

Run Reports area menu items 47

Page 48: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Restore Media Restore Job Media Details on page 277

Restore Summary Restore Job Summary on page 278

Retention Policy Configuration Avamar Retention Policy Configuration on page 126

RPA Active Consistency Groups RecoverPoint RPA Active Consistency Groups on page 442

RPA Compression RecoverPoint RPA Compression on page 360

RPA Details RecoverPoint RPA Details on page 161

RPA Latency RecoverPoint RPA Latency on page 360

RPA Packet Loss RecoverPoint RPA Packet Loss on page 456

RPA Throughput RecoverPoint RPA Throughput on page 360

RPA Writes RecoverPoint RPA Writes on page 361

Schedule Configuration Changes Backup Schedule Configuration Change Details on page98

Schedule Details Backup Schedule Configuration on page 138

Scheduled Report History Scheduled Report History on page 316

Schema Configuration Database Schema Details For Server on page 299

Server Configuration Database Server Details on page 300

Server Configuration Changes Backup Server Configuration Change Details on page 98

Server Logs DPA Server Logs on page 313

Server Parameter Change Details Database Server Parameter Change Details on page 300

Server to Storage Configuration Server to Storage Configuration on page 377

Server to Storage Topology Recoverability Server To Storage Mappings Topology onpage 377

Server Utilization Backup Server Utilization on page 382

Service Status DataProtector Service Status on page 427

Share Change Details Fileserver Export Change Details on page 101

Shared Device Schedule (mounts) Backup Device Shared Usage on page 403

Size Distribution Backup Size Distribution on page 409

Size Distribution By Media Server Backup Size Distribution By Media Server on page 410

SLA Summary Backup SLA Summary on page 414

SLA Summary By Client Backup SLA Summary By Client on page 415

Snap Job Details Snap Job Details on page 278

Snap Job Summary Snap Job Summary on page 280

Snapshot Status Filesystem Snapshot Status on page 431

Snapshot Utilization Filesystem Snapshot Utilization on page 389

DPA Reports

48 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 49: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Solid State Storage Configuration Solid State Storage Configuration on page 78

Solid State Storage Performance Solid State Storage Performance on page 363

Splitter Details RecoverPoint Splitter Details on page 162

Staging Details Staging Operations on page 281

Staging Summary Staging Summary on page 281

Status Celerra Replication Status on page 423

Storage Array Capacity Usage Graph Storage Array Capacity Usage on page 91

Storage Array Raw Capacity Storage Array Raw Capacity on page 92

Storage Mapping Recoverability Replicated Object Storage Mapping onpage 374

Storage Pool Application Growth Storage Pool Application Growth on page 92

Storage Pool Capacity Storage Pool Capacity on page 92

Storage Pool Configuration Celerra Storage Pool Configuration on page 143

Storage Pool Copies TSM Storage Pool Copies on page 291

Storage Pool Migration Schedule TSM Storage Pool Migration Schedule on page 410

Storage Pool Reclamation Schedule TSM Storage Pool Reclamation Schedule on page 411

Storage Pool Utilization TSM Storage Pool Utilization on page 395

Storage Server Status NetBackup Storage Server Status on page 435

Storage to Server Topology Recoverability Storage To Server Mappings Topology onpage 378

Storage Unit Configuration NetBackup Storage Unit Configuration on page 157

Storage Unit Configuration Changes NetBackup Storage Unit Configuration Change Details onpage 103

Storage Unit Group Configuration NetBackup Storage Unit Group Configuration on page 157

Strike Summary Strike Summary on page 119

Successful Clients Backup Successful Clients on page 239

Successful Jobs Backup Successful Jobs on page 241

Symmetrix Change Details Symmetrix Change Details on page 105

Symmetrix LUN to Data DomainvDisks

Symmetrix LUN to Data Domain vDisks on page 163

System Capacity License Details Data Domain System Capacity Licenses on page 426

System Dynamics DataProtector System Dynamics on page 387

System License Details Data Domain System Licenses on page 426

System User Status Data Domain System User Status on page 426

DPA Reports

Run Reports area menu items 49

Page 50: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Table Change Details Table Configuration Change Details on page 307

Table Details Table Details for Database on page 307

Table Details Table Details for Schema on page 307

Table Details Table Details for Tablespace on page 308

Tablespace Change Details Tablespace Configuration Change Details on page 308

Tablespace Configuration Tablespace Details on page 309

Tablespace Details Tablespace Details for Database on page 309

Tablespace Utilization Tablespace Utilization on page 309

Tape Library Volume Utilization Trend Tape Library Volume Utilization Trend on page 397

Tape Drive Change Details Tape Drive Configuration Change Details on page 106

Tape Drive Configuration Tape Drive Configuration on page 78

Tape Drive Performance By Drive Tape Drive Performance By Drive on page 363

Tape Drive Performance By Node Tape Drive Performance By Node on page 363

Tape Drive Performance Summary Tape Drive Performance Summary on page 363

Tape Drive Status Tape Drive Status on page 444

Tape Drive Status Details Tape Drive Status on page 444

Tape Library Aggregate Utilization Tape Library Aggregate Utilization on page 395

Tape Library Aggregate UtilizationTrend

Tape Library Aggregate Utilization Trend on page 395

Tape Library CAP Status Tape Library CAP Status on page 444

Tape Library Capacity Utilization Tape Library Capacity Utilization on page 395

Tape Library Change Details Tape Library Configuration Change Details on page 106

Tape Library Compression Ratio Tape Library Compression Ratio on page 395

Tape Library Configuration Tape Library Config on page 79

Tape Library DeDupe Ratio Tape Library Deduplication Ratio on page 396

Tape Library Empty Volume Count Tape Library Empty Volume Count on page 445

Tape Library Errors Tape Library Errors on page 457

Tape Library Slot Status Tape Library Slot Status on page 445

Tape Library Status Details Tape Library Status Details on page 445

Tape Library Throughput Tape Library Throughput on page 396

Tape Library Utilization Tape Library Utilization on page 397

Tape Library Utilization Trend Tape Library Utilization Trend on page 397

Tape Library Volume Status Tape Library Volume Status on page 446

DPA Reports

50 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 51: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Thermometer Configuration Thermometer Configuration on page 80

Thermometer Status Thermometer Status on page 447

Throughput Backup Device Throughput for Device on page 345

Throughput HP VLS Throughput on page 391

Throughput by Protocol Fileserver Data Throughput By Protocol on page 352

Top 10 Clients By Avg Daily Change Top 10 Backup Clients By Avg Daily Change on page 283

Top 10 Clients with Best De-DupeRate

Top 10 Backup Clients with Best De-Dupe Rate on page284

Top 10 Clients with Worst De-DupeRate

Top 10 Backup Clients with Worst De-Dupe Rate on page284

Top 10 Fastest Clients Backup Top 10 Fastest Clients on page 346

Top 10 Growing Tables Top 10 Growing Tables by Rows on page 310

Top 10 Largest Clients Backup Top 10 Largest Clients on page 244

Top 10 Largest Tables By Row Count Top 10 Largest Database Tables By Row Count on page310

Top 10 Largest Tables By Size Top 10 Largest Database Tables By Size on page 310

Top 10 Longest Time Since LastPower On

Virtual Host Top 10 Longest Time Since Last Power On onpage 453

Top 10 Offending Clients Top 10 Offending Clients on page 397

Top 10 Offending Jobs Top 10 Offending Jobs on page 398

Top 10 Slowest Clients Backup Top 10 Smallest Clients on page 245

Top 10 Unreliable Clients Backup Top 10 Most Unreliable Clients on page 245

Total Daily Duration by Group Backup Daily Total Group Duration on page 82

Total Job Size and Used Space forData Domain

NetWorker Total Job Size and Used Space for DataDomain on page 89

Total Reduction Ratio EDL 3D Total Reduction Ratio on page 388

Total Replicated Capacity Data Domain Total Replicated Capacity on page 86

Trend CPU Utilization Process CPU Utilization For Specific Process on page 393

Trend Media Usage Media Usage on page 337

Trend Thermometer Temperature Thermometer Trend for Specific Thermometer on page447

TSM Backup Set Details TSM Backup Set Details on page 284

TSM Client Occupancy Details TSM Client Occupancy on page 448

TSM Client Occupancy Summary TSM Client Occupancy Summary on page 394

TSM Command Event Details TSM Command Event Details on page 285

DPA Reports

Run Reports area menu items 51

Page 52: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

TSM Copy Group Configuration TSM Copy Group Configuration on page 164

TSM Database Status TSM Database Status on page 448

TSM Database Usage TSM Database Usage on page 449

TSM Database Volume Status TSM Database Volume Status on page 449

TSM DB Backup Errors TSM Database Backup Errors on page 285

TSM Defined Server Configuration TSM Defined Server Configuration on page 165

TSM Defined Server Status TSM Defined Server Status on page 449

TSM Delete Volumes TSM Delete Volumes on page 286

TSM Device Path Status TSM Device Path Status on page 452

TSM DR Media Media Reclamation Distribution on page 337

TSM Expiration Errors TSM Expiration Errors on page 286

TSM Filespace Details TSM Client Filespaces on page 447

TSM Filespace Summary TSM Filespace Summary on page 452

TSM Identify Duplicate ProcessDetails

TSM Identify Duplicate Process Details on page 450

TSM Identify Duplicate Process Trend TSM Identify Duplicate Process Trend on page 450

TSM LAN Free Server Configuration TSM LAN Free Server Configuration on page 166

TSM LAN Free Server Status TSM LAN Free Server Status on page 452

TSM Management ClassConfiguration

TSM Management Class Configuration on page 166

TSM Move Errors TSM Move Errors on page 289

TSM Policy Set Configuration TSM Policy Set Configuration on page 167

TSM Recovery Log Usage TSM Recovery Log Usage on page 453

TSM Replication Node Status TSM Replication Node Status on page 450

TSM Replication Process Details TSM Replication Process Details on page 451

TSM Replication Process Summary TSM Replication Process Summary on page 451

TSM Server Side Processes TSM Server Side Process Scheduling on page 410

TSM Storage Pool Copy Errors TSM Storage Pool Copy Errors on page 292

TSM Top 10 Backups With Worst IdleWait Times

TSM Top 10 Backups with Worst Idle Wait Times on page293

TSM Top 10 Backups With WorstMedia Wait Times

TSM Top 10 Backups with Worst Media Wait Times onpage 293

TSM Top 10 Clients With Worst IdleWait Times

TSM Top 10 Clients with Worst Idle Wait Times on page294

DPA Reports

52 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 53: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

TSM Top 10 Clients with Worst MediaWait Times

TSM Top 10 Clients with Worst Media Wait Times on page294

Uncloned Backups Uncloned Backups on page 294

Underlying Disk Activity Filesystem Disk Activity on page 389

Unconfigured Clients Backup Unprotected/Unconfigured Clients on page 114

Underlying Disk Details Filesystem Disk Configuration on page 71

Underlying Disk Performance Filesystem Disk Performance on page 353

Underlying Disk Status Filesystem Disk Status on page 430

Unprotected Clients Unprotected Clients on page 126

Unprotected Nodes Recoverability Unprotected Nodes on page 378

Unsuccessful Clients Backup Unsuccessful Clients on page 115

Used Media Details For Used Volumes on page 332

Used Volumes Media Details For Used Volumes on page 332

Utilization Filesystem Utilization By Partition on page 390

Vault Attempts NetBackup Vault Attempts for Specific Job on page 271

Vault Disk Media Details NetBackup Vault Job Disk Media Details on page 272

Vault Ejects NetBackup Vault Ejects on page 272

Vault Jobs NetBackup Vault Jobs on page 273

Vault Media Details Vault Job Media Details on page 296

Vault Preview NetBackup Vault Preview on page 273

VBA Configuration NetWorker VBA Configuration on page 158

VBA Utilization NetWorker VBA Utilization on page 393

Virtual Host Disk ConfigurationChange Details

Virtual Host Disk Configuration Change Details on page107

Virtual Data Mover Configuration Virtual Data Mover Configuration on page 167

Virtual Fibre Channel PortPerformance By Node

Virtual Fibre Channel Port Performance By Node on page365

Virtual Fibre Channel PortPerformance By Port

Virtual Fibre Channel Port Performance By Port on page365

Virtual Fibre Channel Port Utilization Virtual Fibre Channel Port Utilization on page 398

Virtual Host Change Details Virtual Host Change Details on page 107

Virtual Host Change Details Virtual Host Change Details on page 107

Virtual Host Configuration Virtual Host Configuration on page 167

Virtual Host Disk Configuration Virtual Host Disk Configuration on page 168

DPA Reports

Run Reports area menu items 53

Page 54: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate the report

Virtual Host Disk Performance Virtual Host Disk Performance on page 365

Virtual Host Memory Utilization Virtual Host Memory Utilization on page 398

Virtual Host Network InterfaceConfiguration

Virtual Host Network Interface Configuration on page 168

Virtual Host Network InterfaceConfiguration Change Details

Virtual Host Network Interface Configuration ChangeDetails on page 108

Virtual Host Network Performance Virtual Host Network Interface Performance on page 366

Virtual Host Processor Utilization Virtual Host Processor Utilization on page 366

Virtual Network InterfacePerformance By Interface

Virtual Network Interface Performance By Interface onpage 399

Virtual Network InterfacePerformance By Node

Virtual Network Interface Performance By Node on page399

Virtual Port Queue Depth Summary Xsigo Virtual Port Queue Depth Summary on page 367

Virtual To Physical Port Mapping Xsigo Virtual To Physical Port Mapping on page 170

Virtualization Manager Configuration Virtualization Manager Configuration on page 168

VMs Not Backed Up Backup VMs Not Backed Up on page 245

VNX/CLARiiON Change Details VNX/CLARiiON Change Summary on page 109

Volume Configuration Celerra Volume Configuration on page 143

Volume Configuration RecoverPoint Volumes for Replication Sets on page 442

Volume Details RecoverPoint Volumes on page 442

Volume Expiration Report Volume Expiration Report on page 339

Volume Priority Configuration

Web Server Response Time Webserver Response Time on page 366

DPA Reports

54 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 55: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

CHAPTER 3

Reports by object

This chapter describes the reports by object supported by DPA. You can choose themonitored object that you want to report on, then select the report type to be applied.

l Backup application reporting................................................................................ 56l Data Domain reporting.......................................................................................... 56l Virtualization reporting..........................................................................................57l Database reporting................................................................................................57l HP EVA reporting................................................................................................... 57l ACSLS Server reporting..........................................................................................58l Recoverability reporting........................................................................................ 59l EMC File Storage reporting.....................................................................................59l EMC Disk Library reporting.................................................................................... 59l RecoverPoint reporting.......................................................................................... 59l Tape library reporting............................................................................................ 60l Fibre Channel switch reporting.............................................................................. 60l IP switch reporting.................................................................................................60l Xsigo reporting......................................................................................................61l System reporting...................................................................................................61l Data Protection Advisor reporting.......................................................................... 61l Enterprise Application reporting............................................................................ 62

Reports by object 55

Page 56: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup application reportingBackup application reports are based on data gathered from the backup server andinclude reports from the following system templates:

l Capacity planning reports in Capacity Planning system templates on page 80

l Change management reports in Change Management system templates on page 94

l Chargeback reports in Chargeback system templates on page 109

l Compliance and risk mitigation reports in Compliance system templates on page113

l Configuration reports in Configuration system templates on page 126

l DPA reports in DPA system templates on page 311

l Data protection reports in Data Protection system templates on page 170

l Performance reports in Performance system templates on page 340

l Resource utilization reports in Resource Utilization system templates on page 381

l Return on investment reports in ROI system templates on page 400

l Scheduling reports in Scheduling system templates on page 400

l Service level management reports in Service Level Management system templates onpage 411

l Status reports in Status system templates on page 417

Reports are also included in the Control Panels section of the DPA web console.

Data Domain reportingData Domain reports are based on data gathered from EMC Data Domain® storageappliances and include reports from the following system templates:

l Asset management reports in Asset Management system templates on page 64

l Capacity planning reports in Capacity Planning system templates on page 80

l Change management reports in Change Management system templates on page 94

l Chargeback reports in Chargeback system templates on page 109

l Configuration reports in Configuration system templates on page 126

l DPA reports in DPA system templates on page 311

l Licensing reports in Licensing system templates on page 316

l Performance reports in Performance system templates on page 340

l Recoverability reports in Recoverability system templates on page 368

l Resource utilization reports in Resource Utilization system templates on page 381

l Status reports in Status system templates on page 417

l Troubleshooting reports in Troubleshooting system templates on page 454

Reports are also included in the Control Panels section of the DPA web console.

Reports by object

56 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 57: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Virtualization reportingVirtualization reports are based on data gathered from virtual machines and host serversand include reports from the following system templates:

l Capacity planning reports in Capacity Planning system templates on page 80

l Change management reports in Change Management system templates on page 94

l Chargeback reports in Chargeback system templates on page 109

l Compliance and risk mitigation reports in Compliance system templates on page113

l Configuration reports in Configuration system templates on page 126

l DPA reports in DPA system templates on page 311

l Data protection reports in Data Protection system templates on page 170

l Performance reports in Performance system templates on page 340

l Scheduling reports in Scheduling system templates on page 400

l Service level management reports in Service Level Management system templates onpage 411

l Status reports in Status system templates on page 417

Reports are also included in the Control Panels section of the DPA web console.

Database reportingDatabase reports are based on data gathered from databases and include reports fromthe following system templates:

l Capacity planning reports in Capacity Planning system templates on page 80

l Change management reports in Change Management system templates on page 94

l Chargeback reports in Chargeback system templates on page 109

l Compliance and risk mitigation reports in Compliance system templates on page113

l Configuration reports in Compliance system templates on page 113

l Data protection reports in DPA system templates on page 311

l Performance reports in Performance system templates on page 340

l Scheduling reports in Scheduling system templates on page 400

l Service level management reports in Service Level Management system templates onpage 411

l Status reports in Status system templates on page 417

Reports are also included in the Control Panels section of the DPA web console.

HP EVA reportingHP EVA reports are based on data gathered from HP Enterprise Virtual Array (EVA) diskarrays and include reports from the following system templates:

l Asset management reports in Asset Management system templates on page 64

Reports by object

Virtualization reporting 57

Page 58: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Capacity Planning reports in Capacity Planning system templates on page 80

l Change management reports Change Management system templates on page 94

l Chargeback reports in Chargeback system templates on page 109

l Compliance and risk mitigation reports in Compliance system templates on page113

l Configuration reports in Configuration system templates on page 126

l DPA reports in DPA system templates on page 311

l Data protection reports in Data Protection system templates on page 170

l Performance reports in Performance system templates on page 340

l Recoverability reports in Recoverability system templates on page 368

l Resource utilization reports in Resource Utilization system templates on page 381

l Scheduling reports in Scheduling system templates on page 400

l Service level management reports in Service Level Management system templates onpage 411

l Status reports in Status system templates on page 417

l Troubleshooting reports in Troubleshooting system templates on page 454

Reports are also included in the Control Panels section of the DPA web console.

ACSLS Server reportingACSLS Server reports are based on data gathered from Automated Cartridge SystemLibrary Software (ACSLS) module and include reports from the following systemtemplates:

l Capacity Planning reports in Capacity Planning system templates on page 80

l Change management reports in Change Management system templates on page 94

l Chargeback reports in Chargeback system templates on page 109

l Compliance and risk mitigation reports in Compliance system templates on page113

l DPA reports in DPA system templates on page 311

l Data protection reports in Data Protection system templates on page 170

l Licensing reports in Licensing system templates on page 316

l Performance reports in Performance system templates on page 340

l Recoverability reports in Recoverability system templates on page 368

l Scheduling reports in Scheduling system templates on page 400

l Service level management reports in Service Level Management system templates onpage 411

l Status reports in Status system templates on page 417

Reports are also included in the Control Panels section of the DPA web console.

Reports by object

58 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 59: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Recoverability reportingRecoverability reports are specific to EMC VNX/CLARiiON and Symmetrix storage arraysand include reports from the following system templates:

l Asset management reports in Asset Management system templates on page 64

l Capacity Planning reports in Capacity Planning system templates on page 80

l Configuration reports in Configuration system templates on page 126

l DPA reports in DPA system templates on page 311

l Recoverability reports in Recoverability system templates on page 368

EMC File Storage reportingEMC File Storage reports are based on data gathered from AEMC File Storage Appliancesand include reports from the following system templates:

l Asset Management reports in Asset Management system templates on page 64

l Capacity planning reports in Capacity Planning system templates on page 80

l Change management reports in Change Management system templates on page 94

l Configuration reports in Configuration system templates on page 126

l DPA reports in DPA system templates on page 311

l Performance reports in Performance system templates on page 340

l Status reports in Status system templates on page 417

l Troubleshooting reports in Troubleshooting system templates on page 454

Reports are also included in the Control Panels section of the DPA web console.

EMC Disk Library reportingEMC Disk Library reports are based on data gathered from EMC Disk Library (EDL and EDL3D) and include reports from the following system templates:

l Asset management reports in Asset Management system templates on page 64

l Configuration reports in Configuration system templates on page 126

l Change management reports in Change Management system templates on page 94

l Performance reports in Performance system templates on page 340

l Resource utilization reports in Resource Utilization system templates on page 381

l Status reports in Status system templates on page 417

l Licensing reports in Licensing system templates on page 316

l Troubleshooting reports in Troubleshooting system templates on page 454

RecoverPoint reportingRecoverPoint reports are based on data gathered from RecoverPoint system and includereports from the following system templates:

l Asset management reports in Asset Management system templates on page 64

Reports by object

Recoverability reporting 59

Page 60: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Capacity planning reports in Capacity Planning system templates on page 80

l Change management reports in Change Management system templates on page 94

l Chargeback reports in Chargeback system templates on page 109

l Configuration reports in Configuration system templates on page 126

l DPA reports in DPA system templates on page 311

l Performance reports in Performance system templates on page 340

l Recoverability reports in Recoverability system templates on page 368

l Resource utilization reports in Resource Utilization system templates on page 381

l Status reports in Status system templates on page 417

l Troubleshooting reports in Troubleshooting system templates on page 454

Tape library reportingTape library reports are based on data gathered from tape libraries and include reportsfrom the following system templates:

l Asset management reports in Asset Management system templates on page 64

l Change management reports in Change Management system templates on page 94

l DPA reports in DPA system templates on page 311

l Licensing reports in Licensing system templates on page 316

l Resource utilization reports in Resource Utilization system templates on page 381

l Status reports in Status system templates on page 417

l Troubleshooting reports in Troubleshooting system templates on page 454

Fibre Channel switch reportingFibre Channel switch reports are based on data gathered from Fibre Channel switchesand include reports from the following system templates:

l Asset management in Asset Management system templates on page 64

l DPA reports in DPA system templates on page 311

l Performance reports in Performance system templates on page 340

l Status reports in Status system templates on page 417

l Troubleshooting reports in Troubleshooting system templates on page 454

IP switch reportingIP switch reports are based on data gathered from IP switches and include reports fromthe following system templates:

l Asset management reports in Asset Management system templates on page 64

l DPA reports in DPA system templates on page 311

l Performance reports in Performance system templates on page 340

l Status reports in Status system templates on page 417

l Troubleshooting reports in Troubleshooting system templates on page 454

Reports by object

60 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 61: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Xsigo reportingXsigo reports are based on data gathered from Xsigo I/O Director and include reportsfrom the following system templates:

l Asset management in Asset Management system templates on page 64

l DPA in DPA system templates on page 311

l Performance in Performance system templates on page 340

l Status reports in Status system templates on page 417

l Troubleshooting reports in Troubleshooting system templates on page 454

System reportingSystem reports are based on data gathered from host operating systems, configuration,status, and performance of backup servers, media servers, and backup clients; andinclude reports from the following system templates:

l Asset management reports in Asset Management system templates on page 64

l Capacity planning reports in Capacity Planning system templates on page 80

l Change management reports in Change Management system templates on page 94

l Chargeback reports in Chargeback system templates on page 109

l Compliance and risk mitigation reports in Compliance system templates on page113

l Configuration reports in Configuration system templates on page 126

l DPA in DPA system templates on page 311

l Data Protection reports in Data Protection system templates on page 170

l Performance reports in Performance system templates on page 340

l Recoverability reports in Recoverability system templates on page 368

l Resource utilization reports in Resource Utilization system templates on page 381

l Scheduling reports in Scheduling system templates on page 400

l Service level management reports in Service Level Management system templates onpage 411

l Status reports in Status system templates on page 417

l Troubleshooting in Troubleshooting system templates on page 454

Reports are also included in the Control Panels section of the DPA web console.

Data Protection Advisor reportingData Protection Advisor reports are based on performance, status, and security of DPAitself and include reports from the following system templates:

l DPA System reports in DPA system templates on page 311

Reports by object

Xsigo reporting 61

Page 62: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Enterprise Application reportingEnterprise Application reports are based on data gathered from Enterprise Applicationsand include reports from the following system templates:

l Capacity planning reports in Capacity Planning system templates on page 80

l Change management reports in Change Management system templates on page 94

l Chargeback reports in Chargeback system templates on page 109

l Compliance and risk mitigation reports in Compliance system templates on page113

l Configuration reports in Configuration system templates on page 126

l Data protection reports in Data Protection system templates on page 170

l DPA reports in DPA system templates on page 311

l Performance reports in Performance system templates on page 340

l Scheduling reports in Scheduling system templates on page 400

l Service level management reports in Service Level Management system templates onpage 411

l Status reports in Status system templates on page 417

Reports are also included in the Control Panels section of the DPA web console.

Reports by object

62 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 63: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

CHAPTER 4

Reports by System Template

This chapter describes the system templates that are available in DPA when you choosethe report type and then choose the monitor objects to apply the report to

l What are system templates?..................................................................................64l Asset Management system templates................................................................... 64l Capacity Planning system templates..................................................................... 80l Change Management system templates................................................................ 94l Chargeback system templates.............................................................................109l Compliance system templates.............................................................................113l Configuration system templates.......................................................................... 126l Data Protection system templates....................................................................... 170l Database system templates................................................................................ 296l DPA system templates.........................................................................................311l Licensing system templates................................................................................ 316l Media management system templates................................................................ 318l Operations system templates..............................................................................339l Performance system templates........................................................................... 340l Provisioning system templates............................................................................367l Recoverability system templates......................................................................... 368l Resource Utilization system templates................................................................ 381l ROI system templates..........................................................................................400l Scheduling system templates..............................................................................400l Service Level Management system templates......................................................411l Status system templates..................................................................................... 417l Troubleshooting system templates......................................................................454l Viewlet system templates....................................................................................457

Reports by System Template 63

Page 64: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

What are system templates?System templates define reports. They contain the logic, operators, sources, outputformatting, and field names that are used by DPA to generate the report results. Reports >Custom Reports > System Templates contains all the report templates available in DPA bydefault. Report results are determined by the object(s) that are passed to the template.System templates cannot be modified. To change system template parameters or tocreate a custom template based on a system template, make a copy of the template andsave it with a unique name.

Asset Management system templatesAsset Management reports show the physical configuration of a machine’s components.The asset management control panel provides a high-level view of a machine’sconfiguration.

These reports provide information on:

l Summary of the number of processors

l Amount of memory

l Number of network interfaces

l Number of Fibre Channel HBAs

l Disk and file system configuration on a machine

For more specific details on the various reports, select one of the reports described in thefollowing sections.

Battery ConfigurationReturns the battery configuration in a table report. Uses data from the BatteryConfiguration data source.

l Node - Name of the object

l Name - Name of the battery

l Type - Type of battery

Card ConfigurationReturns the card configuration in a table report. Uses data from the Card Configurationdata source.

l Node - Name of the object

l Adaptor - Identifier for the adaptor

l Sub Name - Identifier for the storage array

l Serial - Serial number of the card

l Type - Type of the card: Fibre Channel, iSCSI, Network

l Manufacturer - Manufacturer of the card

l Model - Model of the card

l Name - Name of the card

Reports by System Template

64 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 65: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Description - Description of the card

l Hardware Version - Version of the card hardware

l Firmware Version - Version of the card firmware

l Driver Name - Name of the card driver

l Driver Version - Version of the card driver

l Enclosure - Identifier for the enclosure containing the disk

l Signature - Unique number assigned to the Storage Processor by the manufacturer

l Memory - Amount of memory on the card

l Read cache - Size of the card read cache

l Write cache - Size of the card write cache

l Buffer size - Size of the buffer

Disk / Filesystem CapacityReturns the disk and file system capacity in a column chart. Uses data from the DiskConfiguration and Filesystem Capacity data sources.

l Size - Size of the disk in gigabytes

l Disk number - Disk number for the enclosure (0–15)

l Bus - Identifier for the disk bus

l Capacity - Total capacity of the disk or file system (in MB)

l Hostname - Name of the host on which the disk resides

l Filesystem - Name of the file system

l Sub Name - Identifier for the storage array

l Device - Name of the device on which the file system is located

l Type - Type of file system; for example, UFS, EXT3, and NTFS

Disk Array ConfigurationReturns the disk array configuration in a table report. Uses data from the Disk ArrayConfig data source.

l Hostname - Hostname or IP address of the disk array

l Sub name - Name of the storage array

l System Type - Type of system; for example, CLARiiON

l Manufacturer - Manufacturer of the disk array

l Model - Model number of the disk array

l Firmware - Version of software of the disk array

l Volume delay - Volume Repair Delay parameter of the disk array

l Cache page Size - Size of cache page (in KB)

l Num devices - Number of logical devices

l High watermark - Percentage of dirty pages to trigger a cache flush

l Low watermark - Percentage of dirty pages to stop a cache flush

l Num disks - Number of physical disks that the array holds

Reports by System Template

Disk / Filesystem Capacity 65

Page 66: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Num RAID groups - Number of RAID groups that the array holds

l Num storage groups - Number of storage groups

l Unassigned cache pages - Number of unassigned cache pages

l Num visible devices - Number of visible devices

Disk ConfigurationReturns the disk configuration in a table report. Uses data from the Disk Configurationdata source.

l Hostname - Name of the host to which the disk is attached

l Sub name - Identifier for the Storage Array

l Device - Identifier for the disk from the operating system

l System type - Type of system; for example, CLARiiON

l Manufacturer - Manufacturer of the disk

l Model - Model of the disk

l Serial number - Serial number of the disk

l Firmware revision - Firmware version of the disk

l Size - Size of the disk (in GB)

l Enclosure - Identifier for the enclosure containing the disk

l Disk number - Disk number for the enclosure (0–15)

l Bus - Identifier for the bus connected to the disk

l Director - Identifier for the Symmetrix director

l Interface - Identifier for the network interface

l SCSI Id - Identifier for the SCSI interface

l RAID group - RAID group the disk belongs to

l Pool name - Name of the storage pool

Disk Count By StateReturns the disk count by state in a line chart. Uses data from the Disk Count By Statedata source.

l Node - Object associated with the disk

l State - State of the disk

l Disks - Count of disks in this state

l Sub name - Identifier for the Storage Array

Disk Count By UseReturns the disk count by use in a line chart. Uses data from the Disk Count By Use datasource.

l Node - Object associated with the disk

l Use - Use of the disk

l Disks - Count of disks used for this purpose

l Sub name - Identifier for the Storage Array

Reports by System Template

66 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 67: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Disk SummarySummary of the disks on a host in a table report. Uses data from the Disk Configurationdata source.

l Hostname - Hostname of the disk array

l Disks - Disks that the array holds

l Size - Size of the disk

Fan ConfigurationReturns the fan configuration in a table report. Uses data from the Fan Configuration datasource.

l Node - Name of the object

l Name - Name of the fane

l Make - Make of the fan

l Model - Model of the fan

l Serial - Serial number of the fan

l Location - Case location of the fan

Fibre Channel ConfigurationReturns the Fibre Channel configuration in a table report. Uses data from the FibreChannel Port Config data source.

l Hostname - Name of the switch

l Port - Identifier for the Fibre Channel port:

n If the port is named, the name of the port is used as the identifier

n If the port is not named, the index for the port is used as the identifier

l Sub name - If returning data for RecoverPoint, the name of site in which RecoverPointAppliance is located. Otherwise, the identifier for the Celerra Data Mover

l Sub name 2 - Name of the RecoverPoint Appliance

l Controller - Number of the controller

l WWPN - World Wide Port Name for the Fibre Channel interface

l Mode - Indicates if the port is a Target or Initiator

l OS Device - Device name from which Fibre Channel port is visible on the operatingsystem (HBAs only)

l Internal - Indicates if the Fibre Channel port is internal, that is, if the port is connectedto internal hardware, and not a SAN (HP disk arrays only)

l Type - Type of Fibre Channel port on the switch or HBA

l Virtual - Indicates if the Fibre Channel port is virtual or physical

l WWNN - World Wide Node Name of the Fibre Channel port

l Auto neg - Indicates if autonegotation is enabled on this interface

Reports by System Template

Disk Summary 67

Page 68: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Fibre Channel Port CountReturns in the Fibre Channel port count in a column chart. Uses data from the FibreChannel Port Config data source.

l Count - Number of ports on the switch

Filesystem ConfigurationReturns the file system configuration in a table report. Uses data from the FilesystemConfiguration data source.

l Hostname - Name of the host on which the file system is mounted

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Filesystem ID - File system internal identifier

l Device - Name of the device on which the file system is located. For example, /dev/vol0

l Type - Type of file system; for example, UFS, EXT3, NTFS

l Capacity - Total space on the file system available for standard usage (in MB)

l Files - Maximum number of files on the file system (1000)

l Allocated - Pre-allocated capacity of the file system. Note that this is not the same asthe used capacity of the file system but applies to space that has been reserved butnot necessarily used (in MB)

l Snapshot Capacity - Amount of space reserved for the use of snapshots (in MB). If thetotal amount of data stored for snapshots is higher than the amount of spacereserved for snapshots, additional space is claimed from the volume itself

l Save Volume - Volume used to allocate checkpoints for this file system

l Convert UCode - Force conversion of all directories to UNICODE format when accessedthrough both NFS and CIFS

l Create UCode - Force UNICODE format directories to be created by default

l SVO Enable - Perform "SnapValidator" (for Oracle data) integrity checking of alloperations on volume

l SVO Allow RMAN - "SnapValidator" (for Oracle data) integrity checks are compatiblewith volumes containing RMAN backup data

l SVO Checksum - Perform "SnapValidator" (for Oracle data) checksum calculation forall writes on volume

l SVO Reject Errors - Reject operation and return an error to client if any of"SnapValidator" integrity checks fail (otherwise failure is simply logged)

l Extent - Allow extents (in which application writes are written as a write of a largergroup of related data blocks)

l FS Size Fixed - File system remains a fixed size when volume size changes (forexample, when adding disks to a traditional volume or when a snapmirrored volumerelationship is broken)

l Ignore Inconsistent - Ignore (at boot time) aggregate level inconsistencies that wouldnormally be considered serious enough to keep the associated volume offline

l Maximum Directory Size - Maximum size to which a directory can grow (in KB)

Reports by System Template

68 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 69: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Minra - Filer performs minimal file read ahead (instead of employing speculative read-ahead)

l A Time Update - A time on inode is always updated (otherwise a time on inode is notupdated when a file is read

l I2P - Inode to parent pathname translations are enabled

l No Snap - Automatic snapshots are disabled

l No Snap Dir - Snapshot directories are inaccessible

l Sched Snap Name - How scheduled snapshots are named: create_time (nameconstructed using <type>.<creation_time> (For example, hourly.2007-06-20-1200)),ordinal (name constructed using <type>.<ordinal> (For example, hourly.0, hourly.1, ...))

l NV Fail - Filer checks at boot time to verify that NVRAM is in a valid state

l Try First - Specifies which policy to pursue first to reclaim space when volume is full:volume_grow (attempt to increase the size of the (flexible) volume), snap_delete(delete snapshots)

l Fractional Reserve - Percentage of required reserved space actually reserved foroverwrites of reserved objects

l RAID Type - Type of RAID used: raid0, raid4, raid_dp

l RAID Size - Maximum number of disks in each RAID group

l Resync Snap Time - Mirror resynchronization snapshot frequency (in seconds)

l Root - Volume is the root volume for the filer (or will become so at next reboot)

l Snap Mirrored - Volume is a snapmirrored copy of another volume

l Sec Style - Security Mode for access: UNIX, CIFS, Mixed

l Op Locks - Indicates whether opportunistic locking is enabled on the file system

l Volume Size - Size of the volume (in MB)

l Device Host - Name of the host that the device is connected

Filesystem Configuration for FilesystemReturns the file system configuration for filesystem in a table report. Uses data from theCluster Resource Mapping and Filesystem Configuration data sources.

l Hostname - Name of the host on which the file system is mounted

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Filesystem ID - File system internal identifier

l Device - Name of the device on which the file system is located. For example, /dev/vol0

l Type - Type of file system; for example, UFS, EXT3, NTFS

l Capacity - Total space on the file system available for standard usage (in MB)

l Files - Maximum number of files on the file system (1000)

l Allocated - Pre-allocated capacity of the file system. Note that this is not the same asthe used capacity of the file system but applies to space that has been reserved butnot necessarily used (in MB)

l Snapshot Capacity - Amount of space reserved for the use of snapshots (in MB). If thetotal amount of data stored for snapshots is higher than the amount of spacereserved for snapshots, additional space is claimed from the volume itself

Reports by System Template

Filesystem Configuration for Filesystem 69

Page 70: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Save Volume - Volume used to allocate checkpoints for this file system

l Convert UCode - Force conversion of all directories to UNICODE format when accessedthrough both NFS and CIFS

l Create UCode - Force UNICODE format directories to be created by default

l SVO Enable - Perform "SnapValidator" (for Oracle data) integrity checking of alloperations on volume

l SVO Allow RMAN - "SnapValidator" (for Oracle data) integrity checks are compatiblewith volumes containing RMAN backup data

l SVO Checksum - Perform "SnapValidator" (for Oracle data) checksum calculation forall writes on volume

l SVO Reject Errors - Reject operation and return an error to client if any of"SnapValidator" integrity checks fail (otherwise failure is simply logged)

l Extent - Allow extents (in which application writes are written as a write of a largergroup of related data blocks)

l FS Size Fixed - File system remains a fixed size when volume size changes (forexample, when adding disks to a traditional volume or when a snapmirrored volumerelationship is broken)

l Ignore Inconsistent - Ignore (at boot time) aggregate level inconsistencies that wouldnormally be considered serious enough to keep the associated volume offline

l Maximum Directory Size - Maximum size to which a directory can grow (in KB)

l Minra - Filer performs minimal file read-ahead (instead of employing speculativeread-ahead)

l A Time Update - A time on inode is always updated (otherwise a time on inode is notupdated when a file is read

l I2P - Inode to parent pathname translations are enabled

l No Snap - Automatic snapshots are disabled

l No Snap Dir - Snapshot directories are inaccessible

l Sched Snap Name - How scheduled snapshots are named: create_time (nameconstructed using <type>.<creation_time> (For example, hourly.2007-06-20-1200)),ordinal (name constructed using <type>.<ordinal> (For example, hourly.0, hourly.1, ...))

l NV Fail - Filer checks at boot time to verify that NVRAM is in a valid state

l Try First - Specifies which policy to pursue first to reclaim space when volume is full:volume_grow (attempt to increase the size of the (flexible) volume), snap_delete(delete snapshots)

l Fractional Reserve - Percentage of required reserved space actually reserved foroverwrites of reserved objects

l RAID Type - Type of RAID used: raid0, raid4, raid_dp

l RAID Size - Maximum number of disks in each RAID group

l Resync Snap Time - Mirror resynchronization snapshot frequency (in seconds)

l Root - Volume is the root volume for the filer (or will become so at next reboot)

l Snap Mirrored - Volume is a snapmirrored copy of another volume

l Sec Style - Security Mode for access: UNIX, CIFS, Mixed

l Op Locks - Indicates whether opportunistic locking is enabled on the file system

l Volume Size - Size of the volume (in MB)

Reports by System Template

70 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 71: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Internal - Indicates if the fibre channel port is internal (if the port is connected tointernal hardware, and not a SAN)

Filesystem Configuration SummarySummary of the file system configuration in a table report. Uses data from the FilesystemConfiguration data source.

l Hostname - Name of the host on which the file system is mounted

l Filesystem Count - Number of ports on the file system

l Total Capacity - Total capacity for all selected clients (in MB)

Filesystem DetailsReturns the file system details in a table report. Uses data from the FilesystemConfiguration and Filesystem Status data sources.

l Hostname - Name of the host on which the file system is mounted

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Filesystem ID - File system internal identifier

l Device - Name of the device on which the file system is located. For example, /dev/vol0

l Type - Type of file system; for example, UFS, EXT3, NTFS

l Capacity - Total space on the file system available for standard usage (in MB)

l Files - Maximum number of files on the file system (1000)

l Allocated - Pre-allocated capacity of the file system. Note that this is not the same asthe used capacity of the file system but applies to space that has been reserved butnot necessarily used (in MB)

l Snapshot capacity - Amount of space reserved for the use of snapshots (in MB). If thetotal amount of data stored for snapshots is higher than the amount of spacereserved for snapshots, additional space is claimed from the volume itself

l Save Volume - Volume used to allocate checkpoints for this file system

l Used Space - Amount of space that is currently used on the file system in megabytes

l Used Files - Total number of files that are on the file system

l Used Snapshot Space - Amount of snapshot space used on the file system inmegabytes

Filesystem Disk ConfigurationReturns the file system disk configuration in a table report. Uses data from the FilesystemDisk Configuration data source.

l Filesystem node - Name of the object to which the file system is attached

l Filesystem - Name of the file system

l Filesystem Sub Name - Identifier for the storage array on which the file system resides

l Disk node - Name of the object to which the disk is attached

l Disk - Identifier of the disk

l Disk Sub Name - Name of the storage array on which the disk resides

Reports by System Template

Filesystem Configuration Summary 71

Page 72: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Manufacturer - Manufacturer of the disk

l Model - Model of the disk

l Serial Number - Serial number of the disk

l Firmware Revision - Firmware version of the disk

l Size - Size of the disk (in GB)

Filesystem SummarySummary of the file system in a table report. Uses data from the Filesystem Capacity andFilesystem User Space data sources.

l Used space - Total amount of used space on all hosts (in MB)

l Hostname - Name of the host on which the file system is mounted

l Filesystem - Name of the file system

l Sub Name - Identifier for the Storage Array

l Used Files - Total number of files that are on the file system

l Capacity - Total space on the file system available for standard usage (in MB)

l Device - Name of the device on which the file system is located. For example, /dev/vol0

l Type - Type of file system; for example, UFS, EXT3, NTFS

Filesystem Summary By ClientSummary of the file system by client in a table report. Uses data from the FilesystemCapacity By Client and Filesystem User Space By Client data sources.

l Hostname - Name of the host on which the file system is mounted

l Used Space - Total amount of used space on all hosts (in MB)

l Filesystem - Name of the file system

l Sub Name - Identifier for the Storage Array

l Used Files - Total number of files that are on the file system

l Capacity - Total space on the file system available for standard usage (in MB)

l Device - Name of the device on which the file system is located. For example, /dev/vol0

l Type - Type of file system; for example, UFS, EXT3, NTFS

Host ConfigurationReturns the host configuration in a table report. Uses data from the Host Configurationdata source.

l Hostname - Name or IP address of the host

l Sub Name - Identifier for the storage array

l Vendor - Vendor name

l Controller - Controller name

l Product - Product name

l OS Class - Class of operating system (Windows or UNIX)

Reports by System Template

72 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 73: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Version - Version of the operating system

l iSCSI Name - Node name for machines with iSCSI interfaces. This field is notdisplayed for machines that do not have iSCSI interfaces

l Host ID - ID or serial number of the host

l Location - Hardware location

l Mail Server - Mail server name

Host Configuration for HostReturns the host configuration for host in a table report. Uses data from the ClusterResource Mapping and Host Configuration data sources.

l Hostname - Name or IP address of the host

l Sub Name - Identifier for the storage array

l Controller - Controller name

l Vendor - Vendor name

l Product - Product name

l OS Class - Class of operating system (Windows or UNIX)

l Version - Version of the operating system

l iSCSI Name - Node name for machines with iSCSI interfaces. This field is notdisplayed for machines that do not have iSCSI interfaces

l Host Id - ID or serial number of the host

l Location - Hardware location

l Mail Server - Mail server name

Host CountReturns the host count in a column chart. Uses data from the Host Configuration datasource.

l Count - Number of hosts

l Location - Hardware location

l Mail Server - Mail server name

Host OS DistributionReturns the host OS distribution in a pie chart. Uses data from the Host Configurationdata source.

l Product - Product name

l Hosts - ID or serial number of the host

l Location - Hardware location

l Mail Server - Mail server name

Host Summary By ClassReturns the host summary by class in a pie chart. Uses data from the Host Configurationdata source.

l OS Class - Class of operating system (Windows or UNIX)

Reports by System Template

Host Configuration for Host 73

Page 74: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Hosts - ID or serial number of the host

l Location - Hardware location

l Mail Server - Mail server name

Host Summary By PlatformReturns the host summary by platform in a pie chart. Uses data from the HostConfiguration data source.

l Product - Product name

l Hosts - ID or serial number of the host

l Location - Hardware location

l Mail Server - Mail server name

Host Summary By VendorReturns the host summary by vendor in a pie chart. Uses data from the Host Configurationdata source.

l Vendor - Vendor name

l Hosts - ID or serial number of the host

l Location - Hardware location

l Mail Server - Mail server name

Host Summary By VersionReturns the host summary by version in a pie chart. Uses data from the HostConfiguration data source.

l Version - Version of the operating system

l Hosts - ID or serial number of the host

l Location - Hardware location

l Mail Server - Mail server name

iSCSI ConfigurationReturns information on the configuration of iSCSI adapters on a object in a table report.Uses data from the iSCSI Configuration data source.

l Node - Name of the object on which the iSCSI adapter exists

l Sub Name - Identifier for the Storage Array

l Name - Name of the iSCSI adapter

LUN ConfigurationReturns the LUN configuration in a table report. Uses data from the LUN Configurationdata source.

l Node - Name of the array on which the LUN exists

l Sub Name - Identifier for the storage array on which the LUN resides

l Name - Name of the LUN

l LUN Name - Name of the LUN on the storage system to which the disk-based volumeis mapped. Populated only for disk-based volumes

Reports by System Template

74 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 75: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l System Type - Type of system. For example, CLARiiON

l LUN ID - Identifier for the LUN

l Serial - Serial number of the LUN

l Size - Size of the LUN (in GB)

l Volume - Volume on which the LUN resides, if applicable

l Type - Type of operating system to which the LUN is exported: AIX, HPUX, Image,Linux, Netware, Solaris, VMware, Windows

l Description - Description of the LUN

l Guarantee - Type of reserve on the LUN: Full, None

l Created - Time the LUN was created

l Create Time - Timestamp of the LUN creation

l RAID Level - RAID level of the LUN

l Idle Delay Time - Time spent idle waiting for a task (in seconds)

l Idle Threshold - Maximum time spent idle before idle threshold action

l Max Prefetch (Blocks) - Maximum number of pages read ahead

l Prefetch Disable (Blocks) - Reading ahead is disabled

l Prefetch Idle Count - Maximum number of pages read ahead while idle

l Pool - Pool name

l RAID Group - RAID group the disk belongs to

LUNs And Filesystems On Same Volume for rulesetReturns details on LUNs and file systems are on the same volumes in a table report. Usesdata from the File server exports and LUN Configuration data sources.

l Node - Name of the array on which the LUN exists

l Alert - Identifier of the alert

Memory ConfigurationReturns the memory configuration in a table report. Uses data from the MemoryConfiguration data source.

l Physical Memory - Amount of physical memory (in MB)

l Virtual Memory - Amount of virtual memory (in MB)

Memory Configuration DetailsReturns details of the memory configuration in a table report. Uses data from the MemoryConfiguration data source.

l Hostname - Name of the host

l Sub Name - Identifier for the storage array

l Physical Memory - Amount of physical memory (in MB)

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Reports by System Template

LUNs And Filesystems On Same Volume for ruleset 75

Page 76: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Multiple Tape Drive Firmware Revisions for rulesetReturns the multiple tape drive firmware revisions in a table report. Report for Multipletape drive firmware revisions rule. Uses data from the Tape Drive Configuration datasource.

l Alert - Identifier of the alert

Network Interface ConfigurationReturns the network interface configuration in a table report. Uses data from the NetworkInterface Config data source.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Identifier for the storage array

l Interface - Interface name

l Description - Optional description for the interface

l MAC Address - MAC address of the interface

l Autoneg - Indicates if the interface is set to auto negotiate

l MTU - Maximum Unit of Transmission for the interface (largest packet size) (in bytes)

l Failover - Standby interface if the primary interface goes down

l Multicast - If enabled, the interface can send data to more than one address at thesame time

l Receive Buffer - Amount of data that can be received before sending a reply (in bytes).If size is not specified on the interface, then the system-wide settings are used

l Send Buffer - Amount of data that can be sent before receiving a reply (in bytes). Ifsize is not specified on the interface, then the system-wide settings are used

l Virtual - Indicates if the network interface is virtual or physical

l Jumbo Packets Enabled - Indicates that Jumbo Packets are enabled by default.

Network Interface Configuration for InterfaceReturns the network interface configuration for interface in a table report. Uses data fromthe Cluster Resource Mapping and Network Interface Config data sources.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Identifier for the Storage Array

l Interface - Interface name

l Description - Optional description for the interface

l MAC Address - MAC address of the interface

l Auto Neg - Indicates if the interface is set to auto negotiate. In addition, it alsoindicates that the interface will try to negotiate speed and duplex settings with thehost that is connected to the interface

l MTU - Maximum Unit of Transmission for the interface (largest packet size) (in bytes)

l Failover - Standby interface if the primary interface goes down

l Multicast - If enabled, the interface can send data to more than one address at thesame time

l Promiscuous - If enabled, all traffic is passed to the interface rather than just packetsaddressed to it

Reports by System Template

76 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 77: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Send Buffer - Amount of data that can be sent before receiving a reply (in bytes). Ifsize is not specified on the interface, then the system-wide settings are used

l Receive Buffer - Amount of data that can be received before sending a reply (in bytes).If size is not specified on the interface, then the system-wide settings are used

l Simplex - If enabled, the interface messages are filtered and not displayed

l Virtual - Indicates if the network interface is virtual or physical

l Jumbo Packets Enabled - Indicates that Jumbo Packets are enabled by default.

Network Interface CountReturns the network interface count in a column chart. Uses data from the NetworkInterface Config data source.

l Count - Number of interfaces

Processor ConfigurationReturns the processor configuration in a table report. Uses data from the ProcessorConfiguration data source.

l Hostname - Hostname in which the processors are running

l Sub Name - Identifier for the Storage Array

l Num - Processor number

l Make - Make of the processors. For example, Intel

l Model - Model of the processor

l Speed - Speed of the processor (in MHz)

l Bus Speed - Speed of bus (in MHz)

Processor Configuration SummarySummary of the processor configuration in a column chart. Uses data from the ProcessorConfiguration data source.

l Model - Model of the processor

l Count - Number of processors

PSU ConfigurationReturns the PSU configuration in a table report. Uses data from the PSU Configurationdata source.

l Node - Name of the object

l Name - Name of the PSU

l Make - Make of the PSU

l Model - Model of the PSU

l Serial - Serial number of the PSU

l Location - Location of the PSU

Reports by System Template

Network Interface Count 77

Page 78: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Solid State Storage ConfigurationReturns the solid state storage configuration in a table report. Uses data from the SolidState Storage Configuration and Solid State Storage Status data sources.

l Hostname - Name of machine hosting solid state storage device

l Size - NVRAM (non-volatile random-access memory) capacity (in MB)

l Window Size - Maximum size of data that can be received at one time by the solidstate device (in MB)

l PCI Error Count - Number of PCI errors on NVRAM

l Error Count - Number of errors on NVRAM

Spare Disk Count by Use for rulesetReturns the spare disk count in a table report. Report for Running out of spare disks rule.Uses data from the Disk Count By Use, Report Times, and User Input data sources.

l Node - Name of the object

l Alert - Identifier of the alert

Spare Disk Count for rulesetReturns the spare disk count in a table report. Report for Few spare disks rule. Uses datafrom the Disk Count By Use and User Input data sources.

l Node - Name of the object

l Alert - Identifier of the alert

Tape Drive ConfigurationReturns the tape drive configuration in a table report. Uses data from the Tape DriveConfiguration data source.

l Hostname - Hostname of the device being monitored

l Device Name - Name of the tape drive

l Make - Make of the tape drive. For example, Quantum

l Model - Model of the tape drive

l Firmware - Firmware version running on the tape drive

l Serial - Serial number of the tape drive

l Interface Type - Type of interface the drive has. For example, SCSI, fibre

l Interface Address - Address of the drive interface if fibre attached

l Virtual - Indicates if the tape drive is a virtual tape drive

l Controller Firmware - Firmware version for controller

Tape Drive Firmware RevisionsReturns the tape drive firmware revisions in a table report. Uses data from the Tape DriveConfiguration data source.

l Model - Model of the tape drive

l Firmware revisions - Firmware version running on the tape drive

Reports by System Template

78 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 79: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Tape Drive Firmware SummarySummary of the tape drive firmware in a column chart. Uses data from the Tape DriveConfiguration data source.

Note

It is possible to gather data on only the firmware version of virtual tape drives, Physicaltape drives are not reflected in this chart.

l Firmware - Firmware version running on the tape drive

l Count - Number of tape drives

Tape Drive Interface SummarySummary of the tape drive interface in a column chart. Uses data from the Tape DriveConfiguration data source.

l Interface Type - Type of interface the drive has. For example, SCSI, fibre

l Count - Number of tape drives

Tape Drive Model SummarySummary of the tape drive models in a column chart. Uses data from the Tape DriveModel Summary data source.

l Model - Model of the tape drive

l Count - Number of tape drives

Tape Library ConfigReturns the tape library configuration in a table report. Uses data from the Tape LibraryConfiguration data source.

l Hostname - Name of the device being monitored. For normal tape libraries, this valueis the name of the tape library. For devices supporting multiple tape libraries such asan EDL, this value is the name of the manager

l Library Name - Name of the tape library. This field is not populated if monitoring alibrary directly. It is populated if monitoring a device that supports multiple librariessuch as an EDL. Physical tape drives do not return information on the tape library inwhich they are a member.

l Vendor - Tape library vendor. For example, StorageTek or Quantum

l Model - Model of the tape library

l Firmware - Firmware of the tape library

l Serial - Serial number of the tape library

l Num Hands - Number of robotic hands in the tape library

l Num Slots - Number of slots in the tape library

l Num Caps - Number of cartridge access ports in the tape library

l Num Drives - Number of tape drives in the tape library

l Num Modules - Number of modules in the tape library

Reports by System Template

Tape Drive Firmware Summary 79

Page 80: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Virtual - Indicates if this tape library is a virtual tape library

l Dedup Enabled - Indicates if deduplication is enabled on the virtual tape library

l Replication Enabled - Indicates if replication is enabled on the virtual tape library

l Backup Window - Indicates if a backup window has been defined, during whichdeduplication operations will not take place

l Backup Window Start Time - Start time of backup window (in seconds)

l Backup Window End Time - End time of backup window (in seconds)

Thermometer ConfigurationReturns the thermometer configuration in a table report. Uses data from the ThermometerConfiguration data source.

l Node - Name of the object

l Name - Name of the thermometer

l Make - Make of the thermometer

l Model - Model of the thermometer

l Serial - Thermometer Serial number

l Location - Location of the thermometer

Xsigo Infiniband Port ConfigurationReturns information on the InfiniBand ports on Xsigo switches in a table report. Uses datafrom the Infiniband Port Configuration data source.

l Hostname - Name of the Xsigo Director object

l Name - Identifier for the InfiniBand port

Capacity Planning system templatesCapacity Planning reports show the growth of the backup environment over time, whichallows planning for future growth There are two types of Capacity Planning reports:

l Backup reports, which show growth in the number of Jobs that were backed up andthe amount of data backed up in those Jobs

l Media reports, which show growth in the number of volumes and the amount of datamanaged by the backup server

For more specific details on the various reports, select one of the reports described in thefollowing sections.

Application GrowthReturns application growth in a table report. Uses data from the Application Growth datasource.

l Hostname - Name of the host

l Initiator - Path initiator

l Component Name - Name of the component

l Component Type - Type of component

l Capacity - Total capacity (in GB)

Reports by System Template

80 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 81: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Growth - Total growth (in GB)

Application UsageReturns details of application usage in a table report. Uses data from the MaskingConfiguration, Component LUN, and LUN Configuration data sources.

l Disk Array Name - Name of the disk array

l Hostname - Name of the host

l Initiator - Initiator of the session

l LUN - Logical unit number (LUN) through which the disk can be accessed by thesource

l Capacity - Size of the disk (in GB)

l Component Name - Name of the component

l Component Type - Type of component

Avamar Client Usage StatisticsReturns information on the Avamar client usage statistics in a table report. Uses datafrom the Avamar Garbage Collection Status, Backup Client Config, Backup Job Details,Last Backup Details, and Num Jobs data sources.

l Client - Name of the client on the backup server

l Domain Name - Avamar domain to which the client belongs

l Avg Daily Data Transferred -

l Last Backup End Time - Time the last incremental backup finished on the client

l Data Protected on Client -

l Change Rate -

l De-Dupe Rate - Average amount of data deduplicated

l Retention of Last Backup - Length of time for which job is retained

l Server - Name of the Avamar server

l Total Data Transferred in Period -

l # of successful backups -

l Client Added/Deleted -

Avamar Garbage Collection Data RecoveredReturns information on the Avamar garbage collection process in a column chart. Usesdata from the Avamar Garbage Collection Status data source.

l Server - Name of the Avamar server

l Sub Name - Name of the Avamar client

l ID - Identifier for the garbage collection process

l Recovered - Number of bytes recovered by the collection process (in MB)

l Recovered Offset - Number of bytes that should be added or deleted from theRecovered field to return the size of data recovered by garbage collection

Reports by System Template

Application Usage 81

Page 82: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Daily Staging By Storage PoolReturns the backup daily staging by storage pool in a column chart. Uses data from theTSM Total Size Migrated By Storage Pool data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool

l Size - Total amount of data migrated from the storage pool (in MB)

Backup Daily Total Group DurationReturns the total duration of group runs for each 24 hour interval in a table report. Usesdata from the Backup Group Duration data source.

l Server - Name of the backup server

l Group - Name of the group on the backup server

l Total Duration - Total duration of the group run

l Noted - Timestamp associated with the total duration value

Backup Data Backed Up DailyReturns the total data that are backed up daily in a column chart. Uses data from theTotal Size data source.

l Total Size - Total amount of data backed up in a window (in GB)

Backup Data Backed Up Daily By DeviceReturns the total data by device that are backed up daily in a column chart. Uses datafrom the Total Size By Device data source.

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device

l Total Size - Total amount of data (in MB)

l Media Server - Name of the media server on which the backup occurred

Backup Data Backed Up Daily By Media ServerReturns the total data by media server that are backed up daily in a column chart. Usesdata from the Total Size data source.

l Total Size - Total amount of data backed up (in GB)

l Media Server - Name of the media server on which the backup occurred

Backup Data Backed Up Daily By ServerReturns the total data by server that are backed up daily in a column chart. Uses datafrom the Total Size data source.

l Total Size - Total amount of data backed up (in GB)

l Server - Name of the server on which the backup occurred

Reports by System Template

82 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 83: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Data Backed Up WeeklyReturns the total data that are backed up weekly in a column chart. Uses data from theTotal Size data source.

l Total Size - Total amount of data backed up (in GB)

Backup Data Backed Up Weekly By Media ServerReturns the total data by media server that are backed up weekly in a column chart. Usesdata from the Total Size data source.

l Total Size - Total amount of data backed up (in GB)

l Media Server - Name of the media server on which the backup occurred

Backup Data Backed Up Weekly By ServerReturns the total data by server that are backed up weekly in a column chart. Uses datafrom the Total Size data source.

l Total Size - Total amount of data backed up (in GB)

l Server - Name of the server on which the backup occurred

Backup Duration of Jobs Backed Up DailyReturns the total duration of jobs that are backed up daily in a column chart. Uses datafrom the Total Duration data source.

l Total Duration - Total duration of backups up in a window (in seconds)

Backup Duration of Jobs Backed Up Daily By Media ServerReturns the total duration of jobs by media server that are backed up daily in a columnchart. Uses data from the Total Duration data source.

l Total Duration - Total duration of backups up in a window (in seconds)

l Media Server - Name of the media server on which the backup occurred

Backup Duration of Jobs Backed Up Daily By ServerReturns the total duration of jobs by server that are backed up daily in a column chart.Uses data from the Total Duration data source.

l Total Duration - Total duration of backups up in a window (in seconds)

l Server - Name of the server on which the backup occurred

Backup Duration of Jobs Backed Up WeeklyReturns the total duration of jobs that are backed up weekly in a column chart. Uses datafrom the Total Duration data source.

l Total Duration - Total duration of backups up in a window (in seconds)

Reports by System Template

Backup Data Backed Up Weekly 83

Page 84: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Duration of Jobs Backed Up Weekly By Media ServerReturns the total duration of jobs by media server that are backed up weekly in a columnchart. Uses data from the Total Duration data source.

l Total Duration - Total duration of backups up in a window (in seconds)

l Media Server - Name of the media server on which the backup occurred

Backup Duration of Jobs Backed Up Weekly By ServerReturns the total duration of jobs by server that are backed up weekly in a column chart.Uses data from the Total Duration data source.

l Total Duration - Total duration of backups up in a window (in seconds)

l Server - Name of the server on which the backup occurred

Backup Files Backed Up DailyReturns the total number of files that are backed up daily in a column chart. Uses datafrom the Total Files data source.

l Total Files - Total number of files backed up

Backup Files Backed Up Daily By Media ServerReturns the total number of files by media server that are backed up daily in a columnchart. Uses data from the Total Files data source.

l Total Files - Total number of files backed up

l Media Server - Name of the media server on which the backup occurred

Backup Files Backed Up Daily By ServerReturns the total number of files by server that are backed up daily in a column chart.Uses data from the Total Files data source.

l Total Files - Total number of files backed up

l Server - Name of the server on which the backup occurred

Backup Files Backed Up WeeklyReturns the total number of files that are backed up weekly in a column chart. Uses datafrom the Total Files data source.

l Total Files - Total number of files backed up

Backup Files Backed Up Weekly By Media ServerReturns the total number of files by media server that are backed up weekly in a columnchart. Uses data from the Total Files data source.

l Total Files - Total number of files backed up

l Media Server - Name of the media server on which the backup occurred

Reports by System Template

84 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 85: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Files Backed Up Weekly By ServerReturns the total number of files by server that are backed up weekly in a column chart.Uses data from the Total Files data source.

l Total Files - Total number of files backed up

l Server - Name of the server on which the backup occurred

Backup Number of Jobs Backed Up DailyReturns the total number of jobs that are backed up daily in a column chart. Uses datafrom the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

Backup Number of Jobs Backed Up Daily By Media ServerReturns the total number of jobs by media server that are backed up weekly in a columnchart. Uses data from the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

l Media Server - Name of the media server on which the backup occurred

Backup Number of Jobs Backed Up Daily By ServerReturns the total number of jobs by server that are backed up weekly in a column chart.Uses data from the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

l Server - Name of the server on which the backup occurred

Backup Number of Jobs Backed Up HourlyReturns the total number of jobs that are backed up each week in a column chart. Usesdata from the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

Backup Number of Jobs Backed Up WeeklyReturns the total number of jobs that are backed up weekly in a column chart. Uses datafrom the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

Backup Number of Jobs Backed Up Weekly By Media ServerReturns the total number of jobs by media server that are backed up weekly in a columnchart. Uses data from the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

l Media Server - Name of the media server on which the backup occurred

Reports by System Template

Backup Files Backed Up Weekly By Server 85

Page 86: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Number of Jobs Backed Up Weekly By ServerReturns the total number of jobs by server that are backed up weekly in a column chart.Uses data from the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

l Server - Name of the server on which the backup occurred

Capacity Overview for BlockReturns the block capacity overview in a column chart. Uses data from the DiskConfiguration, RAID Group Configuration, and Storage Pool Config data sources.

l Capacity - Identifies the amount of potential capacity (in GB)

l Type - Type of system. For example, CLARiiON

l Sub Type -

Capacity Overview for FileReturns the file capacity overview in a column chart. Uses data from the FilesystemConfiguration, Filesystem Status, Storage Pool Configuration, and Volume Configurationdata sources.

l Value - (in MB)

l Type - Type of system. For example, CLARiiON

l Sub Type -

Data Domain Total Replicated CapacityReturns the Data Domain total replicated capacity in a table report. Uses data from theTotal Replicated Capacity data source.

l Hostname - Hostname of replicating server

l Destination Host - Unique identifier for the destination of replication

l Average Capacity - Average replicated capacity (in MB)

Media Count By Location TrendReturns the media count by location trend in a line chart. Uses data from the Media CountBy Location data source.

Note

Volumes that are offline are not displayed.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l Media Count - Total number of volumes configured on each backup server

Reports by System Template

86 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 87: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Media Count By Pool and Location TrendReturns the count by pool and location trend in a line chart. Uses data from the MediaCount By Pool and Location data source.

Note

Volumes that are offline are not displayed

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l Media Count - Total number of volumes configured on each backup server

l Pool - Name of the pool

Media Count By Pool and State and Location TrendReturns the media count by pool and state and location trend in a line chart. Uses datafrom the Media Count By Pool and State and Location data source.

Note

Volumes that are offline are not displayed

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l Pool - Name of the pool

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count By Pool And State TrendReturns the media count by pool and state trend in a line chart. Uses data from the MediaCount By Pool and State data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Pool - Name of the pool

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count By Pool TrendReturns the media count by pool trend in a line chart. Uses data from the Media Count ByPool data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

Reports by System Template

Media Count By Pool and Location Trend 87

Page 88: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Pool - Name of the pool

Media Count By State and Location TrendReturns the media count by state and location trend in a line chart. Uses data from theMedia Count By State and Location data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l Pool - Name of the pool

l Media Count - Total number of volumes configured on each backup server

Media Count By State TrendReturns the media count by state trend in a line chart. Uses data from the Media Count ByState data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count TrendReturns the media count trend in a line chart. Uses data from the Media Count datasource.

l Media Count - Total number of volumes configured on each backup server

Media Usage By Library TrendReturns the media usage by library trend in a line chart. Uses data from the Media UsageBy Location data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the tape library in which the volume is located

l Media Usage - Total amount of data stored in that location (in MB)

Media Usage By Pool and Library TrendReturns the media usage by pool and library trend in a line chart. Uses data from theMedia Usage By Pool and Location data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the tape library in which the volume is located

l Media Usage - Amount of data broken down by pool and location (in MB)

l Pool - Name of the media pool

Reports by System Template

88 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 89: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Media Usage By Pool TrendReturns the media usage by pool trend in a line chart. Uses data from the Media Usage ByPool data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Pool - Name of the tape pool

l Media Usage - Total amount of data stored in that pool (in MB)

Media Usage TrendReturns the media usage trend in a line chart. Uses data from the Media Usage datasource.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Media Usage - Total amount of data stored on all media (in MB)

Networker Individual Job Size for Data DomainReturns the Networker individual job size for Data Domain in a column chart. Uses datafrom the Backup Device Status, Backup Device Config, Pools On Data Domain, BackupJob Device Mapping, and Backup Job Details with Volume data sources.

l Server - Name of the backup server

l Job - Name of the backup job

l Size - The size of the backup job

l Device Access - Name of the Data Domain server instance.

NetWorker Total Job Size and Used Space for Data DomainReturns the NetWorker total job size and the used space for Data Domain in a tablereport. Uses data from the Backup Device Status, Backup Device Config, Pools On DataDomain, Backup Job Device Mapping, Backup Job Details with Volume, and FilesystemConfiguration data sources.

l Server - Name of the backup server

l Data Domain Name - Name of the Data Domain host

l Total Job Size - Amount of data backed up (in MB)

l Filesystem Used Size - Total amount of used space on all hosts (in MB)

Pool Capacity UsageReturns the pool capacity usage in a line chart. Uses data from the RAID GroupConfiguration and Storage Pool Config data sources.

l Hostname - Name of the server

l Pool Name - Name of the storage pool

l User Size - The free capacity on a storage pool over the time period

l Free Capacity -

Reports by System Template

Media Usage By Pool Trend 89

Page 90: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Used Capacity - The used capacity on a storage pool

Pool Capacity Usage for PoolReturns the pool capacity usage for pool in a line chart. Uses data from the RAID GroupLocation and Storage Pool Config data sources.

l Hostname - Hostname or IP address of the host being monitored

l Name - Storage Pool name

l User Size - Amount of storage used by the pool (in MB)

l Free Capacity - Free capacity of the storage pool (in MB)

l Consumed Capacity - Amount of storage used by the pool (in MB)

l Logical Capacity - Potential capacity of the storage pool (in MB)

l Used Capacity - Amount of storage used by the pool (in MB)

RecoverPoint Protected CapacityReturns the protected data capacity by RecoverPoint server in a table. Uses data from theConsistency Group Data Protected and Consistency Group Copy Configuration datasources.

l Server - Name or IP address of the Management Interface of the RecoverPoint server

l Data Protected - Total amount of data protected (in MB)

Save Pool Detailed UsageReturns the detailed usage of save pool in a table report. Uses data from the ComponentLUN, Symmetrix Local Replications, and Symmetrix Snapshot Rule Status data sources.

l Hostname - Hostname or IP address of the host being monitored

l Disk Array Name - Identifier for the array

l Source Device -Name of the device on the storage array where the source object islocated

l Target Device - Name of the device where the source is being replicated

l Snap Time -

l Save Pool -

l Used Capacity - Amount of storage used by the pool (in MB)

l Changed -

l Replication Method - Method by which the object has been replicated

l Component Name - Name of the component

l Component Type - Type of the component

Save Pool UsageReturns the usage of a save pool in a table report. Uses data from the Save PoolConfiguration and Save Pool Status data sources.

l Pool Name - Name of the storage pool

l Array Name - Name of the array

l Total Capacity - Total capacity (in GB)

Reports by System Template

90 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 91: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Enabled Capacity - Enabled capacity (in GB)

l Used Capacity - Amount of storage used by the pool (in GB)

l Pool ID - Identifier for the pool

l Used - Amount used (as a percentage)

l State - State of the pool: Empty, Partial, Full, Frozen, Suspended

Snapshot UtilizationReturns the snapshot utilization in a line chart. Uses data from the Save PoolConfiguration and Save Pool Status data sources.

l Array Name - Storage array name

l Pool Name - Name of the storage pool

l Usage Percentage - Utilization of the allocated snapshot space

Storage Array CapacityReturns the storage array capacity in a table report. Uses data from the Disk Array Statusand Disk Configuration data sources.

l Array Name - Storage array name

l Total Raw Capacity - Identifies the amount of raw capacity (in GB)

l Used Raw Capacity - Identifies how much of the raw capacity is used (in GB)

l Available Raw Capacity - Identifies how much of the raw capacity is available (in GB)

l Predicted Available -

l Out of Space (Estimated Time) - Amount of time into the future at which the storagearray will be out of space

Storage Array Capacity UsageReturns the storage array capacity usage in a line chart. Uses data from the Disk ArrayStatus data source.

l Hostname - Name of the host being monitored

l Used Capacity - Identifies how much of the capacity is used (in GB)

l Available Capacity - Identifies how much of the capacity is available (in GB)

l Total Capacity - Identifies the amount of capacity (in GB)

Storage Array Filling Up for rulesetReturns details when storage array is filling up in a table report. Report for Storage arrayis filling up rule. Uses data from the Disk Configuration, Disk Status, RAID GroupConfiguration, Storage Pool Config, and User Input data sources.

l Array Name - Storage array name

l Available Raw Capacity - Identifies how much of the raw capacity is available (in GB)

l Type -

l Pool -

l Free Capacity - Identifies how much of the capacity is available (in GB)

l Initial Consumed Capacity -

Reports by System Template

Snapshot Utilization 91

Page 92: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Alert - Identifier of the alert

Storage Array Raw CapacityReturns the storage array raw capacity in a table report. Uses data from the Disk ArrayConfig, Disk Array Status, Disk Configuration, Disk Status data sources. Raw capacity isconsidered to be the total usable capacity of any disk that has not been put in a RAIDgroup or block storage pool (not taking into account loss of space caused by the RAIDprotection or other overhead).

l Array Name - Storage array name

l Type -

l Total Raw Capacity - Identifies the amount of raw capacity (in GB)

l Used Raw Capacity - Identifies how much of the raw capacity is used (in GB)

l Available Raw Capacity - Identifies how much of the raw capacity is available (in GB)

l Prediction Time -

l Predicted Available - (in GB)

Storage Pool Application GrowthReturns the growth of the storage pool application in a table report. Uses data from thePool Application Growth data source.

l Hostname - Name of the host

l Initiator - Path initiator

l Component Name - Name of the component

l Component Type - Type of component

l Capacity - Total capacity (in GB)

l Growth - Total growth (in GB)

l Pool Name - Name of the pool

l Type - Type of the pool

Storage Pool Application UsageReturns the usage of the storage pool application in a table report. Uses data from theComponent LUN, LUN Configuration, and Masking Configuration data sources.

l Pool Name - Name of the storage pool

l Initiator -

l Hostname -

l Disk Array Name -

l Capacity -

l LUN - Logical unit name (LUN) through which the disk can be accessed by the source

Storage Pool CapacityReturns the capacity of the storage pool in a table report. Uses data from the RAID GroupConfiguration and Storage Pool Config data sources.

l Array Name - Name of the storage array

Reports by System Template

92 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 93: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Pool Name - Name of the storage pool

l Type -

l Raw Capacity -

l User Capacity -

l Used Capacity -

l Subscribed -

l Free Capacity -

l Pool Type - Type of storage pool: Primary, Copy, or Active Data

l Out of Space (Estimated Time) -

Storage Pool Raw Capacity PeriodicReturns the periodic storage pool raw capacity in a line chart. Uses data from the RAIDGroup Configuration and Storage Pool Config data sources.

l Disk Array -

l Pool Name - Name of the storage pool

l Free Capacity -

l Pool Type - Type of storage pool: Primary, Copy, or Active Data

l Type -

l Disk Array -

l Pool Name - Name of the storage pool

l Free Capacity -

l Type-

TSM Daily Migration By Storage PoolReturns the TSM daily migration by storage pool in a column chart. Uses data from theTSM Backup Set and TSM Total Size Migrated By Storage Pool data sources.

l Server - Name of the TSM Server

l Sub Name -

l Storage Pool - Name of the storage pool

l Size - Total size of the migration jobs that were run on the storage pool

TSM Daily Reclamation By Storage PoolReturns the TSM daily reclamation by storage pool in a column chart. Uses data from theTSM Total Size Reclaimed By Storage Pool data source.

l Server -

l Sub Name -

l Storage Pool - Name of the storage pool from which data has been staged

l Size -

Reports by System Template

Storage Pool Raw Capacity Periodic 93

Page 94: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Change Management system templatesChange Management reports show configuration changes that occur on the backupserver over a given time. Change management reports display details of all of theconfiguration changes between the start time and end time of the report time window.

Avamar Audit User Changes DetailsReturns information on changes made by users to Avamar objects in a table report. Usesdata from the Avamar Audit data source.

l Server - Host name or IP address of the Avamar server on which the backupapplication resides

l Sub Name - Not applicable to Avamar

l Domain Name - Avamar domain to which the client belongs

l User - User who made the change

l Object - Object type that was changed. For example, schedule, user, group, domain,dataset, or client

l Operation - Description of the change

l Start Time - Time the change started

l End Time - Time the change took effect

Backup Application Change DetailsReturns changes in configuration for the devices, groups, jobs, and clients of a backupserver in a table report. Uses data from the Backup Device Config, Backup ServerMapping, Backup Client Config, and Backup Group Config data sources.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Type - The type of configuration change; for example, client, group, job, or device.

l Object - Data selection or object associated with the backup job

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Backup Application Change Details for rulesetReturns changes in configuration for the devices, groups, jobs, and clients of a backupserver in a table report. Report for Backup Application configuration changed rule. Usesdata from the Backup Device Config, Backup Server Mapping, Backup Client Config, andBackup Group Config data sources.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Alert - Identifier of the alert

Reports by System Template

94 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 95: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Application Change SummarySummary of the changes in configuration for the devices, groups, jobs, and clients of abackup server in a column chart. Uses data from the Backup Device Config, BackupServer Mapping, Backup Client Config, and Backup Group Config data sources.

l Type - Type of configuration change; for example, client, group, job, or device

l Change - Type of change: Added, Deleted, Modified

l Count - Count of the number of the type of configuration change

Backup Application Configuration Changes for PoolsReturns the backup application configuration changes for pools in a table report. Usesdata from the Backup Device Config, Backup Server Mapping, Backup Pool Device ConfigMapping, Backup Pool Job Config Mapping, Backup Pool Group Config Mapping, BackupClient Config, Backup Pool Client Config Mapping, and Backup Group Config datasources.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Pool - Pool of the volume that is required

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

l Type - Type of configuration change; for example, client, group, job, or device

l Object - Data selection or object associated with change

Backup Application Last 10 ChangesReturns the last 10 backup application changes in a table report. Uses data from theBackup Client Config, Backup Device Config, Backup Group Config, and Backup ServerMapping data sources.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Type - Type of policy

l Object - Data selection or object associated with change

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Backup Client Configuration Change DetailsReturns the details of backup client configuration changes in a table report. Uses datafrom the Backup Client Config and Backup Server Mapping data sources.

l Server - Name of the backup server

l Sub Name - Name of TSM Server instance

l Client - Name of the client

Reports by System Template

Backup Application Change Summary 95

Page 96: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Backup Client Configuration Change SummarySummary of the changes to the backup client configuration in a column chart. Uses datafrom the Backup Client Config and Backup Server Mapping data sources.

l Added - A count of the number of client configuration changes added

l Removed - A count of the number of modified client configuration changes

l Modified - A count of the number of client configuration changes deleted

Backup Device Configuration Change DetailsReturns the details of the backup device configuration changes in a table report. Usesdata from the Backup Device Config data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device in the backup software

l Device Alias - Alias for the drive, if available

l Device Path - Operating system path to the device

l Device Class - Class of device: Disk, Tape

l Device Type - Type of device. For example, DLT, Ultrium-2

l Jukebox - Name of the jukebox in which the device is located

l Read Only - Indicates if the drive is configured as read-only: Yes, No

l Num Target Sessions - Number of target sessions

l Max Sessions - Maximum number of client and server sessions

l Send/Receive Timeout - Send and Receive timeout

l Num Retries - Number of retries

l Network Retry Interval - Network failure retry interval (in seconds)

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

l Max Errors - Maximum number of errors

l Device Access - Device access information

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Backup Device Configuration Change SummarySummary of the backup device configuration changes in a column chart. Uses data fromthe Backup Device Config data source.

l Added - A count of the number of device configuration changes added

Reports by System Template

96 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 97: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Modified - A count of the number of modified device configuration changes

l Removed - A count of the number of device configuration changes deleted

Backup Group Configuration Change DetailsReturns the details of the backup group configuration changes in a table report. Usesdata from the Backup Group Config data source.

l Server - Name of the backup server

l Sub Name - Name of TSM Server instance

l Group - Name of the group on the backup server

l Domain Name - Identifier for Application domain

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Backup Group Configuration Change SummarySummary of the backup group configuration changes in a column chart. Uses data fromthe Backup Group Config data source.

l Added - A count of the number of group configuration changes added

l Modified - A count of the number of group modified configuration changes

l Removed - A count of the number of group configuration changes delete

Backup Job Configuration Change DetailsReturns the details of the backup job configuration changes in a table report. Uses datafrom the Backup Server Mapping data source.

l Server - Name of the backup server

l Sub Name - Name of TSM Server instance

l Client - Name of the client

l Group - Name of the group on the backup server

l Job - Name of a backup Job

l Backup Set - Name of the backup set associated with the job

l Schedule - Name of the backup schedule

l Browse Policy - Browse policy of the NetWorker server

l Retention Policy - Retention policy of the NetWorker server

l Directive - Directive files of the NetWorker server

l Backup Command - Commands available in the NetWorker server

l Executable Path - Path for NetWorker server executable files

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Reports by System Template

Backup Group Configuration Change Details 97

Page 98: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Job Configuration Change SummarySummary of the backup job configuration changes in a column chart. Uses data from theBackup Server Mapping data source.

l Added -

l Modified -

l Removed -

Backup Pool Configuration Change DetailsReturns the details of the backup pool configuration changes in a table report. Uses datafrom the Backup Pool Configuration data source.

l Server - Hostname of backup server on which the pool is located

l Sub Name - Name of TSM server instance

l Pool Name - Name of the storage pool

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Backup Schedule Configuration Change DetailsReturns a list of changes to backup schedules in a column chart. Uses data from theBackup Schedule Config and Backup Schedule Config Dates data sources.

l Server - Hostname of the backup server

l Group - Name of the group associated with the schedule

l Schedule - Name of the schedule on the backup server

l Change - Type of change: Added, Deleted, Modified

l Date Change -

Backup Schedule Configuration Change SummarySummary of the backup schedule configuration changes in a column chart. Uses datafrom the Backup Schedule Config and Backup Schedule Config Dates data sources.

l Added -

l Modified -

l Removed -

Backup Server Configuration Change DetailsReturns the details of the backup server configuration changes in a table report. Usesdata from the Backup Server Config data source.

l Server - Hostname of the backup server

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Details of the specific changes that have taken place, including changedfield value.

Reports by System Template

98 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 99: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Hostname - FQDN of the backup server

BTD Change DetailsReturns the details on the BTD changes in a table report. Uses data from the File ServerExports, Tape Library Configuration, and Tape Drive data sources.

l Hostname - Name of the device being monitored

l Object -

l Type - Type of export: CIFS, NFS

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

BTD Change SummarySummary information on the BTD changes in a column chart. Uses data from the FileServer Exports, Tape Library Configuration, and Tape Drive Configuration data sources.

l Change - Type of change: Added, Deleted, Modified

l Count - Number of changes

l Type -

BTD Last 10 Change DetailsReturns information on the last 10 changes in a table report. Uses data from the FileServer Exports, Tape Library Configuration, and Tape Drive Configuration data sources.

l Hostname - Name of the device being monitored

l Object -

l Type -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Celerra Change DetailsReturns the details of the Celerra changes in a table report. Uses data from the DataMover Configuration, File server exports, Network Interface Config, Quota Configuration,Storage Pool Configuration, Filesystem Configuration, LUN Configuration, DiskConfiguration, Filesystem Mount Configuration, Fibre Channel Port Config, ProcessorConfiguration, Network Interface IP Config, iSCSI Configuration, Disk Array Config,Memory Configuration, and Volume Configuration data sources.

l Hostname - Name or IP Address of the EMC File Storage/Celerra

l Sub Name -

l Sub Name 2 -

l Type - Type of file system. For example, UFS, EXT3, NTFS

l Object -

l Change - Type of change: Added, Deleted, Modified

Reports by System Template

BTD Change Details 99

Page 100: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Noted - Timestamp for the change

l Difference - Description of what changed if 'Modified' was indicated

Celerra Change SummarySummary of the Celerra changes in a column chart. Uses data from the Data MoverConfiguration, File server exports, Network Interface Config, Quota Configuration, StoragePool Configuration, Filesystem Configuration, LUN Configuration, Disk Configuration,Filesystem Mount Configuration, Fibre Channel Port Config, Processor Configuration,Network Interface IP Config, iSCSI Configuration, Disk Array Config, MemoryConfiguration, and Volume Configuration data sources.

l Change - Type of change: Added, Deleted, Modified

l Change Count - Number of changes

l Type - Type of file system. For example, UFS, EXT3, NTFS

Celerra Configuration Change DetailsReturns the details of the Celerra configuration changes in a table report. Uses data fromthe Data Mover Configuration and Filesystem Configuration data sources.

l Server - Name or IP Address of the EMC File Storage/Celerra

l Type - Type of file system. For example, UFS, EXT3, NTFS

l Object -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Celerra Last 10 Change DetailsReturns the details of the last ten Celerra changes in a table report. Uses data from theData Mover Configuration, File server exports, Network Interface Config, QuotaConfiguration, Storage Pool Configuration, Filesystem Configuration, LUN Configuration,Disk Configuration, Filesystem Mount Configuration, Fibre Channel Port Config, ProcessorConfiguration, Network Interface IP Config, iSCSI Configuration, Disk Array Config,Memory Configuration, and Volume Configuration data sources.

l Hostname - Name or IP Address of the EMC File Storage/Celerra

l Sub Name -

l Sub Name 2 -

l Type -

l Object -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Data Domain Change DetailsReturns information on Data Domain changes in a table. Uses data from the DiskConfiguration, Replication Rule Configuration, Fibre Channel Port Config, Network

Reports by System Template

100 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 101: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Interface Config, Network Interface IP Config, Symmetrix Local Replications, and LUNConfiguration data sources.

l Hostname - Name or IP address of the Data Domain

l Change - Type of change: Added, Deleted, Modified

l Change Occurred On - The name of the object the change occurred on

l Difference - Description of the change if Modified is indicated

l Noted - Timestamp for the change

l Type - The type of configuration change. For example, Fibre Channel PortConfiguration change, Network Interface configuration change

Data Mover Configuration Change DetailsReturns the details of the Data Mover configuration changes in a table report. Uses datafrom the File server exports, Fibre Channel Port Config, Network Interface Config,Processor Configuration, iSCSI Configuration, Network Interface IP Config, and MemoryConfiguration data sources.

l Hostname - Name of the file server

l Sub Name - Identifier for the Storage Array

l Type - Type of Fibre Channel port on the switch or HBA

l Object -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Disk Array Configuration Change DetailsReturns the details of the disk array configuration changes in a table report. Uses datafrom the Disk Array Config, Disk Configuration, and LUN Configuration data sources.

l Hostname - Name of the host to which the disk is attached

l Type - Type of system. For example, CLARiiON

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Fileserver Export Change DetailsReturns the details of the fileserver export changes in a table report. Uses data from theFile server exports data source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l Name - Name of the file system being exported

l Export - Name which the file system is being exported as

l Type - Type of export: CIFS, NFS

l Permission - Permissions on the export. For example, read only (NFS only)

l Dedup Enabled - Indicates if deduplication was enabled on the export

Reports by System Template

Data Mover Configuration Change Details 101

Page 102: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Replication Enabled - Indicates if replication was enabled on the export

l Backup Window - Identifier for backup window in which export took place

l Backup Window Start Time - Start time for backup window (in seconds)

l Backup Window End Time - End time for backup window (in seconds)

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Filesystem Configuration Change DetailsReturns the details of the file system configuration changes in a table report. Uses datafrom the Filesystem Configuration data source.

l Hostname - Name of the host on which the file system is mounted

l Filesystem - Name of the file system

l Device - Name of the device on which the file system is located. For example, /dev/vol0

l Type - Type of file system; for example, UFS, EXT3, NTFS

l Capacity - Total space on the file system available for standard usage (in MB)

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Media Location Change DetailsReturns the details of the media location changes in a table report. Uses data from theMedia Details data source.

l Server - Hostname of the backup server

l Sub Name - Identifier for the storage array

l Volume Id - Identifier for the volume

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Memory Configuration Change DetailsReturns the details of the memory configuration changes in a table report. Uses data fromthe Memory Configuration data source.

l Hostname - Name of the host

l Sub Name - Identifier for the storage array

l Physical Memory - Amount of physical memory (in MB)

l Change - Type of change: Added, Deleted, Modified

Reports by System Template

102 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 103: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

NetBackup Storage Unit Configuration Change DetailsReturns the details of the NetBackup storage unit configuration changes in a table report.Uses data from the NetBackup Storage Unit Config data source.

l Server - Name of the backup server

l Name - Name of the storage unit

l Media Server - Media Server with which the storage unit is associated

l Storage Unit Type - Storage unit type; for example, Media Manager, Disk, NDMP,Fastrax

l Media Sub Type -

l On Demand Only - Indicates if the storage unit can be used for On Demand backupsonly (that is, only when a policy of schedule is explicitly configured to use thisstorage unit)

l Path - Absolute path name to the directory used by Disk based storage unit

l Robot Type - Type of robot on which the storage unit is located

l Density - Cartridge density used by Media Manager storage units

l Robot Number - Number of the robot associated with the storage unit

l Max Concurrent Drives - Maximum number of drives used by a Media Managerstorage unit

l Max Concurrent Jobs - Maximum number of Jobs that can be multiplexed to a diskstorage unit

l Max Multiplexing - Maximum number of jobs multiplexed per drive. Multiplexingsends concurrent, multiple backups from one or several clients to a single drive

l Max Fragment Size - Maximum fragment size used by the storage unit

l NDMP Host - NDMP Host used by NDMP storage units

l Disk Pool - Pool to which the storage unit belongs

l High Water Mark - Percentage of dirty pages to trigger a cache flush

l Low Water Mark - Percentage of dirty pages to stop a cache flush

l Ok On Root - Indicates if the volume can be mounted on root file system

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Network Interface Configuration Change DetailsReturns the details of the network interface configuration changes in a table report. Usesdata from the Network Interface Config data source.

l Hostname -

l Interface - Identifier for the network interface

l MAC Address - Ethernet address for the network interface

l Auto Neg - Indication of whether the interface is set to autonegotiate with a switch

Reports by System Template

NetBackup Storage Unit Configuration Change Details 103

Page 104: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Sub Name -

l Description - Network interface description

l MTU - Maximum transmission unit. Size of the largest packet that a network protocolcan transmit

l Failover - If enabled, the interface can standby if the primary interface goes down

l Multicast - If enabled, the interface can send data to more than one address at thesame time

l Promiscuous - If enabled, all traffic is passed to the interface rather than just packetsaddressed to it

l Simplex - If enabled, the interface messages are filtered and not displayed

l Receive Buffer - Amount of data that can be received before sending a reply. If size isnot specified on the interface, then the system-wide settings are used.

l Send Buffer - Amount of data that can be sent before receiving a reply. If size is notspecified on the interface, then the system-wide settings are used.

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

l Jumbo Packets Enabled - Indicates that Jumbo Packets are enabled by default.

RecoverPoint Change DetailsReturns the details of the RecoverPoint changes in a table report. Uses data from theConsistency Group Configuration, Consistency Group Copy Configuration, RPAConfiguration, and Splitter Configuration data sources.

l Server - Name of the RecoverPoint host

l Type - Type of RecoverPoint component that was changed

l Object - Name of the component

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

RecoverPoint Change SummarySummary of the RecoverPoint changes in a column chart. Uses data from the ConsistencyGroup Configuration, Consistency Group Copy Configuration, RPA Configuration, andSplitter Configuration data sources.

l Added -

l Modified -

l Deleted -

RecoverPoint Last 10 ChangesReturns the last ten RecoverPoint changes in a table report. Uses data from theConsistency Group Configuration, Consistency Group Copy Configuration, RPAConfiguration, and Splitter Configuration data sources.

l Server -

Reports by System Template

104 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 105: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Object -

l Type -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Symmetrix Change DetailsReturns the details of the Symmetrix changes in a table report. Uses data from theReplication Rule Configuration, Network Interface Config, Symmetrix Local Replications,Storage Pool Config, Save Pool Configuration, LUN Configuration, Disk Configuration,Fibre Channel Port Config, iSCSI Configuration, Network Interface IP Config, Save PoolDevices, Disk Array Config, Masking Configuration, and Memory Configuration datasources.

l Hostname - Name or IP Address of the Symmetrix host

l Sub Name - Storage array identifier

l Sub Name 2-

l Type -

l Object -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Symmetrix Change SummarySummary of the Symmetrix changes in a column chart. Uses data from the ReplicationRule Configuration, Network Interface Config, Symmetrix Local Replications, Storage PoolConfig, Save Pool Configuration, LUN Configuration, Disk Configuration, Fibre ChannelPort Config, iSCSI Configuration, Network Interface IP Config, Save Pool Devices, DiskArray Config, Masking Configuration, and Memory Configuration data sources.

l Added -

l Modified -

l Deleted -

Symmetrix Last 10 Change DetailsReturns the details of the last ten Symmetrix changes in a table report. Uses data fromthe Replication Rule Configuration, Network Interface Config, Symmetrix LocalReplications, Storage Pool Config, Save Pool Configuration, LUN Configuration, DiskConfiguration, Fibre Channel Port Config, iSCSI Configuration, Network Interface IP Config,Save Pool Devices, Disk Array Config, Masking Configuration, and Memory Configurationdata sources.

l Hostname - Name or IP Address of the Symmetrix host

l Sub Name - Storage array identifier

l Sub Name 2-

l Type -

l Object -

Reports by System Template

Symmetrix Change Details 105

Page 106: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Tape Drive Configuration Change DetailsReturns the details of the tape drive configuration changes in a table report. Returns thedetails of the Symmetrix changes in a table report. Uses data from the Tape DriveConfiguration data source.

l Hostname -

l Library Name - Name of the library in which the tape drive is located. Physical tapedrives do not return information on the tape library in which they are a member.

l Device Name - Logical name of the device

l Make - Tape drive make

l Model - Model of the tape drive

l Firmware - Firmware version of the tape drive

l Serial - Serial number of the tape drive

l Virtual -

l Controller Firmware - Version of firmware running on the Controller

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Tape Library Configuration Change DetailsReturns the details of the tape library configuration changes in a table report. Uses datafrom the Tape Library Configuration data source.

l Hostname - IP address of the server

l Library Name - Name of the library in which the tape drive is located. Physical tapedrives do not return information on the tape library in which they are a member.

l Vendor - Name of the product vendor

l Model - Model of the tape drive

l Firmware - Firmware version of the tape drive

l Serial - Serial number of the tape drive

l Num Slots - Number of slots in the tape library

l Num Drives - Number of drives in the tape library

l Virtual -

l Dedup Enabled - Indication of whether deduplication is enabled on the export

l Replication Enabled - Indication of whether replication is enabled on the export

l Backup Window - Identifier for the backup window in which the export takes place

l Backup Window Start Time - Start time for the backup window

l Backup Window End Time - End time for the backup window

l Change - Type of change: Added, Deleted, Modified

Reports by System Template

106 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 107: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Virtual Host Change DetailsReturns the details of virtual host changes in a table report. Uses data from the VirtualHost Network Interface Configuration, Network Interface Config, Processor Configuration,Virtual Hosts, Virtual Host Configuration, Virtual Host Disk Configuration, FilesystemConfiguration, and Memory Configuration data sources.

l Virtualization Server - Hostname of the virtualization server

l Object -

l Type -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Virtual Host Configuration Change SummarySummary of the virtual host configuration changes in a column chart. Uses data from theVirtual Host Network Interface Configuration, Network Interface Config, ProcessorConfiguration, Virtual Hosts, Virtual Host Configuration, Virtual Host Disk Configuration,Filesystem Configuration, and Memory Configuration data sources.

l Change - Type of change: Added, Deleted, Modified

l Change Count -

l Type -

Virtual Host Disk Configuration Change DetailsReturns details of the virtual host disk configuration changes in a table report. Uses datafrom the Virtual Host Disk Configuration data source.

l Virtualization Server - Name of the virtualization server

l Virtual Host -

l Name -

l Size - Capacity for the disk (in GB)

l Virtual Disk - Virtual disk to which the disk maps

l Datastore - Name of datastore on which the virtual disk is located

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Virtual Host Change DetailsReturns details of the virtual host changes in a table report. Uses data from the VirtualHost Network Interface Configuration, Network Interface Config, Processor Configuration,Virtual Hosts, Virtual Host Configuration, Virtual Host Disk Configuration, FilesystemConfiguration, and Memory Configuration data sources.

l Virtualization Server - Name of the virtualization server

Reports by System Template

Virtual Host Change Details 107

Page 108: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Virtual Host -

l Hostname -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Virtual Host Last 10 Changes DetailsReturns details of the last 10 virtual host changes in a table report. Uses data from theVirtual Host Network Interface Configuration, Network Interface Config, ProcessorConfiguration, Virtual Hosts, Virtual Host Configuration, Virtual Host Disk Configuration,Filesystem Configuration, and Memory Configuration data sources.

l Virtualization Server - Name of the virtualization server

l Object -

l Type -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Virtual Host Network Interface Configuration Change DetailsReturns the details of changes to the configuration of network interfaces on virtualmachines in a table report. Uses data from the Virtual Host Network InterfaceConfiguration data source.

l Virtualization Server - Name of the virtual machine

l Virtual Host - Name of the Virtual Centre server

l Name - Identifier for the virtual interface

l Virtual Network - Network on which the virtual interface is located

l MAC Address - MAC Address of network interface

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

VNX/CLARiiON Change DetailsReturns details on VNX and CLARiiON changes in a table report. Uses data from theReplication Rule Configuration, RAID Group Configuration, Network Interface Config,Storage Pool Config, Save Pool Configuration, LUN Configuration, Host Configuration,Disk Configuration, Fibre Channel Port Config, iSCSI Configuration, Network Interface IPConfig, Save Pool Devices, Disk Array Config, Masking Configuration, and MemoryConfiguration data sources.

l Hostname - Hostname or IP address of the disk array

l Sub Name - Name of the storage array

l Sub Name 2 - Identifier for the storage array on which the LUN resides

l Object -

l Type -

Reports by System Template

108 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 109: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if 'Modified' was indicated

VNX/CLARiiON Change SummarySummary of VNX and CLARiiON changes in a column chart. Uses data from theReplication Rule Configuration, RAID Group Configuration, Network Interface Config,Storage Pool Config, Save Pool Configuration, LUN Configuration, Host Configuration,Disk Configuration, Fibre Channel Port Config, iSCSI Configuration, Network Interface IPConfig, Save Pool Devices, Disk Array Config, Masking Configuration, and MemoryConfiguration data sources.

l Change - Type of change: Added, Deleted, Modified

l Count -

l Type -

VNX/CLARiiON Last 10 Change DetailsReturns details on the last ten VNX and CLARiiON changes in a table report. Uses datafrom the Replication Rule Configuration, RAID Group Configuration, Network InterfaceConfig, Storage Pool Config, Save Pool Configuration, LUN Configuration, HostConfiguration, Disk Configuration, Fibre Channel Port Config, iSCSI Configuration,Network Interface IP Config, Save Pool Devices, Disk Array Config, Masking Configuration,and Memory Configuration data sources.

l Hostname - Hostname or IP address of the disk array

l Sub Name - Name of the storage array

l Sub Name 2 - Identifier for the storage array on which the LUN resides

l Object -

l Type -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Chargeback system templatesDPA provides chargeback reports that provide a financial cost analysis for the storageoperations that have taken place in a customers environment. The chargeback reportsuse models based on the following inputs:

l Size of data protected - Amount of data protected

l Size of data transferred - Amount of data replicated from primary storage

A cost based on these storage and transfer metrics is calculated for hosts and can becharged back to the business unit that is responsible for that client or set of clients. Thecost values per data protection and transfer are configured in a chargeback policy, whichis then assigned to the host or subobject.

Chargeback costs can then be totalled against a cost center in reports. If an object is notassigned a cost center, a default cost center is used in reports. The EMC Data ProtectionAdvisor Installation and Administration Guide describes how to configure ChargebackPolicies for storage.

Reports by System Template

VNX/CLARiiON Change Summary 109

Page 110: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Chargeback DetailsReturns chargeback details in a table report. Uses data from the Backup ClientOccupancy, Backup Statistics, Num Media Written To, and Restore Statistics datasources.

l Server - Name of the server on which the backups or restores occurred

l Client - Name of the client on which the backups or restores occurred

l Num. Backups - Total number of backups performed

l Cost Per Num Backups - Cost per Backup (derived from the chargeback policy)

l Cost for Num Backups - Total cost for all number of backups

l Cost Per GB Backed Up - Cost per gigabyte backed up (derived from the chargebackpolicy)

l Cost for Data Backed Up - Total cost for all gigabytes backed up

l Backup Size - Gigabytes of data backed

l Backup Cost - Total backup cost (number of backups and gigabytes backed up)

l Num. Restores - Total number of restores performed

l Cost Per Num Restores - Cost per restore (derived from the chargeback policy)

l Restore Size - Total size of all restores

l Cost Per GB Restored - Cost per gigabyte restored (derived from the chargebackpolicy)

l Cost for Data Restored - Total cost for all gigabytes restored

l Cost for Num Restores - Total cost for all number of restores

l Restore Cost - Total restore cost (number of restores and gigabytes restored)

l Data Retained - Total of all data stored

l Cost Per GB Retained - Cost per gigabyte stored (derived from the chargeback policy)

l Retention Cost - Total cost of storing data

l Cost Per Tape Used - Cost per tape used for backup (derived from the chargebackpolicy)

l Num. Tapes - Total number of tapes used

l Tape Cost - Total cost of tape usage

l Total Cost - Total of all chargeback costs for that cost center

l Policy Used - Chargeback policy used to calculate chargeback costs for this object

l Cost Centre - Cost center as defined in a client’s Object Properties dialog box

Chargeback Details By Cost CentreReturns chargeback details by cost centre in a table report. Uses data from the BackupClient Occupancy, Backup Statistics, Num Media Written To, and Restore Statistics datasources.

l Num. Backups - Number of backups performed for that cost center

l Backup Size - Gigabytes of data backed up for cost center

l Num. Restores - Number of restores performed for cost center

l Restore Size - Gigabytes of data restored for cost center

Reports by System Template

110 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 111: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Data Retained - Gigabytes of data stored for cost center

l Num. Tapes - Total number of tapes used for cost center

l Total Cost - Total of all chargeback costs for that cost center

l Cost Centre - Cost center as defined in a client’s Object Properties dialog box

Chargeback Details for Cost CentreReturns chargeback details for cost centre in a table report. Uses data from the BackupClient Occupancy, Backup Statistics, Num Media Written To, and Restore Statistics datasources.

l Cost for Num Restores - Cost for the number of restores performed for the cost center

l Cost Per GB Retained - Cost per gigabyte retained for the cost center

l Cost Per GB Restored - Cost per gigabyte restored for the cost center

l Total Cost - Total of all chargeback costs for that cost center

l Num. Tapes - Number of tapes that are required

l Backup Cost - Total backup cost (number of backups and gigabytes backed up)

l Cost Per Num Restores - Total cost for all number of restores

l Retention Cost - Total cost of storing data

l Data Retained - Gigabytes of data stored for cost center

l Tape Cost - Total of all chargeback costs for that cost center

l Cost Per Tape Used - Cost per tape used for backup (derived from the chargebackpolicy)

l Restore Cost - Total restore cost (number of restores and gigabytes restored)

l Cost Per Num Backups - Cost per Backup (derived from the chargeback policy)

l Cost for Num Backups - Total cost for all number of backups

l Restore Size - Gigabytes of data restored for cost center

l Cost for Data Backed Up - Total cost for all gigabytes backed up

l Num. Restores - Number of restores performed for cost center

l Backup Size - Gigabytes of data backed up for cost center

l Cost for Data Restored - Total cost for all gigabytes restored

l Num. Backups - Number of backups performed for that cost center

Chargeback HistoryReturns chargeback history details in a column chart. Uses data from the Backup ClientOccupancy, Backup Statistics, Num Media Written To, and Restore Statistics datasources.

l Total Cost - Total of all chargeback costs for that cost center

l Month -

Reports by System Template

Chargeback Details for Cost Centre 111

Page 112: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Chargeback SummaryReturns chargeback summary in a table report. Uses data from the Backup ClientOccupancy, Backup Statistics, Num Media Written To, and Restore Statistics datasources.

This report may be run from a RecoverPoint host in the configuration tree to display theaggregate chargeback costs for all consistency groups configured on that host, or fromone or more individual consistency groups.

l Num. Backups - Number of backups performed for that cost center

l Backup Size - Gigabytes of data backed up for cost center

l Num. Restores - Number of restores performed for cost center

l Restore Size - Gigabytes of data restored for cost center

l Data Retained - Gigabytes of data stored for cost center

l Num. Tapes - Number of tapes that are required

l Total Cost - Total of all chargeback costs for that cost center

Chargeback Summary By Cost CentreReturns chargeback summary by cost centre in a table report. Uses data from the BackupClient Occupancy, Backup Statistics, Num Media Written To, and Restore Statistics datasources.

l Cost -

l Cost Centre - Cost center as defined in a client’s Object Properties dialog box

Chargeback Total Cost BreakdownReturns the chargeback total cost breakdown in a pie chart. Uses data from the BackupClient Occupancy, Backup Statistics, Num Media Written To, and Restore Statistics datasources.

l Retention Cost - Total cost of storing data

l Tape Cost - Total of all chargeback costs for that cost center

l Backup Cost - Total backup cost (number of backups and gigabytes backed up)

l Restore Cost - Total restore cost (number of restores and gigabytes restored)

RecoverPoint Chargeback DetailsReturns the data protected and data transferred costs by server and consistency group ina table report. Uses data from the Consistency Group Data Protected, Consistency GroupData Transferred, and Consistency Group Copy Configuration data sources.

l Server - Name of the server on which the backups or restores occurred

l Consistency Group - Name of the Consistency Group

l Data Protected - Total amount of data protected (in MB)

l Data Transferred - Total amount of data transferred (in MB)

l Cost Per GB Protected - Cost per gigabyte protected (derived from the chargebackpolicy)

l Cost for Data Protected - Total cost for all gigabytes protected

Reports by System Template

112 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 113: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Cost Per GB Transferred - Cost per gigabyte transferred (derived from the chargebackpolicy)

l Cost for Data Transferred - Total cost for all gigabytes transferred

l Total Cost - Total of all chargeback costs for that cost center

l Policy Used - Chargeback policy used

l Cost Centre - Cost center as defined in a client’s Object Properties dialog box

RecoverPoint Chargeback SummarySummary of the data protected and data transferred costs by server and consistencygroup in a table report. Uses data from the Consistency Group Data Protected,Consistency Group Data Transferred, and Consistency Group Copy Configuration datasources.

l Data Protected - Total amount of data protected (in MB)

l Data Transferred - Total amount of data transferred (in MB)

l Cost for Data Protected - Total cost for all gigabytes protected

l Cost for Data Transferred - Total cost for all gigabytes transferred

l Total Cost - Total of all chargeback costs for that cost center

Chargeback Total Cost of Data RetainedReturns information on the total cost of data retained associated with the capacity perclient in a table. Uses data from the Backup Server Mapping and Backup ClientOccupancy by Client data sources.

l Server - Name of the server

l Client - Name of the client

l Total Data Retained - Total data retained on the client

l Group - Name of the groups associated with the clients

l Sub Name - Name of TSM Server instance

l Total Cost - Total of chargeback cost for data retained

Compliance system templatesCompliance and risk mitigation reports display backup and restore statistics to allowadministrators to measure data protection risk and policy compliance. For example, DPAprovides backup and restore KPI, strike rate, and daily success rate reports.

DPA also provides several reports to measure compliance for specific data protectionregulations. For more specific details on the various reports, select one of the reportsdescribed in the following sections.

Backup and Restore KPIsReturns the success rates and total gigabytes for backups, restores, and percentages ofdata and number of backups restored in a table report. Uses data from the BackupStatistics, Num Failed Backup Jobs After DeDuplication, and Restore Statistics datasources.

l Total Backups - Number of backups that completed

Reports by System Template

RecoverPoint Chargeback Summary 113

Page 114: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Total Restores - Number of restores that completed

l Backup Success Rate - Success rate of backups

l Restore Success Rate - Success rate of restores

l Backup Data -

l Restore Data -

l % of Backups Restored -

l % of Data Restored -

l Successful Backups - All successful backups on a backup server

l Failed Backups - All failed backups on a backup server

l Successful Restores - All successful restores on a backup server

l Failed Restores - All failed restores on a backup server

Backup Daily Success Rate Against TargetReturns the percentage of daily successful backups measured against the target successrate in a line chart. Uses data from the Backup Statistics and Trend Line data sources.

l Success Rate - Success rate of backups

l Target - Target success rate

Backup Daily Success Rate And DataReturns the percentage of daily successful backups in a table report. Uses data from theBackup Job Details for Clients with Failures, Num Jobs, and Total Size data sources.

l Successful Backup - All successful backups on a backup server

l Failed Backups - All failed backups on a backup server

l Total Backups -

l Backup Success Rate - Success rate of backups over the reporting period

l Total Size - Total amount of data backed up (in GB)

Backup Success Rate Against TargetReturns the percentage of successful backups measured against the target success ratein a table report. Uses data from the Backup Statistics and Trend Line data sources.

l Success Rate - Success rate of backups

l Target - Target success rate

Backup Unprotected/Unconfigured ClientsReturns information on clients that have not had a backup in the last 3 days, the time ofthe last backup if greater than 3 days but less then a week, and the number of missedbackups for the 3 day period in a table. Uses data from the Backup Client Config, BackupSchedule Config, Backup Group Config, Backup Server Mapping, Last Backup details byClient and Job, Num Jobs, and Report Times data sources.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of backup server instance

l Domain Name - Name of the domain

Reports by System Template

114 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 115: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Schedule Enabled - Whether the Job schedule is enabled or not

l Client - Name of the client backed up

l Client Active - Flag indicating whether the client is active

l Group Active - Flag indicating whether the group is active

l Last Backup - Time of the backup application completion

l Time Since Last Backup - Time elapsed from the backup application completion

l Number of Missing Backups - The number of missed backups within the 3 day period

Backup Unsuccessful ClientsReturns details of backups that were unsuccessful in a table report. Uses data from theBackup Job Details for Clients with Failures data source.

l Client - Name of the client backed up

l Status - Status of the Job backed up: Success, Failed, Missed

l Started - Time the backup started

l Finished - Time the backup finished

Client AdditionsReturns the client additions in a table report. Uses data from the Backup Client Configdata source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Domain Name - Name of the application domain

l Client - Name of the client on the backup server

l Differences -

Client ChangesReturns changes to configuration for all backup clients in a table report. Uses data fromthe Backup Client Config data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Domain Name - Name of the application domain

l Client - Name of the client on the backup server

l Change - Type of change: Added, Deleted, Modified

Client Changes SummarySummary of the changes to configuration for all backup clients in a table report. Usesdata from the Backup Client Config data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Domain Name - Name of the application domain

l Client - Name of the client on the backup server

Reports by System Template

Backup Unsuccessful Clients 115

Page 116: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Differences -

Client DeletionsReturns the client deletions in a table report. Uses data from the Backup Client Configdata source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Domain Name - Name of the application domain

l Client - Name of the client on the backup server

l Differences -

Client ModificationsReturns the client modifications in a table report. Uses data from the Backup ClientConfig data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Domain Name - Name of the application domain

l Client - Name of the client on the backup server

l Differences -

Clients Without Full BackupReturns the clients that have not received a full backup in a table report. Uses data fromthe Node Details and Num Jobs data sources.

l Client - Name of the client on the backup server

Compliance OverviewReturns a compliance overview in a table report. Uses data from the Backup Statistics,Num Failed Backup Jobs After DeDuplication, Num Jobs, Restore Details, and RestoreStatistics data sources.

l Period -

l Backup Data -

l Total Restores - Number of restores that completed

l Restore Success Rate -

l Restore Data -

l Total Backups - Number of backups that completed

l Backup Success Rate - Success rate of backups over the reporting period

Expired VolumesReturns the media that is eligible for recycling in a table report. Uses data from the MediaDetails data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

Reports by System Template

116 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 117: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Volume Id - Identifier for the volume

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

One Strike Failed ClientsReturns the one strike failures in a table report. Uses data from the Backup Job Detailsdata source.

l Client - Name of the client backed up

l Two Days Ago - (Hidden field) Status of the client one day ago. Can take the values'failed' or 'partial'

l Yesterday (Hidden field) Status of the client two days ago. If present can take thevalue 'success'

Note the following regarding strikes and other elements of this report:

l Strikes are based on clients.

l Clients that have at least one failure in the last 24 hours, which is the last day,constitutes one strike.

l If deduplication is enabled in Configure Report Settings in the DPA web console, thejobs on the client are deduplicated to discount earlier failures where a job latersucceeded.

l A partial success where some jobs are successful and some fail for a client, counts asstrike.

l If a client has a combination of missed/failed or missed/successful jobs, it isconsidered a partial client and is included in the strike count. Alternatively, a clientwith all missed jobs is included in the count.

l Full or incremental Backup level does not make a difference; reports do not filterbased on job level.

One Strike Failed Jobs For Specific ClientReturns the one strike failures for specific clients in a table report. Uses data from theBackup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

Reports by System Template

One Strike Failed Clients 117

Page 118: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Application status code associated with the job

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Queue Start - Time the Job started queuing

l End Time - Time the Job completed

l Start Time - Time the Job started writing

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Files Scanned - Number of files scanned

l Expiry Date - Date that a Job will expire

l Size Transferred - Total size of the data transferred (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted fromthe Size Transferred field to return the Job size (in bytes)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

Reports by System Template

118 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 119: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Restore Rate Statistics for rulesetReturns the restore rate statistics in a table report. Uses data from the Backup Statistics,Restore Statistics, and User Input data sources.

l Max Backups Restored -

l Max Data Restored -

l % of Backups Restored -

l % of Data Restored -

l Alert - Identifier of the alert

Strike SummaryReturns the number of clients that have not been backed up for one or more daysconsecutively in a table report. Uses data from the Backup Job Details data source.

l One Strike - Count of the number of clients that have at least one failure in the last 24hours, which is the last day

l Two Strikes - Count of the number of clients that have at least one failure in the last24–48 hour and last 24 hour period, which is the last two days

l Three Strikes - Count of the number of clients that have at least one failure in the lastthree days

Note the following regarding strikes and other elements of this report:

l Strikes are based on clients.

l If deduplication is enabled in Configure Report Settings in the DPA web console, thejobs on the client are deduplicated to discount earlier failures where a job latersucceeded.

l A partial success where some jobs are successful and some fail for a client, counts asstrike.

Reports by System Template

Restore Rate Statistics for ruleset 119

Page 120: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l If a client has a combination of missed/failed or missed/successful jobs, it isconsidered a partial client and is included in the strike count. Alternatively, a clientwith all missed jobs is included in the count.

l Full or incremental Backup level does not make a difference; reports do not filterbased on job level.

l If you run a 3-strike report with a time period of last day, the Strike Summaryreportalso works but it only returns a one strike failed client count because you onlyran it for the last day. If you run the Strike Summary report for last two days, it returnsthe count for one and two strike failures if any exist. If you run it for last week/ lastthree days, Strike Summary returns any failures in last three days.

l The Strike Summary report is hard-coded to return failure counts only for consecutivefailed clients for the last 3 days, maximum. It makes no difference to configure thereport to run with a time period longer than 3 days; for example, if you run with timeperiod of last month, it will not report on any 3-strikes within the last month.

Success Rate Against Target for rulesetReturns the success rate against the target in a table report. Report for Success ratebelow threshold rule. Uses data from the Backup Statistics and Trend Line data source.

l Success Rate -

l Target -

l Alert - Identifier of the alert

Three Strike Failed ClientsReturns details on the clients with three strike failures in a table report. Uses data fromthe Backup Job Details data source.

l Client - Name of the client backed up

l Yesterday - (Hidden field) Status of the client one day ago. Can take the values 'failed'or 'partial'

l Two Days Ago - (Hidden field) Status of the client two days ago. Can take the values'failed' or 'partial'

l Three Days Ago - (Hidden field) Status of the client three days ago. Can take thevalues 'failed' or 'partial'

Note the following regarding strikes and other elements of this report:

l Strikes are based on clients.

l Clients that have at least one failure in the last three days from the time the reportwas run constitutes three strikes.

l If deduplication is enabled in Configure Report Settings in the DPA web console, thejobs on the client are deduplicated to discount earlier failures where a job latersucceeded.

l A partial success where some jobs are successful and some fail for a client, counts asstrike.

l If a client has a combination of missed/failed or missed/successful jobs, it isconsidered a partial client and is included in the strike count. Alternatively, a clientwith all missed jobs is included in the count.

l Full or incremental Backup level does not make a difference; reports do not filterbased on job level.

Reports by System Template

120 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 121: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Three Strike Failed Clients for rulesetReturns details of three strike failed clients in a table report. Report for Three StrikeFailures rule. Uses data from the Backup Job Details data source.

l Client - Name of the client backed up

l Alert - Identifier of the alert

Three Strike Failed Jobs For Specific ClientReturns details of three strike failed for specific clients in a table report. Uses data fromthe Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Status - Status of the Job backed up: Success, Failed, Missed

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Err Code - Error code from the backup application, if available

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Num Files - Number of files backed up

Reports by System Template

Three Strike Failed Clients for ruleset 121

Page 122: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Files Scanned - Number of files scanned

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes)

l Size Transferred - Total size of the data transferred (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted fromthe Size Transferred field to return the Job size (in bytes)

l Archive Flag - Indicates whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Reports by System Template

122 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 123: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Top 10 Most Exposed JobsReturns the last ten successful job for backup clients in a table report. Uses data from theLast Backup Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM Server instance

l Group - Name of the group in which the client is located

l Media Server - Name of the media server on which the backup occurred

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client that was backed up

l Job - Name of the file system that was backed up

l Backup Set - Name of the backup set associated with the job

l Queue Start - Time the Job started queuing

l Last Successful Start - Last successful start of the backup

Top 5 Most Exposed JobsReturns the last five successful Job for backup clients in a table report. Uses data fromthe Last Backup Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM Server instance

l Group - Name of the group in which the client is located

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client that was backed up

l Job - Name of the file system that was backed up

l Last Successful Start - Last successful start of the backup

l Time Since Last Backup - Amount of time since the last backup

Two Strike Failed ClientsReturns the clients with two strike failures in a table report. Uses data from the BackupJob Details data source.

l Client - Name of the client backed up

l Yesterday - (Hidden field) Status of the client one day ago. Can take the values 'failed'or 'partial'

l Two Days Ago - (Hidden field) Status of the client two days ago. If present can takethe values ' failed ' or ' partial '

l Three Days Ago - (Hidden field) Status of the client three days ago. If present can takethe value 'success'

Note the following regarding strikes and other elements of this report:

l Strikes are based on clients.

l Clients that have at least one failure in the last 24–48 hour and last 24 hour periodfrom the time the report was run constitutes two strikes.

Reports by System Template

Top 10 Most Exposed Jobs 123

Page 124: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l If deduplication is enabled in Configure Report Settings in the DPA web console, thejobs on the client are deduplicated to discount earlier failures where a job latersucceeded.

l A partial success where some jobs are successful and some fail for a client, counts asstrike.

l If a client has a combination of missed/failed or missed/successful jobs, it isconsidered a partial client and is included in the strike count. Alternatively, a clientwith all missed jobs is included in the count.

l Full or incremental Backup level does not make a difference; reports do not filterbased on job level.

Two Strike Failed Jobs For Specific ClientReturns the specific clients with two strike failures in a table report. Uses data from theBackup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Num Files - Number of files backed up

Reports by System Template

124 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 125: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Files Scanned - Number of files scanned

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes)

l Archive Flag - Indicates whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Attempts - Number of attempts that took place before the Job completed

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Reports by System Template

Two Strike Failed Jobs For Specific Client 125

Page 126: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Unprotected ClientsReturns the time since the last successful backup of the client compared to the client'srecovery point objective in a table report. Uses data from the Last Backup Details andNode Details data sources.

l Client - Name of the client that was backed up

l Recovery Point Objective -

l Time Since Last Backup - Amount of time since the last backup

Volumes To Be DestroyedReturns the media that should be destroyed due to high numbers of mount or relabeloperations, or due to age of the media, in a table report. Uses data from the Report Timesand Media Details data sources.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Remaining Lifetime -

Configuration system templatesConfiguration reports display information on the configuration of the backup application.

Array Fan-out RatioReturns details on the array fan-out ratio in a table report. Uses data from the FibreChannel Port Config, iSCSI Configuration, and LUN Mapping data sources.

l Node - Name of the array on which the LUN exists

l Sub Name - Identifier for the Storage Array

l Source - LUN that is mapped

l Fan-out Ratio -

l Port - Name of the Fibre Channel port

l Controller - Number of the controller

Avamar Retention Policy ConfigurationReturns information on the configuration of Avamar retention policies in a table report.Uses data from the Avamar Retention Policy Configuration data source.

l Server - Name of the Avamar server

l Sub Name - Not applicable to Avamar

l Name - Name of the retention policy

l Domain Name - Name of the Avamar domain associated with the retention policy

l Enabled - Indicates if the policy is active

Reports by System Template

126 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 127: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Read Only - Indicates if the policy is read only or writeable

l Expiration Date - Date the policy expires

l Duration - Duration that data should be backed up

l Duration Type - Unit of duration. For example, days, weeks, or months

l Override - Indicates if the policy overrides basic retention

l Num Days Daily Kept - Number of days of daily backups to retain

l Num Weeks Weekly Kept - Number of weeks of weekly backups to retain

l Num Months Monthly Kept - Number of months of monthly backups to retain

l Num Years Yearly Kept - Number of years of yearly backups to retain

Backup Client ConfigurationReturns details on the configuration of all physical hosts configured on a server in a tablereport. Uses data from the Backup Client Config and Backup Server Mapping datasources.

l Server - Name of the backup server on which the client is configured

l Client - Name of the client

l Active - Indicates if the client is active

l Software Version - Version of the backup software running on the client

l Remote IP - Remote IP address of the client

l OS Type - Type of client operating system

l OS Version - Version of the client operating system

l Sub Name - Name of the TSM server instance

l Domain Name - Name of the application domain

l Browse Policy - Browse policy of the NetWorker client

l Retention Policy - Retention policy of the NetWorker client

l Directive - Directive files of the NetWorker server

l Backup Command - Commands available on the NetWorker client

l Executable Path - Path to the NSR executables on this client

l Scheduled Backup - Indicates if the client is enabled for scheduled backup

l Comment - User remarks for the client

l Save Operations - Save operation instructions in the form KEYWORD:TOKEN=STATE.Instructions are required if the Job attribute for this client contains non-ASCII names

l File Inactivity Threshold - Number of days a file has not been accessed before it iscounted as inactive. Zero indicates that no inactivity statistics were collected

l File Inactivity Alert Threshold - Percentage of space that can be occupied by inactivefiles before a notification is generated. Zero indicates that no alert will be sent

l Remote User - Username used for remote commands on the client or to accessapplication-specific data

l Application Information - Any application information for the client

l NDMP - Indicates if the client is an NDMP client

l NDMP Array Name - Logical name assigned to the array in NDMP NAS arrayconfigurations

Reports by System Template

Backup Client Configuration 127

Page 128: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Dedup Backup - Indicates if the client is a deduplication client

l Dedup Node - Name of the deduplication object

l SCSI - Indicates if the client is a SCSI backup client

l VCB - Indicates if the client is a VCB backup client

l Proxy Backup Host - Proxy client where the saves were run

l Proxy Backup Type - Proxy method used for backups

l Virtual Client - Indicates if the machine is a virtual client

l Virtual Client Physical Hostname - Specifies the physical hostname, if this resource isfor a virtual client. The hostname does not need to be fully qualified, and must beless than 64 bytes

l Boost Enabled - Indicates if boost is enabled

l Server Network Interface - Name of the network interface on the server to which theclient is backed up

l Priority - Priority of the client

l Parallelism - Number of jobs that can run in parallel on this client

l Contact - Text string of information identifying the client object’s administrator

l Client Identifier - Unique identifier for the client instance

l Archive Services - Indicates if archive services are available for the client

l Remote Access - List of remote users permitted to recover files from the client

l Index Path - Path to the client's index directory on the server. The path is either anabsolute path or NULL. If NULL, the index resides in the index/clientnamesubdirectory of the EMC home directory

l Owner Notification - Notification action used to send status message contents to theclient owner

l Hard Links - Indicates if hard link processing is enabled on the Windows client

l Short Filenames - Indicates if short file name processing is enabled on the Windowsclient

l BMR - Indicates if Bare Metal Recovery protection is enabled

l BMR Options - List of Bare Metal Recovery options

l Backup Type - Backup client type

l CPUs - Number of processors in the client machine

l Enabler In Use - Indicates if the client is using up a license count

l Licensed Applications - List of licensed applications used by the client

l Licensed PSPs - List of licensed EMC PowerSnap® platforms used by the client

l Resource ID - Identifier for the client

l Registration Time - Time of registration

l Last Access Time - Time last accessed

l Password Set Time - Time that the password was set

l Invalid Password Count - Number of invalid password entries

l Compression - Indicates if compression is enabled

l Archive Delete - Indicates if archive deletion is permitted

l Backup Delete - Indicates if backup deletion is permitted

Reports by System Template

128 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 129: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Locked - Indicates if the client object is locked

l Registration Administrator - Name of the administrator who registered the client

l Option Set - Option set for the client specified on the TSM server

l Aggregation - Indicates if client file aggregation is enabled when backing up

l URL - URL for the web client

l Node Type - Type of client object: Client, Server, NAS

l Password Expiration Period - Number of days after which a password expires

l Keep Mount Point - Indicates if the client can keep mount points during a session

l Max Mount Points Allowed - Maximum number of mount points permitted for a clientin a session

l Auto Filespace Rename - Indicates if TSM prompts the client to rename file spaceswhen the client system upgrades to a client that supports Unicode

l Validate Protocol - Indicates if the client has data validation enabled

l GUID - Globally unique identifier of the client object

l Transaction Group Max - Maximum number of files or directories that can becontained in a transaction group

l Data Read Path - Transfer path when sending data: LAN path only, LAN-free path only,Any path

l Data Write Path - Transfer path when receiving data: LAN path only, LAN-free pathonly, Any path

l Session Initiation - Initiator of session: server or client, or server only

l Client HLA - High-level address of the NAS file server (IP address or domain name)

l Client LLA - Low-level address of the NAS file server (port number)

l Collocation Group Name - Name of the collocation group, if collocation is enabled, forthe client

l Proxy Target - Specifies which objects are proxy objects (agents) for other objects

l Compression Location - Location of data compression

l Proxy Node - Proxy object for deduplication if applicable

l Deduplication Location - Location of data deduplication: ClientOrServer, ServerOnly

l Client Direct - Client writes directly to the Data Domain/AFTD using DDBoost areenabled and no writes are made to the storage node

l Block Based Backup - Indicates whether block-based backup is enabled

l NAS File Access User - NAS file access user name

l Storage Replication Policy - Storage replication policy name

l NAS Management User - NAS management user name

l NAS Device Manager - NAS device management user name

l Hardware Type - The hardware type of the client

Backup Client CountReturns the number of clients in the environment in a column chart. Uses data from theNum Clients data source.

l Count - Number of backup clients

Reports by System Template

Backup Client Count 129

Page 130: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Client Count By OS TypeReturns the number of clients by OS in the environment in a column chart. Uses data fromthe Backup Client Config data source.

l OS Type - Type of client operating system

l Count - Number of backup clients

Backup Client Count By ServerReturns the number of clients configured on each backup server in a column chart. Usesdata from the Backup Client Config data source.

l Server - Name of the backup server

l Client Count - Number of backup clients

Backup Device ConfigReturns the configuration of the backup device in a table report. Uses data from theBackup Device Config data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device in the backup software

l Device Alias - Alias for the drive, if available

l Device Path - Operating system path to the device

l Device Class - Class of device: Disk, Tape

l Jukebox - Name of the jukebox in which the device is located

l Device Type - Type of device. For example, DLT, Ultrium-2

l Read Only - Indicates if the drive is configured as read-only: Yes, No

l Hardware Id - Identifier such as the device serial number that uniquely maps it to aphysical device

l Resource ID - Identifier for the client

l Media Manager Path - Operating system path to the media manager

l Firmware - Firmware version of the device

l Make - Make of the array

l Model - Model number of the array

l Serial - Serial number of the device

l Interface Type - Interface type of the tape drive, ISCSI or Fibre Channel

l Interface Address - Address to the interface

l Num Target Sessions - Number of target sessions

l Max Sessions - Maximum number of client and server sessions

l Send/Receive Timeout - Send and receive timeout

l Num Retries - Number of retries

l Network Retry Interval - Network failure retry interval (in seconds)

Reports by System Template

130 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 131: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

l Max Errors - Maximum number of errors

l Device Access - Device access information

Backup Device Config in JukeboxReturns the configuration of the backup device in jukebox in a table report. Uses datafrom the Backup Device Config data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device in the backup software

l Device Alias - Alias for the drive, if available

l Device Path - Operating system path to the device

l Device Class - Class of device: Disk, Tape

l Jukebox - Name of the jukebox in which the device is located

l Device Type - Type of device. For example, DLT, Ultrium-2

l Read Only - Indicates if the drive is configured as read-only: Yes, No

l Hardware Id - Identifier such as the device serial number that uniquely maps it to aphysical device

l Resource ID - Identifier for the client

l Media Manager Path - Operating system path to the media manager

l Firmware - Firmware version of the device

l Make - Make of the array

l Model - Model number of the array

l Serial - Serial number of the device

l Interface Type - Interface type of the tape drive, ISCSI or Fibre Channel

l Interface Address - Address to the interface

l Num Target Sessions - Number of target sessions

l Max Sessions - Maximum number of client and server sessions

l Send/Receive Timeout - Send and Receive timeout

l Num Retries - Number of retries

l Network Retry Interval - Network failure retry interval (in seconds)

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

l Max Errors - Maximum number of errors

l Device Access -Device access information

Reports by System Template

Backup Device Config in Jukebox 131

Page 132: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Device Count By ServerReturns the backup device count by server in a column chart. Uses data from the BackupDevice Config data source.

l Server - Name of the backup server

l Client Count - Number of backup devices

Backup Device Count By TypeReturns the backup device count by type in a column chart. Uses data from the BackupDevice Config data source.

l Device Type - Type of device. For example, DLT, Ultrium-2

l Count - Number of backup devices

Backup Device Writable CountReturns the backup device writable count in a column chart. Uses data from the BackupDevice Config data source.

l Writable - Indicates if the device is writable

l Read Only - Indicates if the drive is configured as read-only: Yes, No

Backup Group ConfigurationReturns the backup group configuration details in a table report. Uses data from theBackup Group Config data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Domain Name - Identifier for Application domain

l Policy ID - The name of the policy set that was last activated on the domain

l Group - Name of the group on the backup server

l Active - Indicates if the group is active

l Effective Date - Date and time that the policy went active

l Policy Type - Type of backup policy. For example, full or incremental

l Policy Action - Policy action

l Policy Description - Policy description

l Preceding Action - Preceding action

l Proxy List - VBA list

l Offhost Backup Method - Method used for performing offhost backups

l Storage Unit - Storage unit the policy is configured to use

l Volume Pool - Volume pool the policy is configured to use

l Limit Jobs Per Policy - Indicates if the policy is limited to run a number of Jobs

l Max Jobs Per Policy - Maximum number of jobs that can be run on the policy, if LimitJobs Per Policy is enabled

l Job Priority - Priority that is assigned to Jobs in this policy

Reports by System Template

132 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 133: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Frozen Image Clients - Indicates if Frozen Image backups are configured in this policy

l Cross Mount Points - Indicates if the backups cross mount points

l True Image Restore Information - Indicates if True Image Restore (TIR) information isgathered by this policy

l True Image Move Detection - Indicates if True Image Restore information is gatheredwith move detection

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

l File Restore Raw - Indicates if the File Restore Raw flag is set on a policy

l Disaster Recovery Info - Indicates if Disaster Recovery Information is gathered

l Block Level Incremental - Indicates if block level incremental backups are enabled

l Multiple Data Streams - Indicates if the policy implements multiple data streams

l Keyword Phrase - Keyword phrase associated with this policy

l Checkpoint Restart - Indicates if checkpoints are configured on this policy

l Checkpoint interval - Checkpoint interval that is used if checkpoint restarts areenabled

l Remote Filesystems - Indicates if Remote File systems are backed up by this policy

l Bare Metal Restore Info - Indicates if Bare Metal Restore Information is gathered

l Snapshot Backup - Indicates if snapshot backups are enabled

l Retain Snapshots - Indicates if snapshots will be retained

l Snapshot Method - Method for performing snapshots

l Offhost Backup - Indicates if offhost backup is enabled

l Use Alternate Client - Indicates if an alternate client is used when performing offhostbackup

l Alternate Client Name - Alternate client that is used for offhost backup if UseAlternate Client is set

l Use Data Mover - Indicates if a data mover is used

l Data Mover Type - Type of data mover to use if the Use Data Mover flag is set

l Resource ID - Identifier for the client

l Auto Restart - Indicates if the group is configured for automatic restarts

l Scheduled Start - Time of day that the group starts

l Parallelism - Indicates if groups can be run simultaneously

l Client Retries - Number of times a client attempts to retry

l Level - Level of backup for the group

l Schedule - Schedule used by the group

l Num Days Inactive Backup Retained - Number of days to retain inactive backup data

l Num Days Inactive Archive Retained - Number of days to retain inactive archive data

l Interval - Group run interval

l Restart Window - Group restart window

l Forced Incremental - Indicates if forced incremental backup is enabled

l Clones - Indicates if backup is cloned automatically

Reports by System Template

Backup Group Configuration 133

Page 134: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Clone Pool - Pool for backup clones

l Success Threshold - Backup status considered as successful

l Inactivity Threshold - File inactivity threshold

l Inactivity Alert Threshold - File inactivity alert threshold

l Snapshot Policy - Snapshot policy name

l Snapshot Pool - Snapshot pool name

l Specification Type - Type of backup specification

l Management Class - The assigned default management class for the policy set

l Registered Nodes - The number of client nodes registered to the policy domain

l Description - Description of the policy domain

l Last Update By - Administrator who made most recent changes

l Last Updated - Date of last change

l Managing Profile - Managing profile name

l Changes Pending - Whether changes are being made but not activated

l Data Pool List - The list of active-data pools in the domain

l Policy - Name of the protection policy

l Workflow - Name of the workflow

Backup Group CountReturns a count of all backup servers across all backup groups in a column chart. Usesdata from the Backup Group Config data source.

l Count - Total number of backup servers

Backup Group Count By ServerReturns a count of all backup servers across all backup servers in a column chart. Usesdata from the Backup Group Config data source.

l Server - Hostname of backup server

l Group Count - Number of backup groups

Backup Job ConfigurationReturns a list of jobs that are configured on a backup server in a table report. Uses datafrom the Backup Server Mapping data source.

l Server - Name of the backup server on which the client is configured

l Sub Name - Name of the TSM server instance

l Client - Name of the client

l Group - Name of the group on the backup server

l Job - Name of a backup Job

l Backup Set - Name of the backup set associated with the job

l Schedule - Name of the backup schedule

l Resource ID - Identifier for NetWorker resource

Reports by System Template

134 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 135: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Jukebox ConfigReturns information on the configuration of any tape libraries managed by the backupapplication in a table report. Uses data from the Backup Jukebox Config data source.

l Server - Hostname of the backup server that controls the jukebox

l Sub Name - Name of TSM server instance

l Jukebox Host - Name of the host to which the jukebox is attached

l Jukebox - Name of the jukebox

l Num Devices - Number of devices in the jukebox

l Num Slots - Number of slots in the tape library

l Jukebox Number - Unique identifier for the jukebox

l Jukebox Control Host - Host that controls the jukebox if the jukebox is in a sharedenvironment

l Type - Type of jukebox

l Vendor - Name of the vendor

l Model - Model of the device

l Serial - Serial number of the device

l WWNN - World Wide Node Name

Backup Jukebox ContentsReturns details of the backup jukebox contents in a table report. Uses data from theMedia Details data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Flag that indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

Reports by System Template

Backup Jukebox Config 135

Page 136: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Cleanings Left - For cleaning tapes, number of cleanings that are left (SymantecNetBackup only)

Backup Pool ConfigurationReturns details about which jobs are backed up on each client within each group andwith what schedule in a table report. Uses data from the Backup Pool Configuration datasource. This report returns data for NetWorker, NetBackup, and TSM

l Server - Hostname of backup server on which the pool is located

l Sub Name - Name of TSM server instance

l Pool Name - Name of the storage pool

l Pool Type - Type of storage pool: Primary, Copy, Any, Backup, Archive

l Description - Description of the backup pool

l Device Class - Device class associated with the storage pool: Disk, Tape

l Est. Capacity - Amount of estimated space of the backup pool (in MB)

l Estimated Capacity - Amount of estimated space of the backup pool (in GB)

l High Mig. Pct - Value at which the TSM server automatically starts migration for thisstorage pool. This value is determined when the number of volumes containing datareaches this percentage of the total number of volumes in the storage pool. The totalnumber of volumes includes the maximum number of scratch volumes

l Low Mig. Pct - Value at which the TSM server stops migration for this storage pool.This value is determined when the number of volumes containing data reaches thispercentage of the total number of volumes in the storage pool

l Next Storage Pool - Primary storage pool to which files are migrated

l Reclaim Storage Pool - Primary storage pool as a target for reclaimed data from thisstorage pool

l Max Size Threshold - Maximum size for a physical file that the server can store in thestorage pool (in MB)

l Overflow Location - Overflow location for the storage pool

l Cache Migrated Files - Indicates that the migration process leaves a cached copy of afile in this storage pool after migrating the file to the next storage pool

l Co-Locate - Indicates whether the server attempts to keep data belonging to a singleclient object, group of client objects, or client file space stored on as few volumes aspossible

l Reclamation Threshold - Value at which the TSM server reclaims a volume, based onthe percentage of reclaimable space on a volume (as a percentage)

l Offsite Reclamation Limit - Number of offsite volumes to have their space reclaimedduring reclamation for this storage pool (in MB)

l Max Scratch Volumes - Maximum number of scratch volumes that the server canrequest for this storage pool. Valid values are between 0 and 100000000

l Delay Period for Re-use - Number of days that must elapse after all files are deletedfrom a volume before the volume can be rewritten or returned to the scratch pool

l Updated By - User ID of the user who updated the pool

l Updated - Date and time change is made to the backup pool

l Storage Pool Data Format - Data format to use to back up files to this storage pooland restore files from this storage pool

Reports by System Template

136 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 137: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Copy Storage Pools - Names of copy storage pools where the server simultaneouslywrites data

l CRC Data - Indicates whether a cyclic redundancy check (CRC) validates storage pooldata when audit volume processing occurs on the server

l Access - Specifies how client objects and server processes (such as migration andreclamation) can access files in the storage pool:

n READWrite — Specifies that client objects and server processes can read and writeto files stored on volumes in the storage pool

n READOnly — Specifies that client objects can only read files from the volumes inthe storage pool

n UNAVailable — Specifies that client objects cannot access files stored on volumesin the storage pool

l Enabled - If selected, indicates whether the pool is enabled and considered forselection

l Archive - If selected, indicates that if the pool is set for archiving

l Label Template - Template that is to be used when labeling volumes in this pool

l Retention Policy - Retention policy associated with the backup pool. Retentionpolicies determine how long a volume is protected from being overwritten

l Groups - Groups that are required to enter into the backup pool

l Clients - Clients that are required to enter into the backup pool

l Levels - Levels that are required to enter into the backup pool

l Devices - Devices on which volumes are allowed to be mounted

l Store Index Entries - Indicates if file index entries are generated for the backup pool

l Auto Media Verify - Indicates if automated verification is performed while data isbeing written to a volume from the backup pool

l Recycle To Pools - Indicates if recyclable volumes can be used by other pools

l Recycle From Pools - Indicates if backup pool can recycle volumes from other pools

l Vol Type Pref - Selection factor when a request is made for a write-able volume.Preferred type is considered first within a priority level

l Max Parallelism - Number of parallel sessions per device allowed when saving to thisbackup pool

l Mount Class - Class of mount requests for media belonging to the pool or for mediabeing added to this pool

l Worm Pool - Indicates if this pool uses WORM tapes and only WORM tapes

l Create DLT Worm - Indicates whether any tapes labelled in this WORM pool areinitialized as DLTWORM tapes, assuming that they are in DLTWORM capable drives

l Barcode Prefix - Barcodes with this prefix value are selected for the pool

l Pool Host - Host on which the backup pool resides

l Pool User - Users allowed to access the backup pool

l Pool Group - Group to which the backup pool belongs

l Physical Volume Group 1 - Name of the first assigned physical volume group

l Physical Volume Group 2 - Name of the second assigned physical volume group

l Physical Volume Group 3 - Name of the third assigned physical volume group

Reports by System Template

Backup Pool Configuration 137

Page 138: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Number Volumes - Total number of logical volumes in the volume group

l Number Pending - Number of unfinished jobs in volume group

l Number Recover - Number of jobs for transfer-out (if in group TR-LVG) or, at startup,the number of single-saved logical volumes in a dual-save group

l Minimum Save - Minimum number of requested saves to retain when memory fallsbelow the defined threshold

l Deduplicated Data - Indicates backup data was deduplicated. Size of deduplicateddata (in MB)

l Num Duplicate Identification Processes - Number of duplicate identificationprocesses that are specified as the default for the storage pool

l Data Deduplicated By Client - Indicates data was deduplicated by backup client

Backup Schedule ConfigurationReturns details on the schedules on a backup server in a table report. Uses data from theBackup Schedule Config data source.

l Server - Hostname of backup server

l SubName - Name of TSM server instance

l Domain Name - Name of the domain associated with the group

l Schedule - Name of the schedule on the backup server

l Group - Name of the group associated with the schedule

l Calendar Backup - Indicates if this schedule is a calendar type backup

l Calendar Retries Allowed - Indicates if retries are allowed after a run day

l Frequency - Frequency of the schedule

l Storage Unit Override - Storage unit that should be used by Jobs using this schedule

l Volume Pool Override - Volume Pool that should be used by Jobs using this schedule

l Retention - Retention used by Jobs using this schedule (in seconds)

l Multiplexing - Value of the media multiplexing field

l Sunday Window Start - Time of day that the window starts on a Sunday

l Sunday Window Duration - Duration of the window on Sunday

l Monday Window Start - Time of day that the window starts on a Monday

l Monday Window Duration - Duration of the window on Monday

l Tuesday Window Start - Time of day that the window starts on a Tuesday

l Tuesday Window Duration - Duration of the window on Tuesday

l Wednesday Window Start - Time of day that the window starts on a Wednesday

l Wednesday Window Duration - Duration of the window on Wednesday

l Thursday Window Start - Time of day that the window starts on a Thursday

l Thursday Window Duration - Duration of the window on Thursday

l Friday Window Start - Time of day that the window starts on a Friday

l Friday Window Duration - Duration of the window on Friday

l Saturday Window Start - Time of day that the window starts on a Saturday

l Saturday Window Duration - Duration of the window on Saturday

Reports by System Template

138 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 139: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Num Copies - Number of copies of data that should be made

l Copy 1 Storage Unit - Storage unit that should be used by the first copy of data

l Copy 1 Pool - Volume pool that should be used by the first copy of the data

l Copy 1 Retention Level - Retention level to be associated with the first copy of thedata

l Copy 1 Failure Action - Failure action to take for the first copy of the data

l Copy 2 Storage Unit - Storage unit that should be used by the second copy of data

l Copy 2 Pool - Volume pool that should be used by the second copy of the data

l Copy 2 Retention Level - Retention level to be associated with the second copy of thedata

l Copy 2 Failure Action - Failure action to take for the second copy of the data

l Copy 3 Storage Unit - Storage unit that should be used by the third copy of data

l Copy 3 Pool - Volume pool that should be used by the third copy of the data

l Copy 3 Retention Level - Retention level to be associated with the third copy of thedata

l Copy3 Failure Action - Failure action to take for the third copy of the data

l Copy 4 Storage Unit - Storage unit that should be used by the fourth copy of data

l Copy 4 Pool - Volume pool that should be used by the fourth copy of the data

l Copy 4 Retention Level - Retention level to be associated with the fourth copy of thedata

l Copy 4 Failure Action - Failure action to take for the fourth copy of the data

l Calendar Week Days - Week days selected if using a calendar schedule

l Calendar Month Days - Month days selected if using a calendar schedule

l Calendar Hours - Hours selected if using a calendar schedule

l Window Start - Start time of backup window

l Window Duration - Duration of the backup window

l Enabled - Indicates if scheduling is enabled

l Schedule Start Time - Start time of schedule

l Schedule End Time - End time of schedule

l Backup Type - Backup client type

l Time Zone - Time zone used for schedule

l Comment - User comment

l Period - Indicates a weekly or monthly schedule

l Action - Daily backup level for the schedule

l Override - Override action for the schedule

l Backup Application - Name of the backup application

Backup Server Client Group MappingReturns a list of clients that are included in a group in a table report. Uses data from theBackup Server Mapping data source.

l Server - Hostname of backup server

Reports by System Template

Backup Server Client Group Mapping 139

Page 140: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Client -

l Group - Group that is required to enter into the backup pool

Backup Server ConfigurationThis report shows configuration details of an individual backup server or group of backupservers.

l Server - Hostname of backup server

l Sub Name -

l Application - Application name

l Version - Application version

l OS Type - Operating system on which the application is running

l Hostname - Server TCP/IP address

l Resource ID - Identifier for the client

l Port - Server port address

l Password Set - Indicates if the server password is set

l Install Date - Installation date of the server software

l Restart Date - Last date and time when the server was started

l Authentication On - Indicates if password authentication is set on or off

l Password Expiration Period - Period after which the administrator or client objectpassword expires (in days)

l Invalid Sign-On Attempt Limit - Number of invalid sign-on attempts before a object islocked

l Min Password Length - Minimum number of characters for the password

l Registration - Indicates if the client object registration is open or closed

l Availability - Indicates if the server is enabled or disabled

l Accounting - Indicates if an accounting record is generated at the end of each clientobject session

l Activity Log Retention - Number of days information is retained in the activity log, orthe size of the log (in days)

l Activity Summary Retention Period - Number of days information is retained in theSQL activity summary table (in days)

l License Audit Period - Period after which the license manager automatically auditsthe backup server license (in days)

l Last License Audit - Date and time when the last license audit occurred

l License Compliance - Indicates if the server is in compliance (Valid) or out ofcompliance (Failed) with the license terms

l Scheduler - Indicates if central scheduling is running (active or inactive)

l Max Sessions - Maximum number of client/server sessions

l Max Scheduled Sessions - Maximum number of client/server sessions available forprocessing scheduled work

l Event Record Retention - Number of days central scheduler event records are retained(in days)

l Client Action Duration - Duration of the period during which the client processes theschedule defined (in days)

Reports by System Template

140 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 141: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Schedule Randomization Percentage - Randomization percentage. Indicates howmuch of the startup window is used for executing scheduled events in client-pollingmode

l Query Schedule Period - Frequency with which clients poll the server to obtainscheduled work, in client-polling mode (in hours). If the value in this field is Client,the polling frequency is determined by the client object

l Max Command Retries - Maximum number of times that a client scheduler retriesafter a failed attempt to execute a scheduled command. If the value in this field isClient, the client object determines the maximum number of retries

l Retry Period - Number of minutes between attempts by the client scheduler to retryafter a failed attempt to contact the server or to execute a scheduled command (inminutes). If the value in this field is Client, the client object determines the number ofminutes between retries

l Scheduling Mode - Central scheduling modes supported by the server

l Log Mode - Mode for saving recovery log records: roll-forward, normal

l Database Backup Trigger - Backup manager automatically runs a backup of thedatabase if the database backup trigger is enabled

l Active Receivers - Active receivers for which event logging has begun

l Configuration Manager -Indicates if the server is a configuration manager

l Refresh Interval - Refresh interval. Interval that elapses before the managed serverrequests a refresh of any changes from a configuration manager

l Cross Define - Indicates if cross definition of servers is allowed

l Subfile Client -

l Context Messaging - Indicates if context messaging is enabled or disabled

l Server Free Status - Indicates if server-free data movement is on, off, or not supported

l Server Free Batch Size - Amount of data that is copied in a single instance of server-free data movement (in MB)

l TOC Load Retention - Approximate number of minutes that unreferenced Table ofContents data will be retained in the database (in minutes)

l Machine GUID - Machine globally unique identifier (GUID) as of the last time that theserver was started. This GUID identifies the host machine on which the current serverresides

l Archive Retention Protection - Indicates if archive data retention protection isactivated or deactivated

l Last Refresh - If the server is a managed server, specifies the date and time of the lastsuccessful refresh of configuration information from the configuration manager

l Num Activity Log Records - Number of records in the activity log

l Activity Log Size - Size of the activity log (in MB)

l Deduplication Verification Level - Client-side deduplication verification level

l Database Report Mode - Database reporting mode

l Database Directories - Database data directories

l Encryption Strength -

l Capacity - Total capacity of the storage pool (in MB)

l Usable Capacity - Amount of the pool that is available for storage (in MB)

l IP Address - IP address of the backup server

Reports by System Template

Backup Server Configuration 141

Page 142: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Hardware ID - Hardware identifier of the backup server

Backup Server Group Job MappingReturns a list of jobs that are included in a group in a table report. Uses data from theBackup Server Mapping data source.

l Server - Name of the backup server on which the client is configured

l Client - Name of the client

l Group - Name of the group on the backup server

l Job - Name of a backup Job

Backup Server Server CountReturns the number of clients in the environment in a column chart. Uses data from theBackup Server Config data source.

l Server Count - Number of clients in the environment

Backup Server Server Count By ApplicationReturns the number of backup servers of each application exist in the environment in apie chart. Uses data from the Backup Server Config data source.

l Application - Type of software. For example, NetWorker, NetBackup

l Number of different values -

Backup Server Server Count By VersionReturns the number of backup servers of each version existing in the environment in a piechart. Uses data from the Backup Server Config data source.

l Version - Type of software. For example, NetWorker, NetBackup

l Number of different values -

Celerra Filesystem to LUN MappingReturns the mapping between file systems and back-end storage on the storage, allowingyou to identify where disks are shared across file systems, in a topology report. Uses datafrom the Filesystem to LUN Visualization data source.

l Name - Name of disk volume presented to EMC Celerra

l Type - Type of LUN

l Group - Name of the group

l ToolTip -

l Source - LUN that is mapped

l Target - Entity to which the LUN is mapped. This value can have multiple entries

Celerra Replication VisualizationReturns the configuration information for replication sources and targets in a topologyreport. Uses data from the Replication Visualization data source.

l Name - Name of the disk volume presented to EMC Celerra

Reports by System Template

142 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 143: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Type - Type of array

l Label - Name of the field returned

l Group - Name of the group

l ToolTip -

l Source - Name of the source

l Target - Name of the target

l Node - Node name

l Network Status - Status of the network link being used by the replication set

l Source Status - Status of the source of the replication set

l Destination Status - Status of the target of the replication set

Celerra Storage Pool ConfigurationReturns the configuration and options set for storage pools configured on EMC CelerraStorage in a table report. Uses data from the Storage Pool Configuration data source.

l Server - Hostname or IP address of the EMC Celerra being monitored

l Storage Pool Name - Name of the storage pool

l Pool ID - Unique identifier for the pool

l Description - Description of the pool

l Disk Type - If a disk volume, the type of disk volume. If a volume type other than disk,the type of the underlying disk volumes

l Capacity - Total capacity of the storage pool (in MB)

l Used Size - Amount of storage used by the pool (in MB)

l Auto Size - Indicates if the storage pool is set to extend automatically. If enabled, thepool automatically extends with the unused disk volumes of the same profile, ifavailable, whenever needed (in MB)

l Dynamic - Indicates whether a storage pool automatically attempts to grow or shrinkmember volumes

l Greedy - Indicates whether a storage pool attempts to create new member volumesbefore using existing space from current member volumes

Celerra Volume ConfigurationReturns details on the volumes configured on EMC Celerra in a table report. Uses datafrom the Volume Configuration data source.

l Server - Hostname or IP address of the EMC Celerra being monitored

l Volume Name - Name of the EMC Celerra volume as displayed in the Celerra Manager

l Volume ID - Identifier for the volume

l Volume Type - Type of volume: disk, slice, stripe, meta, pool

l Volume Size - Size of the volume (in MB)

l Storage Pool - Storage pool associated with the volume

l Storage System - Storage system on which the volume is located

l LUN - Name of the LUN on the storage system that the disk based volume is mappedto (disk-based volumes only

Reports by System Template

Celerra Storage Pool Configuration 143

Page 144: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Disk Type - If a disk volume, the type of disk volume. If a volume type other than disk,the type of the underlying disk volumes

l Stripe Size - Size of the stripe (stripe volumes only) (in MB)

Cluster Application Configuration for ApplicationReturns details on the cluster application configuration in a table report. Uses data fromthe Cluster Resource Mapping data source.

l Server - Name of the backup server

l Sub Name - Name of the disk array

l Name - Logical name of the cluster

Cluster ConfigurationReturns details on the cluster configuration in a table report. Uses data from the ClusterConfiguration data source.

l Server - Name of the backup server

l Sub Name - Name of the disk array

l Name - Logical name of the cluster

l Description - Description of the cluster configuration

l Type - Type of cluster: VCS, MSCS

Data Domain Boost DetailsReturns the Data Domain Boost details in a table report. Uses data from the Data DomainBoost Files for Devices data source.

l Server - Name of the backup server

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device in the backup software

l Device Path - Operating system path to the device

l Data Domain Name - Name of the Data Domain

l File Name - Name of the file that could not be backed up

l Storage Unit - Storage unit the policy is configured to use

Data Domain Boost FilesReturns information on the Data Domain Boost files in a table report. Uses data from theData Domain Boost Files data source.

l Host Name- Name or IP address of Data Domain

l File Name - Name of the file that could not be backed up

l Storage Unit - Storage unit the policy is configured to use

Data Domain Mtree To Tenant Unit MappingReturns information on the Data Domain Mtree to tenant unit mapping in a table report.Uses data from the Mtree To Tenant Unit Mapping data source.

l Hostname - Name or IP address of Data Domain

Reports by System Template

144 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 145: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Name - Data Domain tenant name

l Mtree - Mtree name

Data Domain Network DNSReturns information on the Data Domain network DNS in a table report. Uses data fromthe Network DNS data source.

l Hostname - Name or IP address of Data Domain

l Domain Name Server - Domain Name Server name

Data Domain NTP ConfigurationReturns information on the Data Domain NTP (Network Time Protocol) configuration. NTPservers allow hosts to have their system time synchronised. Uses data from the NTPConfiguration data source.

l Hostname - Name or IP address of Data Domain

l Server - NTP Server name

Data Domain Replication ConfigurationReturns information regarding Data Domain replication configuration in a report. Usesdata from the Replication Config data source.

l Hostname - Name or IP address of Data Domain

l Source - The Data Domain system that receives data from backup applications

l Destination - The Data Domain that receives data from the replication source DataDomain

l Context Number - The context number for directory replication or a zero (0) forcollection replication

l Connection Host and Port - The destination system and port to connect to

l Low Bandwidth Optimization - Flag indicating the status of low-bw-optim: enabled ordisabled

l Encryption Enabled - Flag indicating the state of encryption

l Replication Enabled - Flag indicating if the replication process is enabled or disabled

Data Domain Tenant Unit ConfigurationReturns information on the Data Domain tenant unit configuration in a table report. Usesdata from the Tenant Unit Configuration data source.

l Hostname -Name or IP address of the Data Domain

l Name- Data Domain tenant name

l Number of Storage Units - Number of Data Domain storage units

l Number of Mtrees - Number of Data Domain Mtrees

l Number of Management Users - Number of management users

Reports by System Template

Data Domain Network DNS 145

Page 146: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Data Domain VTL Access Group ConfigurationReturns information about the configuration of VTL access groups in a table report. Usesdata from the Access Group Configuration data source. A VTL access group is a collectionof initiators (WWPNs or aliases) and the drives and changers they are allowed to access.

l Hostname - Name or IP address of Data Domain

l Group - Group Name

l Initiator - Client Initiator

l VTL - Target VTL

l Drive - Target drive

l Changer - VTL Changer

l LUN ID - Target device's LUN number

l Primary Port - Primary port configured

l Port In Use - Port currently in use

Data Mover ConfigurationReturns the Data Mover configuration details in a table report. Uses Data from the DataMover Configuration data source.

l Server - Name or IP Address of the EMC File Storage (EMC Celerra)

l Data Mover Name - logical name of Data Mover

l Slot - Slot on EMC Celerra unit

l Role - Data Mover role

l Unicode - Internationalization mode of the server if Unicode (or otherwise ASCII)

l NTP Servers - IP addresses of NTP server hosts that mover uses to synchronize with

l Failover Policy - Failover policy: none, manual, auto, retry

l StandBy For - List of movers for which this mover is a standby

l StandBys - List of standbys for this mover

EDL Configuration OptionsReturns information on the configuration options on a VTL Unit in a table report. Usesdata from the VTL Configuration Options data source.

l Node - Name of the EMC Disk Library

l Option - Name of the configuration option

l Value - Value of the configuration option

Enclosure ConfigurationReturns the enclosure configuration details in a table report. Uses data from theEnclosure Config data source.

l Hostname - Hostname or IP address of the array

l Sub Name - Identifier for the Storage Array

l Enclosure Name - Name of the enclosure that the disk is in

Reports by System Template

146 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 147: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Manufacturer - Manufacturer of enclosure

l Model - Model of enclosure

l Serial - Serial number of enclosure

l Type - Type of enclosure

l Rack Name - Identifier for disk rack

l Slots - Enclosure slot capacity

Exported LUNsReturns information on any LUNs that are exported from the selected objects as disks in atable report. Uses data from the Exported LUNs data source.

l LUN Node - Name of the host from which the LUN is being exported

l LUN - Name of the LUN before export

l Disk Node - Name of the host to which the LUN is being exported

l Disk - Name of the LUN as known by the host that imports the LUN

l Manufacturer - Name of the disk manufacturer

l Model - Model of the disk

l Serial Number - Serial number of the disk

l Firmware Revision - Firmware version of the disk

l Size - Size of the exported LUN (in GB)

Fibre Channel Device ConfigurationReturns the Fibre Channel device configuration details in a table report. Uses data fromthe Fibre Channel Devices data source.

l Hostname - Name of the host in which the HBAs are installed

l Device - Name of the device on the host where the HBAs are installed. Forexample, /dev/rmt/1n

l WWPN - Fibre Channel World Wide Port Number of the target device

Fibre Channel Device MappingReturns the Fibre Channel device mapping details in a table report. Uses data from theFibre Channel Device to Tape Drive Mapping data source.

l Hostname - Name of the host in which the HBAs are installed

l Device - Name of the device on the host where the HBAs are installed. Forexample, /dev/rmt/1n

l Tape Library - Name of the tape library in which the device is physically present

l Tape Drive - Name of the tape drive within the library

l Make - Make of the tape drive

l Model - Model of the tape drive

l Firmware - Firmware version of the tape drive

l Serial - Serial number of the tape drive

Reports by System Template

Exported LUNs 147

Page 148: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Fileserver ExportsReturns details of file systems that are exported from a fileserver in a table report. Usesdata from the File server exports data souce.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l Name - Name of the file system being exported

l Export - Name which the file system is being exported as

l Type - Type of export: CIFS, NFS

l SetUID - Indicates if the SetUID flag is supported on this export (where the caller mayrun a program with the privileges of the file owner) (NFS only)

l Permission - Permissions on the export. For example, read only (NFS only)

l Dedup Enabled - Indicates if deduplication was enabled on the export

l Replication Enabled - Indicates if replication was enabled on the export

l Backup Window - Identifier for backup window in which export took place

l Backup Window Start Time - Start time for backup window (in seconds)

l Backup Window End Time - End time for backup window (in seconds)

Filesystem Mount ConfigurationReturns the configuration options for file systems mounted on EMC File Storage. Usesdata from the Filesystem Mount Configuration data source.

l Hostname - Name or IP address of the EMC File Storage

l Data Mover - Name of the Data Mover hosting the file system

l Filesystem - Name of the file system

l Mount Point - Pathname of the new mount

l Disabled - Indicates if the file system mount is disabled

l NT Credential - Indicates if the Celerra Network Server takes account of a user'sWindows group memberships when checking an ACL for access through NFS

l Prefetch - Indicates if prefetch processing is enabled

l Read Only - Indicates that the mount is read-only on the Data Mover

l Uncached - Indicates if well-formed writes (that is, multiples of a disk block and diskblock aligned) are sent directly to the disk without being cached on the server.Enabling this option improves performance for applications such as databases thathave many connections to a large file to the disk without being cached on the server.

l Virus Scan - Indicates if the virus checker protocol is enabled

l Access Policy - Access-checking policy for the file system. The default policy isNATIVE. Access-checking policies apply only when the Data Mover's userauthentication is set to the recommended default, ’NT’. An access-checking policydefines the file and directory permissions that are applied (UNIX mode bits, WindowsACLS, or both) when a user attempts to access a filesystem in a mixed NFS and CIFSenvironment. The policies are: NT, UNIX, NATIVE, SECURE, MIXED, MIXED_COMPAT

l Lock Policy - Policy for the locking behavior of NFSv2 and NFSv3 clients whenaccessing files locked by NFSv4 or CIFS clients: nolock, writelock, or rwlock. Thedefault is nolock

Reports by System Template

148 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 149: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l CIFS Sync Write - Indicates if the Celerra Network Server performs immediate,synchronous writes to the disk, independent of the CIFS write protocol option

l CIFS Notify - Indicates if CIFS client notification is enabled for changes made to thedirectory file structure in the file system

l CIFS Notify On Access - Indicates if CIFS client notification is enabled whenever a useraccesses the file system

l CIFS Notify On Write - Indicates if CIFS client notification is enabled whenever a userwrites to the file system

l CIFS Trigger Level - Specifies the deepest directory level to which the notificationsettings apply to the file system. The default setting is 512

l CIFS Op Locks - Indicates if opportunistic lock granting for CIFS client access isenabled on the file system

Imported LUNsReturns information on imported LUNs in a table report. Uses data from the ImportedLUNs data source.

l Disk Node - Name of the host to which the LUN is being imported

l Disk - Name of the disk that is the imported LUN

l LUN Node - Name of the host from which the LUN is being imported

l LUN - Name of the LUN before import

l Serial - Serial number of the LUN

l Volume - Volume on which the LUN resides, if applicable

l Size - Size of the imported LUN (in GB)

l Type - Type of LUN: iSCSI, Fibre Channel

iSCSI iSNS ConfigurationReturns information on the names of the iSNS server configured on a object in a tablereport. Uses data from the iSCSI iSNS Configuration data source.

l Node - Name of the object

l iSNS Server - Name of the iSNS server for the object

iSCSI Portal ConfigurationReturns information about the addresses of iSCSI portals on a object in a table report.Uses data from the iSCSI Portal Configuration data source.

l Node - Name of the object on which the iSCSI portal exists

l Sub Name - Identifier for the Storage Array

l Adapter ID - Identifier for the adapter

l IP Address - IP Address of the iSCSI portal

l Port - Port number of the iSCSI portal

Reports by System Template

Imported LUNs 149

Page 150: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Least LUNs Per PortReturns the least LUNs per port in a table report. Uses data from the Fibre Channel PortConfig and LUN Mapping data source.

l Node - Name of the array on which the LUN exists

l Port - Name of the server port

l LUNs - Address of the LUN on the mapped endpoint

LUN Capacity Per NodeReturns the LUN capacity per object in a column chart. Uses data from the LUNConfiguration data source.

l Node - Name of the array on which the LUN exists

l Size - Size of the LUN (in GB)

LUN Capacity Per PortReturns the LUN capacity per port in a column chart. Uses data from the Fibre ChannelPort Config, LUN Configuration, and LUN Mapping data sources.

l Node - Name of the array on which the LUN exists

l Port - Name of the server port

LUN MappingReturns the mapping between LUNs and Fibre Channel WWNs or iSCSI IQNs, dependingon the protocol used to access the LUN, in a table report. Uses data from the LUNMapping data source.

l Node - Name of the array on which the LUN exists

l Sub Name -

l Name - Name of the LUN. /vol/ is stripped from the value before it is returned

l Source - LUN that is mapped

l Target - Entity to which the LUN is mapped. This value can have multiple entries

l LUN - Address of the LUN on the mapped endpoint

l Type - Type of LUN: iSCSI, Fibre Channel

l OS Type - Operating system type of the mapped LUN

LUN Source PortsReturns the LUN source port details in a table report. Uses data from the LUN Mappingdata source.

l Node - Name of the array on which the LUN exists

l Sub Name -

l Name - Name of the LUN

l Source - LUN that is mapped

l Target - Entity to which the LUN is mapped. This value can have multiple entries

Reports by System Template

150 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 151: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

LUN Source Ports for rulesetReturns LUN source port details in a table report. Report for Too few source ports for LUNrule. Uses data from the LUN Mapping and User Input data sources.

l Node - Name of the array on which the LUN exists

l Name - Name of the LUN

l Alert - Identifier of the alert

LUNs Per NodeReturns the LUNs per object details in a column chart. Uses data from the LUNConfiguration data source.

l Node - Name of the array on which the LUN exists

l LUNs - Name of the LUNs on the storage system to which the disk-based volume ismapped

LUNs Per PortReturns the LUNs per port details in a column chart. Uses data from the Fibre ChannelPort Config and LUN Mapping data sources.

l Node - Name of the array on which the LUN exists

l Name - Name of the LUN

l Source - LUN that is mapped

l Target - Entity to which the LUN is mapped. This value can have multiple entries

Mirror ConfigurationReturns the mirror configuration details in a table report. Uses data from the MirrorConfiguration data source.

l Node - Name of the object on which the mirror resides

l Path - Path to the mirror

MTree DetailsReturns the MTree details in a table report. Uses data from the Backup Device AccessFilesystem Details data source.

l Server - Name of the backup server

l Device Access - Device access information

l MTree Name - MTree name

MTree Quota ConfigurationReturns the MTree quota configuration details in a table report. Uses data from the MTreeQuota Configuration data source.

l Hostname - Name or IP address of the Data Domain server

l Name - MTree name

l Pre Compression Size - Pre-compression size (in MB)

Reports by System Template

LUN Source Ports for ruleset 151

Page 152: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Soft Limit - Soft limit value (in MB)

l Hard Limit - Hard limit value (in MB)

l Pre Compression Soft Limit Utilization - The Pre Compression Size divided by the SoftLimit value, then this value is multiplied by 100, displayed as a percentage (%)

l Pre Compression Hard Limit Utilization - The Pre Compression Size divided by theHard Limit value, then this value is multiplied by 100, displayed as a percentage (%)

NetBackup Catalog File Backup ConfigurationReturns information on the files that are scheduled for backup as part of the NetBackupCatalog backup process in a table report. Uses data from the NetBackup Catalog BackupFile Config data source.

l Server - Name of the NetBackup server

l Pathname - Path to the catalog file that is backed up

NetBackup Catalog Backup ConfigurationReturns information on the configuration of NetBackup Catalog backups in a table report.Uses data from the NetBackup Catalog Backup Config data source.

l Server - Name of the NetBackup Master Server

l Schedule Type - Type of schedule that the catalog backup is following

l Media Server - Name of the NetBackup Media Server to which the catalog is backedup

l Media 1 Type - Type of media to which the catalog is backed up. For example, Disk,Removable Media for the first backup

l Media 1 Target - Either the Media ID that the backup will occur to or the pathname fora disk based backup for the first backup

l Media 1 Density - Density of the media that the backup is going to for the first backup

l Media 2 Type - Type of media to which the catalog will be backed up. For example,Disk, Removable Media for the second backup

l Media 2 Target - Either the Media ID to which the backup occurs or the pathname fora disk based backup for the second backup

l Media 2 Density - Density of the media that the backup is going to for the secondbackup

NetBackup Disaster Recovery ConfigurationReturns NetBackup Disaster Recovery Configuration details in a table. Uses data from theNetBackup Disaster Recovery Config data source.

l Server - Name of the NetBackup Server

l Group- Name of the catalogue Policy

l Email - Email address to send disaster recovery details to

l Disk Path - Disk path where the disaster recovery details are stored

l Media ID - Disaster Recovery media ID

l User - Name of the user who has access to the disaster media disk path

l Password Enabled - Whether password is defined for the user or not

Reports by System Template

152 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 153: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Critical Policy List - List of Critical Policies

l Density - Disaster Recovery media density

NetBackup Disk Pool ConfigurationReturns the NetBackup disk pool configuration details in a table report. Uses data fromthe NetBackup Disk Pool Config data source.

l Server - Name of the NetBackup Server

l Sub Name - Not applicable

l Pool - Name of the pool

l Pool ID - Identifier for the disk pool

l Storage Servers - Storage servers in the disk pool

l Server Type - Type of NetBackup server: master, client

l Disk Storage Type - Type of disk storage unit

l Raw Size - Raw size of the disk pool (in GB)

l Capacity - Effective capacity of the disk pool (in GB)

l Volume Count - Number of volumes in the pool

l System Tag - NetBackup-specified identifier for the Disk Volume

l Low Water Mark - Percentage of dirty pages to trigger a cache flush

l High Water Mark - Percentage of dirty pages to stop a cache flush

l Max I/O Streams - Maximum permitted number of I/O streams

l Comment - User-defined identifier or comment for the disk volume

l Patchwork - Indicates the pool is associated with an enclosure

l Visible - Indicates pool is visible and managed through the user interface

l Single Storage Server - Pool is limited to a single storage server

l Open Storage - Managed as an Open Storage disk pool

l Allow Roving Volumes - Allow active mounts and unmounts of disk volumes

l Allow Optimized Duplication - Allow optimized duplication

l Allow Span Images - Allow images to span volumes

l Allow Basic Staging - Allow basic image staging

l Allow Lifecycle Management - Allow image lifecycle management

l Allow Capacity Management - Allow capacity management

l Allow Image Fragmentation - Allow images to be fragmented

l Allow Catalog Backup - Allow catalog backups

l Allow Checkpoint/Restart - Allow checkpoint restarts

l Allow Random Write Access - Allow random write access

l Allow FT Channel Transfer - Allow transfer through FT channel

l Allow Capacity Managed Retention - Allow capacity managed retention

l Allow Capacity Managed Queuing - Allow capacity managed job queuing

l Allow Virtual Image Construction - Allow virtual image construction

l Meta Data - Describe client data during backup

Reports by System Template

NetBackup Disk Pool Configuration 153

Page 154: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

NetBackup Disk Volume ConfigurationReturns information of the disk volumes on a NetBackup Server in a table report. Usesdata from the NetBackup Disk Volume Config data source.

l Server - Name of the NetBackup Server

l Sub Name - Not applicable

l Volume ID - Identifier for the volume

l Path - Path to the volume

l Pool - Pool to which the volume belongs

l Disk Type - If a disk volume, the type of disk volume. If a volume type other than disk,the type of the underlying disk volume

l Capacity - Capacity of disk (in GB)

l System Tag - NetBackup-specified identifier for the Disk Volume

l Ok On Root - Indicates if the volume can be mounted on root file system

l Read On Write - Indicates if reads are allowed on write-mounted volumes

NetBackup Global ConfigurationReturns NetBackup Global Configuration details in a table. Uses data from the NetBackupGlobal Config data source.

l Server - Name of the NetBackup Server

l Mail Admin - The email address of the administrator

l Job Retry Delay (Minutes) - Job retry delay (in minutes)

l Max. Jobs per Client - Maximum jobs per client

l Backup Tries Period (Hours) - Backup tries in period (in hours)

l Backup Tries per Period - Number of backup tries per period

l Num. Days Logs Kept - Number of days log kept

l Max. Drives per Master - Maximum drives per master server

l Compress DB Files Interval - Compress DB files interval (in seconds). Returns 0 for nocompression

l Media Mount Timeout - Media mount timeout (in minutes). Returns 0 if unlimited

l Shared Timeout - Multihosted media mount timeout (in seconds). Returns 0 ifunlimited

l Display Reports (Hours) - The number of hours ago that the start time for reports is.For example, if you set this to 24 hours, then the reports process data from 24 hoursago. The default is 24 hours.

l Num. Days TIR Info Kept - Number of days TIR ( True-image-recovery) info is kept

l Prep Interval (Hours) - Specifies the preprocessing interval. This interval is theminimum time in hours between client queries to discover new paths whenNetBackup uses auto-discover-streaming mode.

l Max. Backup Copies - Maximum number of backup copies

l DB Clean Interval (Hours) - DB Clean Interval (in hours)

l DB Clean Wait Time (Minutes) - DB Clean Wait Time (in minutes)

Reports by System Template

154 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 155: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Policy Update Interval (Minutes) -Policy Update Interval (in minutes)

NetBackup Lifecycle Policy ConfigurationReturns the NetBackup lifecycle policy configuration details in a table report. Uses datafrom the NetBackup Lifecycle Policy Config data source.

l Server - Name of the NetBackup Master Server

l Sub Name - Not applicable

l Policy - Name of the Lifecycle policy

l Data Classification - NetBackup Data Classification, if specified. For example, Gold orBronze

l Duplication Priority - Number representing NetBackup duplication priority. The higherthe number, the greater the priority

l State - Indicates whether policy is active or inactive

NetBackup Lifecycle Policy DestinationReturns the NetBackup lifecycle policy destination information in a table report. Usesdata from the NetBackup Lifecycle Policy Destination data source.

l Server - Name of the NetBackup Master Server

l Sub Name - Not applicable

l Policy - Name of the lifecycle policy to which the destination belongs

l Destination Type - Type of storage destination

l Storage Unit - Storage unit the policy is configured to use

l Volume Pool - Name of destination volume pool

l Server Group - Name of destination server group

l Source - Indicates the source type. For example, the original client, or an image

l Retention Type - Storage retention type: Fixed, Staged Capacity Managed, Expire AfterDuplication

l Retention Level - Retention period

l Preserve Multiplexing - Preserve multiplexing

l Alternate Read Server - An alternate server that can read an image created by adifferent media server

l State - Indicates whether the destination is active or inactive

NetBackup Media Server Configuration DetailsReturns the NetBackup media server configuration details in a table report. Uses datafrom the NetBackup Media Server Config data source.

l Server - Name of the NetBackup Master Server

l Num Data Buffers - Number of data buffers used when writing backups to tape

l Number Data Buffers for Disk - Number of data buffers used when writing backups todisk

l Num Data Buffers for Restores - Number of data buffers used when restoring backupsto disk

l Size Data Buffers - Size of the data buffers used when writing to tape

Reports by System Template

NetBackup Lifecycle Policy Configuration 155

Page 156: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size Data Buffers for Disk - Size of each data buffer used when writing to disk

l Network Buffer Size - Size of the buffer used when reading backup data from thenetwork

l Network Buffer Size for Restores - Size of the buffer used when sending restore datato the network

NetBackup Server Configuration DetailsReturns NetBackup server configuration details in a table report. Uses data from theNetBackup Server Config data source.

l Server - Name of the NetBackup Master Server

l Parameter - Name of the configuration parameter

l Value - Value of the parameter

NetBackup Storage Server ConfigurationReturns the NetBackup storage server configuration in a table report. Uses data from theNetBackup Storage Server Config data source.

l Server - Name of the NetBackup Storage Server

l Sub Name - Not applicable

l Name - Name of the storage unit

l Type - Type of storage server: master, client

l Storage Type - Type of storage unit

l Open Storage - Indicates server is managed as an Open Storage server

l Allow Roving Volumes - Allow active mounts and unmounts of disk volumes

l Allow Optimized Duplication - Enable optimized duplication

l Allow Span Images - Allow images to span volumes

l Allow Basic Staging - Allow basic image staging

l Allow Lifecycle Management - Allow image lifecycle management

l Allow Capacity Management - Allow capacity management

l Allow Image Fragmentation - Allow images to be fragmented

l Allow Catalog Backup - Allow catalog backups

l Allow Checkpoint/Restart - Allow checkpoint restarts

l Allow Random Write Access - Allow random write access

l Allow FT Channel Transfer - Allow transfer through FT channel

l Allow Capacity Managed Retention - Allow capacity managed retention

l Allow Capacity Managed Queuing - Allow capacity managed job queuing

l Allow Virtual Image Construction - Allow virtual image construction

l Meta Data - Describe client data during backup

l Disk Groups - Indicates if backup is aware of disk pools and enclosures

l Allow Active Disk Group Management - Allow active management of disk groups

l Allow Active Storage Server Management - Allow active management of storageservers

Reports by System Template

156 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 157: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Preferred For Restore - Preferred storage server for restores

l Required For Restore - Required storage server for restores

l Required For Duplication - Required storage server for duplicates

l Queue If Down - Queue jobs if storage server is down

NetBackup Storage Unit ConfigurationReturns the configuration of NetBackup storage units in a table report. Uses data from theNetBackup Storage Unit Config data source.

l Server - Name of the NetBackup Storage Server

l Name - Name of the storage unit

l Media Server - Media Server with which the storage unit is associated

l Storage Unit Type - Storage unit type. For example, Media Manager, Disk, NDMP,Fastrax

l Media Sub Type -

l On Demand Only - Indicates if the storage unit can be used for On Demand backupsonly (that is, only when a policy of schedule is explicitly configured to use thisstorage unit)

l Path - Absolute path name to the directory used by Disk based storage unit

l Robot Type - Type of robot on which the storage unit is located

l Density - Cartridge density used by Media Manager storage units

l Robot Number - Number of the robot associated with the storage unit

l Max Concurrent Drives - Maximum number of drives used by a Media Managerstorage unit

l Max Concurrent Jobs - Maximum number of Jobs that can be multiplexed to a diskstorage unit

l Max Multiplexing - Maximum number of jobs multiplexed per drive. Multiplexingsends concurrent, multiple backups from one or several clients to a single drive

l Max Fragment Size - Maximum fragment size used by the storage unit

l NDMP Host - NDMP Host used by NDMP storage units

l Disk Pool - Pool to which the storage unit belongs

l High Water Mark - Percentage of dirty pages to trigger a cache flush

l Low Water Mark - Percentage of dirty pages to stop a cache flush

l Ok On Root - Indicates if the volume can be mounted on root file system

NetBackup Storage Unit Group ConfigurationReturns the configuration of NetBackup storage unit groups in a table report. Uses datafrom the NetBackup Storage Unit Group Config data source.

l Server - Name of the NetBackup Storage Server

l Group - Name of the Storage Unit group

l Storage Unit - Storage unit the policy is configured to use

l Selection Strategy - Indicates if the storage unit is On-Demand-Only or not

Reports by System Template

NetBackup Storage Unit Configuration 157

Page 158: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

NetBackup VM Rule ConfigurationReturns details on current NetBackup VM Rule configuration in a table. Uses data fromthe NetBackup VM Rule Config data source.

l Server - The name of the NetBackup Server

l Bar Code Tag - Volume bar code prefix

l Media Type - Volume media type code

l Pool Name - Name of pool where the volume will be added

l Max. Mounts/Cleanings - Maximum number of volume mounts or maximum cleaningsavailable if this is a cleaning tape

l Description - Barcode rule description

Networker Client Storage Nodes ConfigurationReturns the NetWorker client storage object configuration details in a table report. Usesdata from the Networker Client Storage Nodes Config data source.

l Server - Name of the backup server

l Client - Name of the client

l Storage Node - Name of the Storage Node

l Type - Type of Media Server

NetWorker VBA ConfigurationReturns information on NetWorker Virtual Basic Appliance (VBA) configuration in a table.Uses data from the VBA Configuration and VBA Status data sources.

l Server - Name of the Networker server

l Name - Name of the VBA

l Comment - User defined comments

l VCenter Host - Name or IP address of the vCenter host

l Total Capacity - Total capacity (MB)

l Policy List - Protection policy list

l External Proxy Hosts - External proxy host list

l Used Capacity - Used capacity of the VBA (MB)

l Last Validated - Last Validated Checkpoint

l Online - Indicates if the VBA is online

l State - State of the VBA

l Configuration Error - Configuration errors from the VBA

RecoverPoint Consistency Group Copy DetailsReturns the RecoverPoint consistency group copy details in a table report. Uses data fromthe Consistency Group Copy Configuration data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

Reports by System Template

158 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 159: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Name - Name of the Copy

l Copy OS - Operating system of the Copy. If the copies written are not all running thesame operating system, this value will be Others/Mixed

l Site - Location of the Copy

l Role - Role of the Copy. For example, Production or Local Replica

l Journal Compression - Level of compression enabled on the Journal: None, Medium,High

l Required Protection Window - How far in time the replica image could be rolled back(in seconds)

l Journal Lag Unlimited - Indicates if the journal lag is set to be unlimited

l Max Journal Lag - Maximum journal lag for a copy (in MB)

l Logged Writes Proportion - Proportion of journal allocated for target-side log (as apercentage)

l Journal Size Limit - Maximum size of the journal (in MB)

l Reservations Policy - Reservations Policy to be applied to the Copy: Auto, IF, SCSI-2,SCSI-3, PowerPath, PowerPath (non-auto)

l Allow Distribution of Snapshots - Indicates if the Copy should allow distribution ofsnapshots that are larger than the capacity of journal volumes

RecoverPoint Consistency Group Copy Details for Consistency GroupReturns the RecoverPoint consistency group copy details for consistency group in a tablereport. Uses data from the Consistency Group Copy Configuration data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Consistency group name

l Copy OS - Operating system of the Copy. If the copies written are not all running thesame operating system, this value will be Others/Mixed

l Site - Location of the Copy

l Role - Role of the Copy. For example, Production or Local Replica

l Journal Compression - Level of compression enabled on the Journal: None, Medium,High

l Required Protection Window - How far in time the replica image could be rolled back(in seconds)

l Journal Lag Unlimited - Indicates if the journal lag is set to be unlimited

l Max Journal Lag - Maximum journal lag for a copy (in MB)

l Logged Writes Proportion - Proportion of journal allocated for target-side log (as apercentage)

l Journal Size Limit - Maximum size of the journal (in MB)

l Reservations Policy - Reservations Policy to be applied to the Copy: Auto, IF, SCSI-2,SCSI-3, PowerPath, PowerPath (non-auto)

l Allow Distribution of Snapshots - Indicates if the Copy should allow distribution ofsnapshots that are larger than the capacity of journal volumes

Reports by System Template

RecoverPoint Consistency Group Copy Details for Consistency Group 159

Page 160: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

RecoverPoint Consistency Group DetailsReturns the RecoverPoint consistency group details in a table report. Uses data from theConsistency Group Configuration and Consistency Group Status data sources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Name - Name of the consistency group

l Production Copy - Name of the copy that is the source of the transfer

l Enabled - Indicates if the consistency group is enabled

l Preferred RPA - RPA preferred to replicate this consistency group

l Reservation Support - Indicates if reservation support is configured

l Compression Enabled - Indicates if compression is enabled

l Compression Level - Level of compression to use if enabled. A number between 1 and10

l Minimize Lag - Indicates if RecoverPoint should use as much bandwidth as possibleto minimize lag

l Minimize Bandwidth - Indicates if RecoverPoint should preserve bandwidth tomaintain lag within its limits

l Priority - Amount of bandwidth allocated to this consistency group in relation to allother consistency groups: Idle, Low, Normal, High, Critical

l Bandwidth Limited - Indicates if the consistency group should limit the amount ofbandwidth it uses

l Bandwidth Allocation - Bandwidth to which the consistency group is limited (MB/second)

l Hosts OS - Operating system of the hosts writing to the storage in the consistencygroup. If the hosts are not all running the same operating system, this value will beOthers/Mixed

l Global Cluster Mode - Global Cluster mode for the Copy group: None, Manual, Auto-data, Auto-quorum (shared data), Manual (shared data)

l Allow Regulation - Indicates if RecoverPoint should be allowed to slow or stop thehost application when approaching a policy limit

l Transfer Data with Non Preferred RPA - Indicates if data should be transferred evenwhen the group is handled by a non-preferred RPA

l Measure Lag at Remote Appliance - Indicates if lag should be measured when writesreach the target RPA (as opposed to the journal)

l CDP System Optimized Lag - Indicates if the system should optimize the lag for CDP

l CDP Fast First Time Init - Indicates if the CDP copy should perform fast first timeinitialization

l CDP Snapshot Granularity - Snapshot granularity for CDP as a text string: Dynamic,Fixed(per second), Fixed(per write)

l CDP Lag Size - Maximum allowed lag for CDP, if not using system optimization (in MB)

l CDP Lag Time - Unit in which CRR lag is measured if CRR Lag Size is stored as a time(in seconds)

l CDP Lag Writes - Number of writes, if CRR Lag Size is stored as a number of writes

l CRR System Optimized Lag - Indicates if the system should optimize the lag for CRR

Reports by System Template

160 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 161: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l CRR Lag Size - Maximum allowed lag for CRR, if not using system optimization (in MB)

l CRR Lag Time - Unit in which CRR lag is measured if CRR Lag Size is stored as a time(in seconds)

l CRR Lag Writes - Number of writes, if CRR Lag Size is stored as a number of writes

l CRR Fast First Time Init - Indicates if the CRR copy should perform fast first timeinitialization

l CRR Snapshot Granularity - Snapshot granularity for CDP as a text string: Dynamic,Fixed(per second), Fixed(per write)

l Set Name - Name of the replication set

l Distributed -

l Enabled - Indicates if the consistency group is active

RecoverPoint Replication Set ConfigurationReturns the RecoverPoint replication set configuration details in a table report. Uses datafrom the Consistency Group Configuration and Replication Set Configuration datasources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Name - Name of the replication set

l Consistency Group Name - Name of the consistency group containing the replicationset

l Size - Size of the consistency group (in MB)

RecoverPoint RPA DetailsReturns the RecoverPoint appliance details in a table report. Uses data from the RPAConfiguration and RPA Status data sources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which RecoverPoint Appliance is located

l Name - Name of the RecoverPoint Appliance

l Version - Version of the RecoverPoint Appliance

l Status - Status of the RecoverPoint Appliance

l Repository Volume - Status of the repository volume

l Remote Connection - Status of the connection with the remote site

l LAN - Status of the LAN interface

l LAN Connection - Status of the local connection

l WAN - Status of the WAN interface

l WAN Connection - Status of the WAN connection

l Data Link - Status of data links on the RecoverPoint Appliance

l Volume Connections - Status of volume connections on the RecoverPoint Appliance

Reports by System Template

RecoverPoint Replication Set Configuration 161

Page 162: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

RecoverPoint Splitter DetailsReturns the RecoverPoint splitter details in a table report. Uses data from the SplitterConfiguration and Splitter Status data sources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the splitter is located

l Name - Name of the Splitter

l Type - Type of splitter

l Status - Status of the splitter

l RPA Connections - Status of connections to the RecoverPoint Appliance from thesplitter

l Volume Access - Level of access to the volume. For example, read-only or read-write

Remote Mirror ConfigurationReturns the remote mirror configuration in a table report. Uses data from the RemoteMirror Configuration data source.

l Source node - Name of the object on which the source mirror resides

l Source path - Path to the mirror source

l Mirror node - Name of the object on which the remote mirror resides

l Mirror path - Path to the remote mirror

Save Pool ConfigurationReturns the save pool configuration details in a table report. Uses data from the SavePool Configuration data source.

l Array Name - Hostname or IP address of the host being monitored

l Pool Name - Name of the pool

l Pool ID - Identifier for the pool

l Total Capacity - Total capacity of the pool (in GB)

l Enabled Capacity - Enabled capacity of the pool (in GB)

Shared Memory ConfigurationReturns the shared memory configuration in a table report. Uses data from the MemoryConfiguration data source.

l Hostname - Name of the host

l Sub Name - Identifier for the storage array

l Physical Memory - Amount of physical memory (in MB)

l Virtual Memory - Amount of virtual memory (in MB)

l Read Cache - Read cache size (in MB)

l Write Cache - Write cache size (in MB)

l shmmax - System-wide maximum allowable shared memory segment size (in MB)

l shmmni - System-wide minimum allowable number of shared memory segments

Reports by System Template

162 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 163: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l shmseg - Maximum number of shared memory segments that can be simultaneouslyattached to a single process. Not available on Solaris platforms

l msgmap - Size of the free-space resource map used for assigning locations for newmessages in shared memory. Not available on AIX and Solaris

l msgmax - Maximum individual messages size allowed (in bytes)

l msgmnb - Maximum total size of all messages that can be queued simultaneously ona message queue (in bytes)

l msgmni - Maximum number of message queues that can exist simultaneously on thesystem

l msgseg - Message segment size that is to be used when allocating message space inmessage queues. Not available on Solaris and AIX platforms

l msgssz - Message segment size that is to be used when allocating message space inmessage queues (in bytes). Not available on AIX and Solaris

l msgtql - Maximum number of messages that are allowed to exist on the system at anygiven time

l semmap - Size of the free-space resource map used for allocating new System V IPCsemaphores in shared memory. Not available on AIX, HP-UX 11.23, and Solaris

l semmni - Maximum number of sets of IPC semaphores that can exist simultaneouslyon the system

l semmns - System-wide maximum number of individual IPC semaphores that can beallocated for users. Not available on AIX

l semmsl - Maximum number of Semaphores per semaphore set. Not available on AIX

l semopm - Number of semaphore operations that can be performed per semop call.Not available on HP-UX

l semume - Maximum number of IPC semaphores that a given process can have undooperations pending on

Symmetrix LUN to Data Domain vDisksReturns Symmetrix LUN to Data Domain vDisk details in a table. Uses data from the LUNto LUN Mapping and LUN Configuration data sources.

l Symmetrix Device - Symmetrix Device

l Data Domain LUN - Data Domain vDisk

l Size - Size of the Data Domain disk (in GB)

l Pool - Data Domain pool name

Tape Library Drive Count By LibraryReturns the number of tape drives that are configured on each library in a column chart. Itis possible to map only virtual tape drives to tape libraries. Physical tape drives are notdisplayed in this chart. Uses data from the Tape Library Configuration data source.

l Hostname - Name of the device being monitored: For normal tape libraries, this valueis the name of the tape library. For devices supporting multiple tape libraries such asan EDL, this value is the name of the manager

l Library Name - Name of the tape library. This field is not populated if monitoring alibrary directly. It is populated if monitoring a device that supports multiple librariessuch as an EDL. Physical tape drives do not return information on the tape library inwhich they are a member

Reports by System Template

Symmetrix LUN to Data Domain vDisks 163

Page 164: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Num Drives - Number of tape drives in the tape library

Tape Library Firmware SummarySummary of the tape library firmware versions in a column chart. It is only possible togather firmware information from virtual tape libraries. Physical tape libraries are notdisplayed in this chart. Uses data from the Tape Library Configuration data source.

l Firmware - Firmware of the tape library

l Count - Number of tape libraries

Tape Library Model SummarySummary of the tape library models in a column chart. Includes all physical and virtuallibraries managed by the virtual tape library. Uses data from the Tape LibraryConfiguration data source.

l Model - Model of the tape drive

l Count - Number of tape drives

Tape Library Slot Count By LibraryReturns the number of slots that are configured on each library in a column chart. Usesdata from the Tape Library Configuration data source.

l Hostname - Name of the device being monitored: For normal tape libraries, this valueis the name of the tape library. For devices supporting multiple tape libraries such asan EDL, this value is the name of the manager

l Library Name - Name of the tape library. This field is not populated if monitoring alibrary directly. It is populated if monitoring a device that supports multiple librariessuch as an EDL. Physical tape drives do not return information on the tape library inwhich they are a member

l Num Slots - Number of slots in the tape library

TSM Copy Group ConfigurationReturns the TSM Copy Group Configuration details in a table report. Uses data from theTSM Copy Group Configuration data source.

l Server - Name of the TSM Server

l Sub Name - Name of the TSM Server instance

l Policy Domain Name - Policy domain of the copy group

l Policy Set Name - Policy set of the copy group

l Management Class Name - Management class of the copy group

l Copy Group Name - Name of the copy group

l Copy Group Type - Type of the copy group

l Maximum Num. Versions Data Exists - Maximum number of backup versions retained

l Maximum Num. Versions Data Deleted - Maximum number of backup versionsdeleted from client

l Num. Days Extra Versions Retained - Number of days backup versions retained afterbeing inactive

l Num. Days Only Version Retained - Number of days backup versions retained afterbeing deleted

Reports by System Template

164 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 165: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Copy Mode - Can be modified or absolute

l Copy Serialization - How to process modified files during backup

l Copy Frequency (Days) - How frequently a file can be backed up in days

l Copy Destination - Primary storage pool for data

l Table Of Contents Destination - Primary storage pool for Table of Contents (TOC)

l Last Updated By - Administrator who made most recent changes

l Last Updated - Date of the last change

l Managing Profile - Managing profile name

l Changes Pending - Whether changes are pending

TSM Defined Server ConfigurationReturns the TSM defined server configuration details in a table report. Uses data from theTSM Defined Server Configuration data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Defined Server - Name of the defined server. In previous DPA releases, this field wascalled LAN-free Server Name

l Version - Server version

l Hostname - IP address of the server

l Port - Specifies the port for the TSM server if you are monitoring TSM remotely andthere is more than one instance on a system. The default value is 1500

l Description - Server description

l Node - Name of client object

l Allow Replacement - Indicates if server definitions can be replaced

l Locked - Indicates if client object is locked out of TSM

l Compression - Type of compression performed by TSM on client files

l Archive Delete Allowed - Indicates if the client object can delete its own archive files

l URL - URL of the server

l Registration Date - Date and time that the client object was registered

l Password Set - Indicates if the server password is set

l Password Set Date - When the server password was set

l Invalid Sign-On Count - Maximum number of invalid sign on attempts allowed

l Validate Protocol - Indicates if data validation is enabled

l Registering Administrator - Name of the administrator that registered the client object

l Roles - TSM server roles. For example, Storage Agent, Replication

l Communication Method - Method of communication

l SSL - Indicates if SSL is enabled

l Virtual Volume Password Set Status - Status of the virtual volume password

l Password Set Date - When the virtual volume password was set

l Grace Delete Period (Days) - Grace deletion period (in days)

Reports by System Template

TSM Defined Server Configuration 165

Page 166: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

TSM LAN Free Server ConfigurationReturns the TSM LAN-free server configuration details in a table report. Uses data fromthe TSM LAN Free Server Configuration data source. In DPA 6.0, LAN-Free ServerConfiguration is renamed Defined Server Configuration. LAN-free Server Configuration issupported for backwards compatibility; however, Defined Server Configuration ispreferred going forward.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l LAN Free Server - Name of the LAN-free Server

l Version - Server version

l Hostname - IP address of the server

l Port - Specifies the port for the TSM server if you are monitoring TSM remotely andthere is more than one instance on a system. The default value is 1500

l Description - Server description

l Node - Name of client object

l Allow Replacement - Indicates if server definitions can be replaced

l Locked - Indicates if client object is locked out of TSM

l Compression - Type of compression performed by TSM on client files

l Archive Delete Allowed - Indicates if the client object can delete its own archive files

l URL - URL of the server

l Registration Date - Date and time that the client object was registered

l Password Set - Indicates if the server password is set

l Password Set Date - When the server password was set

l Invalid Sign-On Count - Maximum number of invalid sign on attempts allowed

l Validate Protocol - Indicates if data validation is enabled

l Registering Administrator - Name of the administrator that registered the client object

TSM Management Class ConfigurationReturns TSM Management Class Configuration details in a table report. Uses data fromthe TSM Management Class Configuration data source.

l Server - Name of the TSM Server

l Sub Name - Name of the TSM Server instance

l Policy Domain Name - Policy domain of the management class

l Policy Set Name - Policy set of the management class

l Management Class Name - Management class name

l Default Management Class -Whether this is the default management class for thepolicy set

l Description - Description

l Space Management Technique - File migration technique

l Num. Days Since Non-Use Before Auto Migrate - Elapsed days of last access beforefile can be migrated

Reports by System Template

166 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 167: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Migration Requires Backup -Whether backup version exists before migration

l Migration Destination - Primary storage pool for migrated data

l Last Updated By - Administrator who made most recent changes

l Last Updated - Date of the last change

l Managing Profile - Managing profile name

l Changes Pending - Whether changes are pending

TSM Policy Set ConfigurationReturns TSM Policy Set Configuration details in a table report. Uses data from the TSMPolicy Set Configuration data source.

l Server - Name of the TSM Server

l Sub Name - Name of the TSM Server instance

l Policy Set Name - Policy set name

l Policy Domain Name - Name of the domain the policy set is assigned to

l Default Management Class - The default management class assigned to this policyset

l Description - Description

l Last Updated By - Administrator who made most recent changes

l Last Updated - Date of the last change

l Managing Profile - Managing profile name

l Changes Pending - Whether changes are pending

Virtual Data Mover ConfigurationReturns the virtual data mover configuration details in a table report. Uses data from theVirtual Data Mover Configuration data source.

l Node - Hostname of the storage array

l Sub Name - Name of the storage array

l Virtual Data Mover - Name of the virtual data mover

Virtual Host ConfigurationReturns the configuration of virtual machines on a virtualization server in a table report.Uses data from the Virtual Host Configuration and Virtual Host Status data sources.

l Virtualization Server - Hostname of a Virtualization Server managed by Virtual Centre

l Virtual Host - Name of the Virtual Centre server

l Virtual Machine Type - Type of virtual machine

l Number CPU - Number of CPUs configured on the virtual machine

l Maximum CPU - Maximum number of CPUs able to be configured on the virtualmachine (in MHz)

l Reserved CPU - Number of CPUs reserved on the virtual machine (in MHz)

l Limit CPU - Number of CPU cycle that the virtual machine is limited to (in MHz)

l Memory - Amount of memory configured on the virtual machine (in MB)

Reports by System Template

TSM Policy Set Configuration 167

Page 168: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Reserved Memory - Amount of memory reserved for the virtual machine (in MB)

l Limit Memory - Amount of memory that the virtual machine is limited to (in MB)

l Status - Status of the virtual machine

l CPU Used - CPU utilization of the virtual machine (in MHz)

l Memory Used - Amount of memory used by the virtual machine (in MB)

l Startup Time - Time virtual host was started

Virtual Host Disk ConfigurationReturns the virtual host disk configuration details in a table report. Uses data from theVirtual Host Disk Configuration data source.

l Virtualization Server - Hostname of a Virtualization Server managed by Virtual Centre

l Virtual Host - Name of the Virtual Centre server

l Name - Name of the virtualization server

l Size - Capacity of the disk (in MB)

l Virtual Disk - Virtual disk to which the disk is mapped

l Datastore - Name of the datastore on which the virtual disk is located

Virtual Host Network Interface ConfigurationReturns the virtual host network interface configuration details in a table report. Usesdata from the Virtual Host Network Interface Configuration and Virtual Host NetworkInterface Status data sources.

l Virtual Host - Name of the Virtual Centre server

l Virtualization Server - Hostname of a Virtualization Server managed by Virtual Centre

l Name - Identifier for the virtual interface

l Virtual Network - Network on which the virtual interface is located

l MAC Address - MAC Address of network interface

l Link Up - Indicates if the interface is currently connected

l IP Address - IP address of the network interface

Virtualization Manager ConfigurationReturns configuration information on Virtual Centre servers in a table report. Uses datafrom the Virtual Centre Server Configuration data source.

l Server - Name of the Virtual Centre Server host

l Application Name - Name of the application running on the Virtual Centre server

l Version - Version of the application

l Vendor - Name of the application vendor

l Operating System - Operating system running on the Virtual Centre host

Reports by System Template

168 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 169: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

VNX/CLARiiON RAID Group ConfigurationReturns VNX and CLARiiON RAID group configuration details in a table report. Uses datafrom the RAID Group Configuration data source.

l Hostname - Name of the host

l Name - Name of group

l Type - Type of group

l Logical Capacity - Identifies the amount of logical capacity (in GB)

l Raw Capacity - Identifies the amount of raw capacity (in GB)

l Used Capacity - Identifies how much of the capacity is used (in GB)

l Free Capacity - Identifies how much of the capacity is free (in GB)

l Max Disks - Maximum number of disks

l Max Devices - Maximum number of devices

VNX/CLARiiON Storage Pool ConfigurationReturns the VNX and CLARiiON storage pool configuration details in a table report. Usesdata from the Storage Pool Config data source.

l Hostname - Name of the host being monitored

l Name - Name for the Storage Pool

l Description - Description of the pool

l Disk Type - Disk type used by the storage pool

l Pool ID - Unique identifier for the pool

l Capacity - Total capacity of the storage pool (in GB)

l User Size - Amount of storage used by the pool (in GB)

l Free Capacity - Total free capacity (in GB)

l RAID Type - Type of RAID used

l Pool Type - Type of storage pool. For example, primary, copy, or active data

l Consumed Capacity - Total used capacity (in GB)

l Num Disks - Number of disks storage pool holds

l Is Mixed -

l Full Threshold -

l Subscribed Capacity - Total subscribed capacity (in GB)

l % Subscribed -

l Oversubscribed Capacity - Total capacity oversubscribed (in GB)

l EFD Cache State -

l Consumed -

Reports by System Template

VNX/CLARiiON RAID Group Configuration 169

Page 170: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Webserver ConfigurationReturns information on webserver configuration in a table report. Uses data from theWebserver Configuration data source.

l Node - Name of the object running the webserver

l Product - Webserver product

l Version - Webserver version

Xsigo Virtual To Physical Port MappingReturns the mapping of virtual interfaces to physical ports on the Xsigo appliance in atable report. Uses data from the Physical to Virtual Port Mapping data source.

l Hostname - Name of the Xsigo Director object

l Sub Name - Identifier for the switch

l Virtual Type - Type of virtual port: 1 (virtual), 0 (physical)

l Virtual Port - Identifier for virtual port mapped to the physical port

l Physical Port - Identifier for the physical port

Data Protection system templatesData protection is the main category for reports that present information about thebackups that have taken place on a backup server. Data protection includes reports onany restores that have already occurred, and the current exposure of any backup clients.

Note

Size Offset and Size Scanned Offset values are gathered by the backup modules, but bydefault are not displayed in the reports. Size Offset is the number of bytes that should beadded to or subtracted from the Size field to return the job size in bytes. Size ScannedOffset is the number of bytes that should be added to or subtracted from the SizeScanned field to return the job size in bytes.

Active Clone Job DetailsReturns information on the status of clone jobs. Uses data from the Clone Job Status datasource.

l Server - Server which started the clone job

l Media Server - Name of the media server on which the clone job took place

l Clone ID - Identifier for the clone job

l Clone - Object being cloned

l Status - Status of the cloned job: Success, Failed, Started

l Queue Start - Time the job went into the queue

l Start Time - Time the job started

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Reports by System Template

170 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 171: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Application Exposure for RPO missed rulesetReturns information on RPO missed exposures in a table report. Report for Applicationrecovery point objective missed rule. Uses data from the User Input and ApplicationExposure data sources.

l Current Backup Exposure - Amount of time for which the application has beenexposed to data loss, measured as the difference between the restore point and thereport's end time

l Recovery Point Objective (Secs) - As specified in the Protection Policy

l Alert - Identifier of the alert

Application Exposure for RTE high rulesetReturns information on RTE high exposures in a table report. Report for Applicationrestore time estimate too high rule. Uses data from the User Input and ApplicationExposure data sources.

l Estimated restore time -

l Backup Recovery Time Objective - As specified in the Protection Policy

l Recovery Time Objective (Secs) - As specified in the Protection Policy

l Alert - Identifier of the alert

Avamar Data Retained by ClientReturns the Data Retained value for all unexpired jobs on the Avamar server in a table.Uses data from the Avamar Data Retained by Client data source.

l Client - Name of the Avamar client

l Data Retained - Calculated as the sum of the Size Scanned of the earliest job on theclient and the sum of the Bytes Modified Sent and the Bytes Modified Not Sent for theremaining jobs

Avamar Domain FootprintReturns the names of the clients and the total size of all the successful, unexpired jobsper domain in a table report. Uses data from the Backup Job Details data source.

l Domain Name - Name of the Avamar domain

l Server - Name of the backup server on which the job took place

l Clients Backed Up Within Domain - The names of the clients backed up within thedomain

l Data Written to Grid - The total size in MB of all successful, unexpired jobs on clientson the domain

Avamar Garbage Collection JobsReturns information on the Avamar garbage collection process in a column chart. Usesdata from the Avamar Garbage Collection Status data source.

l Server - Name of the Avamar server

l Sub Name - Name of the Avamar client

l ID - Identifier for the garbage collection process

Reports by System Template

Application Exposure for RPO missed ruleset 171

Page 172: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Node Count - Number of Avamar objects involved in the collection process

l Processed Index Stripes - Number of index stripes processed by garbage collection

l Total Index Stripes - Total number of index stripes

l Recovered - Number of bytes recovered by the collection process (in MB)

l Recovered Offset - Number of bytes that should be added or deleted from theRecovered field to return the size of data recovered by garbage collection

l Deleted Chunks - Number of chunks deleted by the collection process

l Result - Status of the garbage collection process after completion

l Start Time - Time the job started

l End Time - Time the job ended

Avamar Replication SummaryReturns the amount of data backed up and the percentage that is replicated in the last 24hours, 24–48 hours, and over 48 hours in a table. Uses data from the Num Jobs,Uncloned Backup Jobs, Backup Server Status, Clone Job Details, Total Size Scanned (MB)data sources.

l Server - Name of the backup server

l Utilization - Percentage that is being utilized of the server

l Under 24 Hours - Backed Up Logical - Amount of logical data backed up in the last 24hours in MB

l Under 24 Hours - Replicated Logical - Amount of logical data replicated in the last 24hours as a percentage of data backed up for same time period (%)

l 24–48 Hours - Backed Up Logical - Amount of logical data backed up in the last 24–48 hour period in MB

l 24–48 Hours - Replicated Logical - Amount of logical data replicated in the last 24–48 hour period as a percentage of data backed up for same time period (%)

l Over 48 Hours - Backed Up Logical - Amount of logical data backed up over 48 hoursago in MB

l Over 48 Hours - Replicated Logical - Amount of logical data replicated over 48 hoursago as a percentage of data backed up for the same time period (%)

l 24–48 Hours - Num Jobs - Internal field used for report row colours

l 24–48 Hours - Num Replications - Internal field used for report row colours

l Over 48 Hours - Num Jobs - Internal field used for report row colours

l Over 48 Hours - Num Replications - Internal field used for report row colours

l Expiry Date - The date of the earliest expiry for un-replicated backups

l Current Exceptions - Field drills down to report Backup Unreplicated Clients - AllExceptions. This lists all backups that started over 24 hours ago and are not yetreplicated, and all backups which are replicated but the gap between backup andreplication was over 24 hours

l All Exceptions - Field drills down to report Backup Unreplicated Clients - CurrentExceptions. This lists all backups that started over 24 hours ago and are not yetreplicated

Reports by System Template

172 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 173: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup 2-Day ComparisonReturns comparison information on the two day backups in a column chart. Uses datafrom the Backup Statistics data source.

l Backups - Number of backups that completed

l Size - Amount of data that was backed up (in GB)

l Period -

Backup Active ClientsReturns information on the active backup clients in a table report. Uses data from theBackup Job Status data source.

l Server - Name of the backup server

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Sub Name - Name of TSM server instance

l Group - Name of the group or policy under which the Job is running

l Schedule - Name of the schedule under which the Job is running

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job: pending, queued, initializing, started, completed, severed,restarted, in progress, future, failed - no restart

l Error Code - Error code associated with the backup

l Queued - Time the Job started queuing

l Started - Time the Job started

l Num Jobs - Number of jobs

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

Backup Active GroupsReturns information on the active backup groups in a table report. Uses data from theBackup Group Status data source.

l Server - Name of the backup server on which the group is located

l Group - Name of the group in which the backup job occurred

l Start Time - Last start time of the group. This value is not set if the group has neverran before

l End Time - Last end time of the group. This value is not set if the group is running orhas never run

l Status - Status of the group: Never run, Started, Cloning, Completed, Queued

Reports by System Template

Backup 2-Day Comparison 173

Page 174: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Backup Application - Name of the backup application that performed the backup. Forexample, NetWorker

l Group Job ID - ID of the group job instance

Backup Active JobsReturns information on the active backup jobs in a table report. Uses data from theBackup Active Jobs data source.

l Job Id - Job ID in the activity log

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Group - Name of the group or policy under which the Job is running

l Schedule - Name of the schedule under which the Job is running

l Client - Name of the client

l Job - Name of the Job

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job: pending, queued, initializing, started, completed, severed,restarted, in progress, future, failed - no restart

l Error Code - Error code associated with the backup

l Queued - Time the Job started queuing

l Started - Time the Job started

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

Backup All ClientsReturns information on all clients backed up in a table report. Uses data from the BackupJob Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain

Reports by System Template

174 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 175: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Backup Set - Name of the backup set associated with the job

l Proxy - Proxy backup host

l Session - Number of sessions when a volume is present and mounted in the device

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Storage Unit - Storage unit the policy is configured to use

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Size Transferred - Total size of the data transferred (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted fromthe Size Transferred field to return the Job size (in bytes)

l Archive Flag - Flag indicating whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Effective Path - Effective path of the Backup

Reports by System Template

Backup All Clients 175

Page 176: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Error Code Summary - Error code summary associated with the error message

l Status Code Summary - Status code summary from the job

l Plugin Name - Plug-in name

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Transferred - Size transferred to server (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted fromthe Size Transferred field to return the Save Set size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

Reports by System Template

176 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 177: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Duration -

l Num Jobs -

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - holds the job ID used for storage device identification (hidden field)

Backup All GroupsReturns details of all the group runs that have occurred in a table report. Uses data fromthe Backup Group Details data source.

l Server - Name of the server on which the group runs

l Group - Name of the group that has run

l Session - Number of sessions when a volume is present and mounted in the device

l Start Time - Time the group started

l End Time - Time the group ended

l Status - Status of the group: Success, Fail

l Application Status - Status of the Backup Exec group: Cancelled, Completed WithExceptions, Missed

l Backup Application - Name of the backup application performing the backup

l Group Job ID - ID of the group job instance

Backup All Jobs - No RestartsReturns the details of all jobs, excluding failed restarts, in a table report. Uses data fromthe Backup Job Details and Restarted Backup Job Details data sources.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

Reports by System Template

Backup All Groups 177

Page 178: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions simultaneously accessing the device

l Proxy - Proxy backup host

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Size Transferred - Total size of the data transferred (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted fromthe Size Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

Reports by System Template

178 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 179: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Effective Path - Effective path of the Backup

l Error Code Summary - Error code summary associated with the error message

l Status Code Summary - Status code summary from the job

l Plugin Name - Plug-in name

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup All JobsReturns the details of all jobs in a table report. Uses data from the Backup Job Detailsdata source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Domain Name - Name of the domain

l Storage Unit - Storage unit the policy is configured to use

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

Reports by System Template

Backup All Jobs 179

Page 180: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the backup went into the backup applications queue

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

Reports by System Template

180 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 181: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Number of Secondary Copies - Total number of secondary copies taken, if any

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies combines (including primary copy)

l Job ID 2 - NetBackup Job ID in the activity log

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Size Transferred - Total size of the data transferred (in MB)

l Size Transferred Offset - Number of bytesthat should be added or subtracted fromfrom the Size Scanned field to return the Save Set size in bytes

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Session - Number of sessions that are simultaneously accessing the device

l Storage Id - holds the job ID used for storage device identification (hidden field)

Backup All Jobs for Specific ClientReturns a list of all jobs that have run on a backup server in a table report. Uses data fromthe Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

Reports by System Template

Backup All Jobs for Specific Client 181

Page 182: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Storage unit the policy is configured to use

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l App Type - Name of the TDP that was used to perform the backup

l Session - session associated with the job

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the backup went into the backup applications queue

l Started - Time the backup went into the backup applications started

Reports by System Template

182 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 183: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Job ID 2 - NetBackup Job ID in the activity log

l Total Size of Copies - Total size of copies (in MB)

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Number of seconds waiting for the backup media

l Total Reduction Ratio - The ratio for the size of data compressed and deduplicatedagainst the original data size over time

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

Reports by System Template

Backup All Jobs for Specific Client 183

Page 184: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discoveredl Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup All Large JobsReturns a list of all jobs greater than 500 GB that have run on a backup server in a tablereport. Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Storage unit the policy is configured to use

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Proxy - Proxy backup host

l Session - session associated with the job

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the backup. This is hardcoded to full

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

Reports by System Template

184 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 185: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the backup went into the backup applications queue

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

Reports by System Template

Backup All Large Jobs 185

Page 186: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup All Long Running JobsReturns a list of all jobs that have run on a backup server longer than 12 hours in a tablereport. Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l App Type - Name of the TDP that was used to perform the backup

l Session - session associated with the job

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

Reports by System Template

186 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 187: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size - Amount of data backed up (in MB)

l Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid whenthe Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the backup went into the backup applications queue

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

Reports by System Template

Backup All Long Running Jobs 187

Page 188: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup All Slow JobsReturns a list of all jobs that have run on a backup server that are less than 1 MB/secondin a table report. Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

Reports by System Template

188 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 189: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Backup Set - Name of the backup set associated with the job

l Session - session associated with the job

l Proxy - Proxy backup host

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the backup went into the backup applications queue

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

Reports by System Template

Backup All Slow Jobs 189

Page 190: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Average Details For Specific JobReturns information on the average details for a backup of the selected Job on that clientsince records began in a table report. Only successful Jobs of the same backup level areconsidered. Uses data from the Backup Job Details data source.

l Group - Name of the group or policy in which the Job took place

l Client - Name of the client backed up

Reports by System Template

190 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 191: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Job - Name of the Job backed up

l Size - Amount of data backed up (in MB)

l Duration - Time the backup application took to complete the job

Backup Average Full Details By ClientReturns information on the full details for a backup by client on that client since recordsbegan in a table report. Only successful Jobs of the same backup level are considered.Uses data from the Backup Job Details data source.

l Group - Name of the group or policy in which the Job took place

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Duration - Time the backup application took to complete the job

Backup Client Configuration for PoolReturns details on the configuration of all physical hosts configured on a server in a tablereport. Uses data from the Backup Pool Client Config Mapping and Backup ServerMapping data sources.

l Server - Name of the backup server on which the client is configured

l Sub Name - Name of the TSM server instance

l Client - Name of the client

l Pool - Pool of the volume that is required

l Domain Name - Identifier for domain

l Active - Identifies if the backup pool client is active

l Software Version - Version of the backup software running on the client

l Remote IP - Remote IP address of the client

l OS Type - Type of client operating system

l OS Version - Version of the client operating system

l Server Network Interface - Network interface on the server or media server to whichthe client connects when running backups

l Priority - Priority of the client

l Parallelism - Number of jobs that can run in parallel on this client

l Contact - Text string of information identifying the client object's administrator

l Client Identifier - Unique identifier for the client instance

l Archive Services - Indicates if archive services are available for the client

l Remote Access - List of remote users permitted to recover files from the client

l Index Path - Path to the client's index directory on the server. The path is either anabsolute path or NULL. If NULL, the index resides in the index/clientnamesubdirectory of the EMC home directory

l Owner Notification - Notification action used to send status message contents to theclient owner

Reports by System Template

Backup Average Full Details By Client 191

Page 192: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Hard Links - Indicates if hard link processing is enabled on the Windows client

l Short Filenames - Indicates if short file name processing is enabled on the Windowsclient

l BMR - Indicates if Bare Metal Recovery protection is enabled

l BMR Options - List of Bare Metal Recovery options

l Backup Type - Backup client type

l CPUs - Number of processors in the client machine

l Enabler In Use - Indicates if the client is using up a license count

l Licensed Applications - List of licensed applications used by the client

l Licensed PSPs - List of licensed PowerSnap platforms used by the client

l Resource ID - Identifier for the client

l Registration Time - Time of registration

l Last Access Time - Time last accessed

l Password Set Time - Time that the password was set

l Invalid Password Count - Number of invalid password entries

l Compression - Indicates if compression is enabled

l Archive Delete - Indicates if archive deletion is permitted

l Backup Delete - Indicates if backup deletion is permitted

l Locked - Indicates if the client object is locked

l Registration Administrator - Name of the administrator who registered the client

l Option Set - Option set for the client specified on the TSM server

l Aggregation - Indicates if client file aggregation is enabled when backing up

l URL - URL for the web client

l Node Type - Type of client object: Server, Client, NAS

l Password Expiration Period - Number of days after which a password expires

l Keep Mount Point - Indicates if the client can keep mount points during a session

l Max Mount Points Allowed - Maximum number of mount points permitted for a clientin a session

l Auto Filespace Rename - Indicates if TSM prompts the client to rename file spaceswhen the client system upgrades to a client that supports Unicode

l Validate Protocol - Indicates if the client has data validation enabled

l GUID - Globally unique identifier of the client object

l Transaction Group Max - Maximum number of files or directories that can becontained in a transaction group

l Data Read Path - Transfer path when sending data: ANY, LAN, LAN-free

l Data Write Path - Transfer path when receiving data: ANY, LAN, LAN-free

l Session Initiation - Initiator of session: ServerOnly, ClientOrServer

l Client HLA - High-level address of the NAS file server (IP address or domain name)

l Client LLA - Low-level address of the NAS file server (port number)

l Collocation Group Name - Name of the collocation group, if collocation is enabled, forthe client

Reports by System Template

192 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 193: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Proxy Target - Specifies which objects are proxy objects (agents) for other objects

l Compression Location - Location of data compression

l Proxy Node - Proxy object for deduplication if applicable

l Deduplication Location - Location of data deduplication

l Client Direct - Client writes directly to the Data Domain/AFTD using DDBoost areenabled and no writes are made to the storage node.

l NAS File Access User- NAS file access user name

l Storage Replication Policy - Storage replication policy name

l NAS Management User - NAS management user name

l NAS Device Manager - NAS device management user name

Backup Client De-Dupe Rate DistributionReturns the backup client deduplication rate distribution in a column chart. Uses datafrom the Backup Job Details and Last Backup Details data sources.

l Range -

l Count -

Backup Client De-Dupe RatiosReturns the backup client deduplication ratios in a table report. Uses data from theBackup Job Details and Last Backup Details data sources.

l Client - Name of the client backed up

l Protected - Amount of data on the backup client that is being protected. Forapplications such as NetWorker and NetBackup, this is determined by looking at thelast full backup of the client. For applications like Avamar, the statistics are deriveddirectly from the application

l Avg Daily Change -

l De-Dupe Ratio -

l Change Rate -

l De-Dupe Rate -

Backup Client Size Monthly ComparisonReturns the backup comparison between any two months per client in a table. Uses datafrom the Total Size, Report Times, and Total Size Scanned data sources.

l Client - Name of the client backed up

l Total Data Protected First Month - Total size of the data protected beforededuplication for the first month (in GB)

l Total Data Protected Second Month - Total size of the data protected beforededuplication for the second month (in GB)

l Total Data Backed Up First Month - Amount of data backed up for the first month (inGB)

l Total Data Backed Up Second Month - Amount of data backed up for the secondmonth (in GB)

l Backed Up Change - Difference between how much data was backed up between thefirst month and the second month (in GB)

Reports by System Template

Backup Client De-Dupe Rate Distribution 193

Page 194: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Protected Change - Difference between how much data was protected between thefirst month and the second month (in GB)

l Backed Up - Change - Percentage change between how much data was backed upbetween the first month and the second month (in GB)

l Protected - Change - Percentage change between how much data was protected (inGB) between the first month and the second month

l 1st Month - Earliest start date for the first month

l 2nd Month - End date for the second month

Backup Client SummarySummary of the backup client in a table report. Uses data from the Backup Job Details,Backup Job Details for Clients with Failures, Backup Job Status, and Backup Statisticsdata sources.

l Missed - Count of the number of clients with all missed jobs on them

l Completed - Count of the total number of clients on the backup server that has atleast one job on it

l Partial - Indicates that some jobs succeeded and some failed during the reportingperiod. Partial, which indicates jobs with different status or mixed status values. Thestatus could be Successful, Failure, or Missed. The Client Summary report will list aclient as a Partial client when it has a mix of failed, successful, and missed jobswithin the time period.

l Failed - Count of the total number of clients after deduplication with only failed jobson them

l Successful - Indicates that all jobs processed on the client during the reporting periodwere successful

l Success Rate - Success rate of clients on the backup server over the reporting period

l Active - Count of the number of clients with active jobs running

Backup Clients Not Backed UpReturns the clients that were not backed up in a table report. Uses data from the BackupClient Config, Num Jobs, and Virtual Hosts data sources. Use this report to identifyscheduling problems on the backup application or clients that continue to have repetitivefailures.

l Client - Name of the client on the backup server

Backup Cumulative Number Of Completed JobsReturns the backup cumulative number of completed jobs in an area chart report. Usesdata from the Num Jobs data source.

l Jobs - Number of jobs that have completed

Backup Cumulative Size Of Completed JobsReturns the backup cumulative size of completed jobs in an area chart report. Uses datafrom the Total Size data source.

l Size - Total amount of data backed up (in GB)

Reports by System Template

194 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 195: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Data Domain Clone DetailsDrill down report from the Backup Jobs Details template that returns clone job details fora specific backup job in a table report. Uses data from the Backup Data Domain CloneDetails data source.

l Server - Name of the backup server

l Clone ID - Identifier for the clone job

l Size Scanned - Total size of the data scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size in bytes

Backup Device Configuration for PoolReturns backup device configuration for pool in a table report. Uses data from the BackupPool Device Config Mapping data source.

l Server - Name of the backup server

l Sub Name - Identifier for the storage array

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device in the backup software

l Pool - Name of the pool

l Device Alias - Alias for the device, if available

l Device Path - Operating system path to the device

l Device Class - Class of the device: Disk, Tape

l Jukebox - Name of the jukebox in which the device is located

l Device Type - Type of device. For example, DLT or Ultrium-2

l Read Only - Indicates if the drive is configured as read-only: Yes, No

l Hardware Id - Identifier such as the device serial number that uniquely maps it to aphysical device

l Firmware - Firmware version of the device

l Resource ID - Resource identifier for the device

l Media Manager Path - Operating system path the media manager

l Num Target Sessions - Number of target sessions

l Max Sessions - Maximum number of sessions

l Send/Receive Timeout - Send and receive timeout

l Num Retries - Number of retries

l Network Retry Interval - Network failure retry interval (in seconds)

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

l Max Errors - Max errors

Reports by System Template

Backup Data Domain Clone Details 195

Page 196: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Device Access - Device access information

Backup Failed ClientsReturns information on all clients for which backups failed in a table report. Uses datafrom the Backup Job Details for Clients with Failures data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server to which a Job was backed up (NetBackuponly)

l Storage Unit - Name of the storage unit to which the Job was backed up

l Session - Number of sessions simultaneously accessing the device

l Proxy - Proxy backup host

l Group - Name of the group/policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Error Code - Error code (if available) from the backup application

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size Scanned - Total size of the data scanned (in MB)

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

Reports by System Template

196 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 197: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the backup went into the backup applications queue

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size in bytes

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Job size in bytes

l Archive Flag - If selected, indicates that the backup Job is an archive Job

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that tool place before the Job completed (NetBackup only)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

Reports by System Template

Backup Failed Clients 197

Page 198: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Failed GroupsReturns information on all groups for which backups failed in a table report. Uses datafrom the Backup Group Details data source.

l Server - Name of the server on which the group runs

l Group - Name of the group that has run

l Start Time - Time the group started

l End Time - Time the group ended

l Status - Status of the group: Success, Fail

l Application Status - Status of the Backup Exec group: Cancelled, Completed WithExceptions, Missed (Backup Exec only)

l Backup Application - Name of the backup application performing the backup

l Group Job ID - ID of the group job instance

Backup Failed JobsReturns a list of all failed jobs on a backup server in a table report. Uses data from theBackup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

Reports by System Template

198 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 199: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Backup Set - Name of the backup set associated with the job (CommVault only)

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Error Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (EMC Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of thebackupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

Reports by System Template

Backup Failed Jobs 199

Page 200: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (SymantecNetBackup only)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Reports by System Template

200 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 201: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Failed Jobs For ClientDrill down report for Backup Top 10 Most Unreliable Clients that returns all of the failedjobs on a client in a table report. Uses date from the Backup Job Details report.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Session - session associated with the job

l Proxy - Proxy backup host

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (EMC Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Expiry Date - Date that a Job will expire

Reports by System Template

Backup Failed Jobs For Client 201

Page 202: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (SymantecNetBackup only)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Failed Jobs for Client for rulesetReport for the Many backups failed rule that returns details for the backup failed jobs forclient in a table report. Uses data from the Num Jobs, Report Times, and User Input datasources.

l Server - Name of the backup server on which the Job took place

l Client - Name of the client on which the Job took place

l Num Fails - Number of jobs that have failed

l Alert - Identifier of the alert

Reports by System Template

202 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 203: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Failed Jobs for rulesetReport for Many backups failed rule that returns details on backup failed jobs in a tablereport. Uses data from the Backup Job Details, Report Times, and User Input datasources.

l Num Failed - Number of jobs that have failed

l Alert - Identifier of the alert

Backup Full History of Specific JobReturns the details of all known backups of the selected client and Job in an table report.Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Session - session associated with the job

l Proxy - Proxy backup host

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (EMC Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Files - Number of files backed up

l Files Scanned - Number of files scanned

l Queued - Time the Job started queuing

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Started - Time the Job started writing

Reports by System Template

Backup Failed Jobs for ruleset 203

Page 204: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Finished - Time the Job completed

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Expires - Date that a Job will expire

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (SymantecNetBackup only)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Group Configuration for PoolReturns the backup group configuration for pool details in a table report. Uses data fromthe Backup Pool Group Config Mapping data source.

l Server - Hostname of backup server on which the pool is located

Reports by System Template

204 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 205: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Sub Name - Name of TSM server instance

l Group - Name of the group associated with the schedule

l Domain Name - Name of the domain associated with the group

l Proxy - Proxy backup host

l Pool - Pool of the volume that is required

l Policy Type - Type of backup for the group. For example, full or incremental

l Policy Action - Policy action

l Policy Description - Policy description

l Preceding Action - Preceding action

l Offhost Backup Method - Method used for performing offhost backups

l Active - Identifies if the backup pool client is active

l Effective Date - Date and time that the policy went active

l Storage Unit - Storage unit the policy is configured to use

l Volume Pool - Volume pool the policy is configured to use

l Checkpoint Restart - Indicates if checkpoints are configured on this policy

l Checkpoint interval - Checkpoint interval that is used if checkpoint restarts areenabled

l Limit Jobs Per Policy - Indicates if the policy is limited to a number of Jobs

l Max Jobs Per Policy - If Limit Jobs Per Policy is enabled, the value of the limit

l Job Priority - Priority that is assigned to Jobs in this policy

l Frozen Image Clients - Indicates if Frozen Image backups are configured in this policy

l Remote Filesystems - Indicates if Remote File systems are backed up by this policy

l Cross Mount Points - Indicates if the backups cross mount points

l True Image Restore Information - Indicates if True Image Restore (TIR) information isgathered by this policy

l True Image Move Detection - Indicates if True Image Restore information is gatheredwith move detection

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

l File Restore Raw - Indicates if the File Restore Raw flag is set

l Disaster Recovery Info - Indicates if Disaster Recovery Information is gathered

l Bare Metal Restore Info - Indicates if Bare Metal Restore Information is gathered

l Multiple Data Streams - Indicates if the policy implements multiple data streams

l Keyword Phrase - Keyword phrase associated with this policy

l Block Level Incremental - Indicates if block level incremental backups are enabled

l Snapshot Backup - Indicates if snapshot backups are enabled

l Retain Snapshots - Indicates if snapshots will be retained

l Snapshot Method - Method for performing snapshots

l Offhost Backup - Indicates if Offhost backup is enabled

l Use Alternate Client - Indicates if an Alternate client is used

Reports by System Template

Backup Group Configuration for Pool 205

Page 206: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Alternate Client Name - Alternate client that is used

l Use Data Mover - Indicates if a data mover is used

l Data Mover Type - Data mover type that is used

l Resource ID - Resource ID of the group

l Auto Restart - Indicates if the group is configured for automatic restarts

l Scheduled Start - Time of day that the group starts

l Parallelism - Parallelism of the group

l Client Retries - Number of retries that clients attempt

l Level - Level of backup for the group

l Schedule - Schedule used by the group

l Num Days Inactive Backup Retained - Number of days to retain inactive backup data

l Num Days Inactive Archive Retained - Number of days to retain inactive archive data

l Interval - Group run interval

l Restart Window - Group restart window

l Forced Incremental - Indicates if forced incremental backup is enabled

l Clones - Indicates if backup is cloned automatically

l Clone Pool - Pool for backup clones

l Success Threshold - Backup status considered as successful

l Inactivity Threshold - File inactivity threshold

l Inactivity Alert Threshold - File inactivity alert threshold

l Snapshot Policy - Snapshot policy name

l Snapshot Pool - Snapshot pool name

l Specification Type - Type of backup specification

Backup Group Job Status DetailsReturns group status details along with information about the jobs associated with thegroups in a table. Because the Backup Group Job Status Details report uses the Group JobId field to map groups and jobs, the Backup Group Job Status Details report works for anymodule that populates the Group Job Id field. Uses data from the Backup Group Status,Backup Job Details, Backup Group Config, and Report Times data sources.

l Server- Name of the backup server

l Group - Name of group associated with schedule

l Status - Status of the group: started, completed, never run, cloning, queued

l Level - Overall level of the jobs backed up in the group. Full, Incr, Manual,Cumulative, Incr, Differential Incr, Mixed

l Size - Amount of data backed up (in MB)

l Start Time- Earliest Job start time for job backed up in the group

l End Time - Latest job end time for job backed up in the group

l Expiry Date - Latest expiry time for jobs backed up in the group

l Group Job Id - ID of the group job instance

l Retention - Retention days

Reports by System Template

206 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 207: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Client - Name of the Clients backed up

l Job -Name of the jobs backed up

l Group Start Time - Time the group started

l Group End Time - Time the group ended

l Group Status - Status of the Backup Exec group: Cancelled, Completed WithExceptions, Missed (Backup Exec only)

l Group Duration - Time the group took to complete the job

l Schedule - Name of the schedule under which the Job is running

l Remaining Time to Expire - Difference between the expiry date and the report run endtime

Backup Group StatusReturns the details of all backup groups in a table report. Uses data from the BackupGroup Status data source.

l Server - Name of the backup server on which the group is located

l Group - Name of the group in which the backup job occurred

l Start Time - Last start time of the group. This value is not set if the group has neverran before

l End Time - Last end time of the group. This value is not set if the group is running orhas never run

l Status - Status of the group: Never run, Started, Cloning, Completed, Queued

l Backup Application - Name of the backup application that performed the backup. Forexample, NetWorker

l Group Job ID - ID of the group job instance

Backup Group SummarySummary of the backup group in a table report. Uses data from the Backup Group Details,Backup Group Status, and Total Size data sources.

l Completed -

l Successful - Number of successful jobs

l Failed - Number of failed jobs

l Active - Number of active jobs

l Total Size - Total amount of data backed up (in GB)

l Success Rate - Success rate of backups over the reporting period

Backup Hourly Job StatusReturns the backup hourly job status in a column chart. Uses data from the Num Jobsdata source.

l Successful - Number of successful jobs

l Failed - Number of failed jobs

Reports by System Template

Backup Group Status 207

Page 208: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Job AttemptsReturns details of the backup job attempts in a table report. Uses data from the BackupJob Attempts and Backup Job Details data sources.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job (CommVault only)

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Error Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (EMC Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data that was backed up (in MB)

l Files - Amount of data backed up (in MB)

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Ran In Window -

l Started In Window -

l Finished In Window -

l Time In Window -

l Time Out Of Window -

l Out Of Window Reason -

l Trailing Space In Window -

l Leading Space In Window -

l Queued - Time the Job started queuing

Reports by System Template

208 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 209: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Started - Time the Job started writing

l Finished - Time the backup went into the backup applications ended

l Duration - Time the Job completed

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Retention -

l Expires -

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (SymantecNetBackup only)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level -

l Valid Retention -

l Compliant -

l Policy Used -

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Reports by System Template

Backup Job Attempts 209

Page 210: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Job Attempts for Specific JobReturns details of the backup job attempts for specific job in a table report. Uses datafrom the Backup Job Attempts data source.

l Id - Identifier that uniquely identifies this Job

l Job Id - Unique ID of the backup Job

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of the server instance, if applicable

l Attempt - Attempt number (first, second, and others)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Media Server - Name of the Media Server on which the backup or archive occurred

l PID - Identifier of the underlying system process

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Description - Status description

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Num Files - Number of files backed up

l Started - Time the Job started writing

l Finished - Time the Job completed

Backup Job Change Ratio AggregateReturns the ratio of data backed up to data protected and aggregated over all of thebackup clients in a table report. Uses data from the Last Backup Details, Num Jobs, andTotal Size (MB) data sources.

l Protected - Amount of data on the backup client that is being protected. Forapplications such as NetWorker and NetBackup, this is determined by looking at thelast full backup of the client. For applications like Avamar, the statistics are deriveddirectly from the application.

l Last Incremental Size - Amount of data that was backed up on the last incrementalbackup of the backup client. For Avamar and TSM, this value is taken from the lastbackup of the client, as both products perform only incremental backups.

l Last Incremental Rate - Ratio of the last incremental size to the amount of data that isprotected. In environments in which very little data changes, this value would beexpected to be low. For applications such as NetWorker, this value would typically bein the range of 10–15%. For applications such as Avamar, this value would beexpected to be significantly lower.

l Average Incremental Size - Calculated by analyzing all of the incremental backupsthat have occurred on the client over the reporting period, and dividing the total databacked up by the number of the backups that have taken place. This value allows youto see if there is a significant discrepancy between the last incremental backup andthe overall average.

l Average Incremental Rate - Ratio of the average incremental size to the amount ofdata that is protected. For backup applications such as NetWorker, this would

Reports by System Template

210 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 211: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

typically be in the range of 10–15%. For applications such as Avamar, this valuewould be expected to be significantly lower.

l Total Size - Total amount of data that has been backed up on this client over thereporting period. This includes full backups and incrementals.

l Size Rate - Ratio of the total amount of data that has been backed up to the amountof data that has been protected. For applications such as NetWorker and NetBackup,this value would be expected to be a multiple of the amount of data protected. Forbackup applications such as Avamar, this value should be a significantly smallernumber than the amount of data protected.

Backup Job Change RatiosReturns the ratio of data backed up to data protected in a table report. This ratio iscalculated for each backup job on the client selected from the configuration tree. Usesdata from the Last Backup Details, Num Jobs, and Total Size (MB) data sources.

l Protected - Amount of data on the backup client that is being protected. Forapplications such as NetWorker and NetBackup, this is determined by looking at thelast full backup of the client. For applications like Avamar, the statistics are deriveddirectly from the application.

l Last Incremental Size - Amount of data that was backed up on the last incrementalbackup of the backup client. For Avamar and TSM, this value is taken from the lastbackup of the client, as both products perform only incremental backups.

l Last Incremental Rate - Ratio of the last incremental size to the amount of data that isprotected. In environments in which very little data changes, this value would beexpected to be low. For applications such as NetWorker, this value would typically bein the range of 10–15%. For applications such as Avamar, this value would beexpected to be significantly lower.

l Average Incremental Size - Calculated by analyzing all of the incremental backupsthat have occurred on the client over the reporting period, and dividing the total databacked up by the number of the backups that have taken place. This value allows youto see if there is a significant discrepancy between the last incremental backup andthe overall average.

l Average Incremental Rate - Ratio of the average incremental size to the amount ofdata that is protected. For backup applications such as NetWorker, this wouldtypically be in the range of 10–15%. For applications such as Avamar, this valuewould be expected to be significantly lower.

l Total Size - Total amount of data that has been backed up on this client over thereporting period. This includes full backups and incrementals.

l Size Rate - Ratio of the total amount of data that has been backed up to the amountof data that has been protected. For applications such as NetWorker and NetBackup,this value would be expected to be a multiple of the amount of data protected. Forbackup applications such as Avamar, this value should be a significantly smallernumber than the amount of data protected.

Backup Job Change Ratios By ClientReturns the ratio of data backed up to data protected by client in a table report. This ratiois calculated for each backup job on the client selected from the configuration tree. Usesdata from the Last Backup Details, Num Jobs, and Total Size (MB) data sources.

l Protected - Amount of data on the backup client that is being protected. Forapplications such as NetWorker and NetBackup, this is determined by looking at the

Reports by System Template

Backup Job Change Ratios 211

Page 212: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

last full backup of the client. For applications like Avamar, the statistics are deriveddirectly from the application.

l Last Incremental Size - Amount of data that was backed up on the last incrementalbackup of the backup client. For Avamar and TSM, this value is taken from the lastbackup of the client, as both products perform only incremental backups.

l Last Incremental Rate - Ratio of the last incremental size to the amount of data that isprotected. In environments in which very little data changes, this value would beexpected to be low. For applications such as NetWorker, this value would typically bein the range of 10–15%. For applications such as Avamar, this value would beexpected to be significantly lower.

l Average Incremental Size - Calculated by analyzing all of the incremental backupsthat have occurred on the client over the reporting period, and dividing the total databacked up by the number of the backups that have taken place. This value allows youto see if there is a significant discrepancy between the last incremental backup andthe overall average.

l Average Incremental Rate - Ratio of the average incremental size to the amount ofdata that is protected. For backup applications such as NetWorker, this wouldtypically be in the range of 10–15%. For applications such as Avamar, this valuewould be expected to be significantly lower.

l Total Size - Total amount of data that has been backed up on this client over thereporting period. This includes full backups and incrementals.

l Size Rate - Ratio of the total amount of data that has been backed up to the amountof data that has been protected. For applications such as NetWorker and NetBackup,this value would be expected to be a multiple of the amount of data protected. Forbackup applications such as Avamar, this value should be a significantly smallernumber than the amount of data protected.

Backup Job Change Ratios for ClientReturns the ratio of data backed up to data protected for client in a table report. This ratiois calculated for each backup job on the client selected from the configuration tree. Usesdata from the Last Backup Details, Num Jobs, and Total Size (MB) data sources.

l Protected - Amount of data on the backup client that is being protected. Forapplications such as NetWorker and NetBackup, this is determined by looking at thelast full backup of the client. For applications like Avamar, the statistics are deriveddirectly from the application.

l Last Incremental Size - Amount of data that was backed up on the last incrementalbackup of the backup client. For Avamar and TSM, this value is taken from the lastbackup of the client, as both products perform only incremental backups.

l Last Incremental Rate - Ratio of the last incremental size to the amount of data that isprotected. In environments in which very little data changes, this value would beexpected to be low. For applications such as NetWorker, this value would typically bein the range of 10–15%. For applications such as Avamar, this value would beexpected to be significantly lower.

l Average Incremental Size - Calculated by analyzing all of the incremental backupsthat have occurred on the client over the reporting period, and dividing the total databacked up by the number of the backups that have taken place. This value allows youto see if there is a significant discrepancy between the last incremental backup andthe overall average.

l Average Incremental Rate - Ratio of the average incremental size to the amount ofdata that is protected. For backup applications such as NetWorker, this would

Reports by System Template

212 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 213: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

typically be in the range of 10–15%. For applications such as Avamar, this valuewould be expected to be significantly lower.

l Total Size - Total amount of data that has been backed up on this client over thereporting period. This includes full backups and incrementals.

l Size Rate - Ratio of the total amount of data that has been backed up to the amountof data that has been protected. For applications such as NetWorker and NetBackup,this value would be expected to be a multiple of the amount of data protected. Forbackup applications such as Avamar, this value should be a significantly smallernumber than the amount of data protected.

Backup Job Configuration for PoolReturns the backup job configuration for pool details in a table report. Uses data from theBackup Pool Job Config Mapping and Backup Server Mapping data sources.

l Server - Hostname of backup server on which the pool is located

l Sub Name - Name of TSM server instance

l Pool - Pool of the volume that is required

l Client - Clients that are required to enter into the backup pool

l Job - Jobs that are allowed in the backup pool

l Group - Name of the group or policy in which the backup job occurred

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Schedule - Name of the backup schedule

l Resource ID - Identifier for the client

Backup Job Deduplication Ratio for ClientReturns the ratio of data deduplicated against data backed up over the time period in atable report. Uses data from the Backup Job Details data source.

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Data Protected -

l Data Transferred -

l Change Rate -

l De-Dupe Rate -

l De-Dupe Ratio -

Backup Job Details for Specific VolumeReturns backup job details with expiry of greater than or equal to eight years in a tablereport. Uses data from the Backup Job Details with Volume data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

Reports by System Template

Backup Job Configuration for Pool 213

Page 214: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of the TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Session - session associated with the job

l Proxy - Proxy backup host

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application (EMC Avamar only)

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size in bytes

l Storage Units - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Expiry Date - Date that a Job will expire

l Archive Flag - Indicates if the job is a backup or archive job

l Backup Application - Name of the backup application that backed up the Job. Forexample, EMC NetWorker, Symantec NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (SymantecNetBackup only)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

Reports by System Template

214 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 215: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Volume Id - Identifier for the volume

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Retention - Retention days

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Job Device MappingReturns the backup job device mapping in a table report. Uses data from the Backup JobDevice Mapping data source.

l Server - Name of the backup server

l Sub Name - Name of the server instance, if applicable

l Device Host - Name of the host to which the device is attached

l Group - Name of the group on the backup server

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Storage Node - Name of the storage object

l Device Name - Name of the device in the backup software

Backup Job Error DetailsReturns details of all job errors on a backup server or client in a table report. Uses datafrom the Backup Job Details and Backup Job Errors data sources.

l Id - Identifier that uniquely identifies this Job

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Group - Name of the group or policy in which the Job took place

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Severity - Severity of the failure

l Err Code - Error code from the backup application, if available

l Error - Error string

l Error Code Summary - Summary of the error codes associated with the backup

Reports by System Template

Backup Job Device Mapping 215

Page 216: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Time - Time the failure took place

l Schedule - Name of the schedule under which the Job ran

l Queue Start - Time the Job started queuing

Backup Job Error Details for Specific JobReturns details of all job errors for a specific job in a table report. Uses data from theBackup Job Errors data source.

l Id - Identifier that uniquely identifies this Job

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM server instance

l Client - Name of the client on which the Job failed

l Severity - Severity of the failure

l Err Code - Error code from the backup application, if available

l Error - Error string

l Time - Time the failure took place

Backup Job Error DistributionReturns the backup job error distribution details in a table report. Uses data from theNum Jobs data source.

l Num Jobs - Number of jobs that have completed

l Err Code - Error code from the backup application, if available

Backup Job Error SummarySummary of the backup job error details in a pie chart. Uses data from the Num Jobs datasource.

l Num Jobs - Number of jobs that have completed

l Err Code - Error code from the backup application, if available

Backup Job Media DetailsReturns a list of volumes that a backup was written to in a table report. Uses data fromthe Backup Job Details with Volume and Backup Job Media data sources.

l Server - Name of the backup server on which the Job took place

l Volume Id - Unique identifier of the volume to which the backup Job was written

l State - State of the media

l Pool - Backup pool in which the backup Job belongs

l Online - Indicates if the volume is online

l Jukebox - Jukebox in which the volume resides

l Slot - Jukebox slot occupied by the volume

l Expiry Date - Date the volume is due to expire

Reports by System Template

216 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 217: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Job Status By ServerReturns backup job status by server details in a table report. Uses data from the NumJobs and Num Jobs In Event State By Server data sources.

l Server - Name of the backup server on which the Job took place

l Succeeded - Number of jobs that were successful over the reporting period

l State -

l Failed - Time the backup went into the backup applications queue

l Queued - Time the backup went into the backup applications queue

l Running -

Backup Job SummarySummary of all jobs that were processed on a backup server or client in a table report.Uses data from the Backup Statistics and Num Jobs In Event State data sources.

l Completed - Total number of jobs that have completed over the reporting period

l Succeeded - Number of jobs that were successful over the reporting period

l Failed - Number of jobs that failed over the reporting period

l Missed - Number of jobs that were missed over the reporting period (TSM only)

l Active - Shows jobs which meet the following conditions:

n Has an end time of the end of Unix time (the year 2038) - hi is how we track thelatest status of a job

n Was queued between the start of the report window and the end of the reportwindow

n Is in one of the following states: started, queued, severed, restarted, future, failed- no restart, pending, in progress

l Size - Amount of data that was backed up (in GB)

l Success Rate - Success rate of backups over the reporting period

Backup Job Summary for Group RunSummary of jobs that have run during the group run in a table report. Uses data from theBackup Statistics data source.

l Completed - Total number of jobs that have completed over the reporting period

l Succeeded - Number of jobs that were successful over the reporting period

l Failed - Number of jobs that failed over the reporting period

l Total Size - Amount of data that was backed up (in GB)

l Success Rate - Success rate of backups over the reporting period

Backup Last 5 Runs of JobReturns details about the last five runs of the same client and selected job in a tablereport. Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

Reports by System Template

Backup Job Status By Server 217

Page 218: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (EMC Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Expiry Date - Date that a Job will expire

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (SymantecNetBackup only)

l Number of Copies - Number of inline copies, if any

Reports by System Template

218 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 219: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Last n Runs of ClientReturns details of last jobs backup jobs in a table report. Uses data from the Backup JobDetails data source.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Group - Name of the group or policy in which the Job took place

l Domain Name - Name of the domain associated with the group

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Media Server - Name of the Media Server on which the backup or archive occurred

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l App Type - Name of the TDP that was used to perform the backup

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

Reports by System Template

Backup Last n Runs of Client 219

Page 220: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Bytes Modified Not Sent - (in bytes)

l Bytes Modified Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Files Scanned - Number of files scanned

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

Reports by System Template

220 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 221: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the

l Size Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Total number of secondary copies taken, if any

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies combines (including primary copy)

l Job ID 2 - NetBackup Job ID in the activity log

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Is Snap - If job is a snapshot backup; field hidden by default

l Snap Target - Snap target/replication target; field hidden by default

l Snap Target Platform - Snap target platform type; field hidden by default

l Snap Policy - Snap replication policy name; field hidden by default

l Snap Creation Type - Snap creation type, either Managed or Discovered; field hiddenby default

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Last n Successful Runs of ClientReturns details of last jobs successful backup jobs in a table report. Uses data from theBackup Job Details data source.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Domain Name - Name of the domain

l Backup Set - Name of the backup set associated with the job

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

Reports by System Template

Backup Last n Successful Runs of Client 221

Page 222: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Job - Name of the Job backed up

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Statu Status Code - Status code of the job from the backup applications CodeSummary - Status code summary from the job

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Files Scanned - Number of files scanned

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

Reports by System Template

222 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 223: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Total number of secondary copies taken, if any

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies combines (including primary copy)

l Job ID 2 - NetBackup Job ID in the activity log

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Is Snap - If job is a snapshot backup; field hidden by default

l Snap Target - Snap target/replication target; field hidden by default

l Snap Target Platform - Snap target platform type; field hidden by default

l Snap Policy - Snap replication policy name; field hidden by default

l Snap Creation Type - Snap creation type, either Managed or Discovered; field hiddenby default

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Last Successful Full Run of ClientReturns the backup last successful full run of client in a table report. Uses data from theBackup Job Details data source.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

Reports by System Template

Backup Last Successful Full Run of Client 223

Page 224: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Group - Name of the group or policy in which the Job took place

l Media Server - Name of the Media Server on which the backup or archive occurred

l Domain Name - Name of the domain

l Backup Set - Name of the backup set associated with the job

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l App Type - Name of the TDP that was used to perform the backup

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Job - Name of the Job backed up

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

Reports by System Template

224 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 225: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Files Scanned - Number of files scanned

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Total number of secondary copies taken, if any

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies combines (including primary copy)

l Job ID 2 - NetBackup Job ID in the activity log

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

Reports by System Template

Backup Last Successful Full Run of Client 225

Page 226: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Last Successful Run of ClientReturns the backup last successful run of client details in a table report. Uses data fromthe Backup Job Details data source.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Domain Name - Name of the domain

l Backup Set - Name of the backup set associated with the job

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l App Type - Name of the TDP that was used to perform the backup

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Job - Name of the Job backed up

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - AmAmount of data backed up (in MB)

l Num Files - Number of files backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when In Window is false. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

Reports by System Template

226 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 227: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Average File Size - Average size of each file

l Retention - Retention days

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Files Scanned - Number of files scanned

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Total number of secondary copies taken, if any

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies combines (including primary copy)

l Job ID 2 - NetBackup Job ID in the activity log

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

Reports by System Template

Backup Last Successful Run of Client 227

Page 228: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Policy Used - Indicates if a data protection policy applies to this backup job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Last Successful Run of JobReturns the backup last successful run of jobs in a table report. Uses data from theBackup Job Details data sources.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (EMC Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

Reports by System Template

228 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 229: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Expiry Date - Date that a Job will expire

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (SymantecNetBackup only)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup; field hidden by default

l Snap Target - Snap target/replication target; field hidden by default

l Snap Target Platform - Snap target platform type; field hidden by default

l Snap Policy - Snap replication policy name; field hidden by default

l Snap Creation Type - Snap creation type, either Managed or Discovered; field hiddenby default

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Reports by System Template

Backup Last Successful Run of Job 229

Page 230: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Missed ClientsReturns all clients for which backups were missed during the reporting period in a tablereport. Uses data from the Backup Job Details data source.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Ran In Window -

l Started In Window -

l Finished In Window -

l Time In Window -

l Time Out Of Window -

l Out Of Window Reason -

l Trailing Space In Window -

l Leading Space In Window -

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Retention -

l Valid Level -

l Valid Retention -

l Compliant -

l Policy Used -

Backup Missed JobsReturns details of backup jobs that were missed in a table report. Uses data from theBackup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

Reports by System Template

230 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 231: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job (CommVault only)

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (EMC Avamar only

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Ran In Window -

l Started In Window -

l Finished In Window -

l Time In Window -

l Time Out Of Window -

l Out Of Window Reason -

l Trailing Space In Window -

l Leading Space In Window -

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Retention -

Reports by System Template

Backup Missed Jobs 231

Page 232: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (SymantecNetBackup only)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level -

l Valid Retention -

l Compliant -

l Policy Used -

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Backup Open FilesReturns information about files that were not successfully backed up during a backup ofa Job in a table report. Files may have been missed because they were in use by anotherapplication at backup time. Uses data from the Open Files data source.

l Job Id - Unique identifier of the backup Job. Matches the ID column in Backup JobDetails

l Server - Name of the backup server

Reports by System Template

232 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 233: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Sub Name - Name of TSM server instance

l Client - Name of the client on the backup server

l File Name - Name of the filename that could not be backed up

l Error Message - Reason why files were not backed up

l Time - Start time of the Job associated with the file that could not be backed up

Backup Open Files for Specific JobReturns information about files that were not successfully backed up during a backup ofa Job in a table report. Files may have been missed because they were in use by anotherapplication at backup time. Uses data from the Open Files data source.

l Job Id - Unique identifier of the backup Job. Matches the ID column in Backup JobDetails

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Client - Name of the client on the backup server

l File Name - Name of the filename that could not be backed up

l Error Message - Reason why files were not backed up

l Time - Start time of the Job associated with the file that could not be backed up

Backup Partial ClientsReturns information on all clients for which backups were partially successful during thereporting period in a table report. A client is partially successful if it had at least onefailed Job and one successful job. Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

Reports by System Template

Backup Open Files for Specific Job 233

Page 234: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Status Code - Status code of the job from the backup application (EMC Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Expiry Date - Date that a Job will expire

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (SymantecNetBackup only)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

Reports by System Template

234 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 235: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Partial GroupsReturns information on all the backup clients for which backup groups were partiallysuccessful during the reporting period in a table report. Uses data from the Backup GroupDetails data source.

l Server - Name of the server on which the group runs

l Group - Name of the group that has run

l Session - Number of sessions simultaneously accessing the device

l Start Time - Time the group started

l End Time - Time the group ended

l Status - Status of the group: Success, Fail

l Application Status - Status of the Backup Exec group: Cancelled, Completed WithExceptions, Missed (Backup Exec only)

l Backup Application - Name of the backup application performing the backup

l Group Job ID - ID of the group job instance

Backup Problem ClientsReturns details of the backup problem clients in a table report. Uses data from theBackup Statistics data source.

l Client - Name of the client on the backup server

l Failing -

l Slow -

l Long-running -

l Large -

l Status -

Backup Protected versus Avg IncrementalReturns the backup protected versus average incremental details in a column chart. Usesdata from the Last Backup Details, Num Jobs, and Total Size (MB) data sources.

l Protected - Amount of data on the backup client that is being protected. Forapplications such as NetWorker and NetBackup, this is determined by looking at thelast full backup of the client. For applications like Avamar, the statistics are deriveddirectly from the application.

l Average Incremental Size - Average incremental size (in MB)

Reports by System Template

Backup Partial Groups 235

Page 236: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Protected versus Backed UpReturns the backup protected versus backed up details in a column chart. Uses data fromthe Last Backup Details, Num Jobs, and Total Size (MB) data sources.

l Protected - Amount of data on the backup client that is being protected. Forapplications such as NetWorker and NetBackup, this is determined by looking at thelast full backup of the client. For applications like Avamar, the statistics are deriveddirectly from the application.

l Total Size - Amount of data backed up (in MB)

Backup Report CardReturns information about each client that was backed up over the reporting period andthe number of successful and unsuccessful jobs on a daily basis in a report card. Usesdata from the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

l Client - Name of the client on the backup server

l Status - Indicates if the backup completed successfully

Use this report to easily identify clients that have repetitive failures, or more importantly,clients that have not been backed up at all. For each day in the specified reportingperiod, a cell displays the backup status of each client:

l If the cell for a client is completely green, all backups were successful for that clienton that day.

l If the cell is completely red, all backups failed for that client on that day.

l If there is a mix of red and green, the proportion represents the percentage ofbackups that failed on that client on that day.

l If a cell is white, no backups occurred for that client on that day.

Backup Replication Sync Times by ClientReturns the time difference between run of latest backup jobs and corresponding clonedjob per clients in a table. Uses data from the Backup Job Details and Clone Job Detailsdata sources.

l Client - Name of the Client the backup job took place on

l Job - Name of the backup job

l Last Successful Backup Time - The end time of the job

l Replicate Client - Name of the client the clone job took place on

l Last Successful Clone Time - The corresponding clone job end time

l Time out of Sync - Duration calculated as the difference between the Last SuccessfulBackup Time and Last Successful Clone Time. This field is populated only if the cloneis out of sync with the backup.

Backup Restore DetailsReturns the details of all restores that have been processed in a table report. Uses datafrom the Restore Details data source.

l Id - Unique identifier for the restore

Reports by System Template

236 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 237: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server onwhich the job ran

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Media Server - Name of the Media Server to which the Job was backed up

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the restore job

l Status - Status of the restore: Success, Failed, Missed (TSM only)

l Err Code - Error code associated with the restore

l Size - Amount of data restored (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to viewthe total number of bytes that have been restored

l Size Scanned - Total size of the data scanned (in MB)

l Size Scanned Offset - Number of bytes that must be added to the Size Scanned fieldto be able to view the total number of bytes that have been scanned

l Num Files - Number of files restored

l Backup Time - Time at which the data being restored was originally backed up

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieveoperation and not a restore operation (TSM only)

l Backup Number - Number of the backup that is being restore

l Backup Label - Name of the backup that is being restored

l Recorded Date Time - Timestamp of the restore

l Number Of Files - Number of files restored

l Scanned - Size of the scanned and compressed file (in MB)

l Plugin Name - Plug-in name

l Backup Application - Name of the backup application on which the restore occurred

l Queued - Time the restore started queuing

l Started - Time the restore started reading

l Finished - Time the restore completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Backup Running JobsReturns a list of jobs that are running now in a table report. Uses data from the BackupJob Status data source.

l Job Id - Job ID in the activity log

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Group - Name of the group or policy under which the Job is running

Reports by System Template

Backup Running Jobs 237

Page 238: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Schedule - Name of the schedule under which the Job is running

l Client - Name of the client

l Job - Name of the Job

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the domain associated with the group

l Status - Status of the Job: pending, queued, initializing, started, completed, severed,restarted, in progress, future, failed - no restart

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Error Code - Error code associated with the backup

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started

l End Time - Time the job completed

l Backup Application - Name of the backup application that performed the backup. Forexample, NetWorker

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

Backup Server Error DetailsReturns details on errors and warnings that have occurred on a backup server in a tablereport. Uses data from the Application Errors data source.

l Application Id - Session ID or Process ID that the error is associated with

l Server - Server on which the error occurred

l Sub Name - Name of TSM server instance

l Client - Client on which the error occurred

l Severity - Severity of the message: Severe error, Error, Warning

l Error Code - Error code of the message: message prefix, message number, messagetype

l Error String - Text of the error message

l Type - Type of the event

l Source - Source of the event

l Domain - Avamar domain of the event

l Category - Category of event

l Timestamp - Time the error started

Backup Server Group Client MappingReturns a list of clients that are included in a group in a table report. Uses data from theBackup Server Mapping data source.

l Server - Name of the backup server on which the client is configured

l Client - Name of the client

Reports by System Template

238 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 239: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Group - Name of the group on the backup server

Backup Successful ClientsReturns information on the status of all successfully backed-up clients processed duringthe reporting period in a table report. Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Error Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

Reports by System Template

Backup Successful Clients 239

Page 240: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (SymantecNetBackup only)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies (including primary copy)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

Reports by System Template

240 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 241: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Successful GroupsReturns the backup successful groups in a table report. Uses data from the Backup GroupDetails data source.

l Server - Name of the server on which the group runs

l Group - Name of the group or policy in which the backup job occurred

l Start Time - Time the group started

l End Time - Time the group ended

l Status - Status of the group: Success, Fail

l Application Status - Status of the Backup Exec group: Cancelled, Completed WithExceptions, Missed (Backup Exec only)

l Backup Application - Name of the backup application performing the backup

l Group Job ID - ID of the group job instance

Backup Successful JobsReturns a list of all successful jobs on a backup server in a table report. Uses data fromthe Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server onwhich the Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the media server on which the backup occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

Reports by System Template

Backup Successful Groups 241

Page 242: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (EMC Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

Reports by System Template

242 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 243: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (SymantecNetBackup only)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Reports by System Template

Backup Successful Jobs 243

Page 244: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Successful Jobs with failed SLA for rulesetReturns backup successful jobs with failed SLA details in a table report. Report forBackup succeeded but failed SLA requirements rule. Uses data from the Backup JobDetails data source.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Alert - Identifier of the alert

Backup to Data Domain - Clients with Low Dedup RatioReturns clients ordered by worst dedup ratio value in a table. Uses data from theDeduplication Status data source.

l Client - Name of the Client

l Data Domain Name - Name of the Data Domain associated with the backup

l Pre Deduplication - Size before local compression for client

l Post Deduplication - Size after local compression for client

l Dedup Ratio - Deduplication ratio for client calculated as (Pre Deduplication/PostDeduplication)-1/(Pre Deduplication/Post Deduplication)

Backup Top 10 Largest ClientsReturns the ten clients that have backed up the most amount of data during the reportingperiod in a table report. Uses data from the Backup Statistics data source.

l Client - Name of the client backed up

l Backups - Number of backups that completed

l Size - Amount of data that was backed up (in GB)

l Files - Total number of files that were backed up (millions)

l Share of Total -

Backup Top 10 Least Successful ClientsReturns the backup top ten least successful clients in a table report. Uses data from theNum Jobs data source.

l Client - Name of the client backed up

l Failures -

l Failure Rate -

Backup Top 10 Longest Running ClientsReturns the backup top ten longest running clients in a table report. Uses data from theBackup Statistics data source.

l Share of Total -

l Duration - Total duration of all backup Jobs (in seconds)

Reports by System Template

244 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 245: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Longest Run - Maximum duration of all backup Jobs (in seconds)

Backup Top 10 Most Unreliable ClientsReturns the top ten clients on a backup server or in a group that have failed mostfrequently during the reporting period in a table report. Uses data from the Num Jobs datasource.

l Client - Name of the client backed up

l Failure -

l Share of Total -

Backup Top 10 Smallest ClientsReturns the top ten smallest clients based on the throughput of backup Jobs that haverun on the clients in a table report. Uses data from the Backup Statistics data source.

l Client - Name of the client backed up

l Size - Amount of data that was backed up (in GB)

l Backups - Number of backups that completed

Backup VMs Not Backed UpReturns information on backup Virtual Machines (VMs) that are not backed up in a table.Uses data from the Successful Backup Job Details for Virtual Hosts and Virtual Hosts datasources.

l Client - Name of the VM not backed up

Clients with Low Dedup RatioReturns information on backup to Data Domain clients with low deduplication ratio in atable report. Uses data from the Deduplication Status data source.

Note that the dedup ratio field in this report are based on metrics at the time that thedata was ingested on the Data Domain. It is not possible to report on the physical size offiles being stored on the Data Domain. This is a current limitation within Data Domain.

l Client - Name of the Data Domain

l Pre-Deduplication - Size before local compression for client

l Post-Deduplication - Size after local compression for client

l Dedup Ratio - Deduplication ratio for client calculated as (Pre Deduplication/PostDeduplication)-1/(Pre Deduplication/Post Deduplication)

Clone AttemptsReturns the clone attempt details in a table report. Uses data from the Clone Attemptsand Clone Operations data sources.

l Id - Identifier that uniquely identifies this clone

l Job Id - Identifier for the clone job

l Server - Name of the backup server on which the clone took place

l Sub Name - Name of TSM server instance

l Attempt - Attempt number. For example, first, second, and others

Reports by System Template

Backup Top 10 Most Unreliable Clients 245

Page 246: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Domain Name - Name of the domain associated with the group

l Client - Name of the client on which the clone took place

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the Media Server to which the Job was backed up

l PID - PID of the underlying system process

l Status - Status of the clone: Success, Failed

l Err Code - Error code associated with the clone

l Description - Status description

l Size - Amount of data cloned (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to viewthe total number of bytes that have been cloned

l Num Files - Number of files cloned

l Clone Job Name - Name of the cloned Job

l Owner - Owner of the clone job

l Clone ID - Identifier for the cloned backup Job

l Size Scanned - Size of the files scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Job size in bytes

l Restarted Job - Indicates if the job is a restarted job

l Start Time - Time the Job started writing

l End Time - Time the cloned Job completed

l Backup Application - Name of the backup application that cloned the Job. Forexample, NetWorker, NetBackup

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Clone Attempts for Specific Clone OperationReturns the clone attempt for specific clone operation details in a table report. Uses datafrom the Clone Attempts data source.

l Id - Identifier that uniquely identifies this clone

l Server - Name of the backup server on which the clone took place

l Sub Name - Name of TSM server instance

l Job Id - Identifier for the clone job

l Attempt - Attempt number. For example, first, second, and others

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the Media Server to which the Job was backed up

l PID - PID of the underlying system process

l Status - Status of the clone: Success, Failed

l Err Code - Error code associated with the clone

l Description - Status description

l Size - Amount of data cloned (in MB)

Reports by System Template

246 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 247: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size Offset - Number of bytes that must be added to the Size field to be able to viewthe total number of bytes that have been cloned

l Num Files - Number of files cloned

l Start Time - Time the Job started

l End Time - Time the Job completed

Clone Job Media DetailsDrill down report for Clone Job Details that returns media details for a specific clone job ina table report. Uses data from the Clone Media data source.

l Server - Name of the backup server on which the clone occurred

l Volume ID - Identifier for the volume

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool in which the volume is located

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Expiry Date - Date the volume is due to expire

Clone Job Media Details for Clone OperationReturns details of the media used to back up jobs that have been cloned in a table report.Uses data from the Clone Job Media data source.

l Server - Server which started the clone job

l Volume Id - Identifier for the volume on which the clone job took place

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool associated with the volume

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Expiry Date - Date the volume is due to expire

Clone OperationsReturns clone operation details in a table report. Uses data from the Clone Operationsdata source.

l Id - Identifier that uniquely identifies this clone

l Backup Application - Name of the backup application that cloned the Job. Forexample, NetWorker, NetBackup

l Server - Name of the backup server on which the clone took place

l Sub Name -

l Media Server - Name of the Media Server to which the Job was cloned

l Clone Job Name - Name of the cloned Job

l Client - Name of the client on which the clone took place

Reports by System Template

Clone Job Media Details 247

Page 248: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the clone job

l Clone Id - Identifier for the cloned backup Job

l Session - Number of sessions simultaneously accessing the device

l Status - Status of the cloned Job: Success, Failed

l Error Code - Error code from the backup application, if available

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size in bytes

l Size Scanned - Size of the files scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Job size in bytes

l Restarted Job - Indicates if the job is a restarted job

l Start Time - Time the Job started writing

l End Time - Time the cloned Job completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Clone SummarySummary of all the cloning operations that have occurred on a server in a table report.Uses data from the Num Clones, Num Clone Jobs In Event State, Total Clone Size, andTotal Size data sources.

l Completed- Number of cloning operations that were completed during the periodspecified.

l Successful - Number of cloning operations that were successful during the periodspecified.

l Failed - Number of cloning operations that failed during the period specified.

l Active - Number of active clone operations during the reporting period.

l Size - Total amount of data in megabytes that has been cloned during the periodspecified. Note that this data is not collected for NetBackup clones and duplications.

l Ratio of Data Backed Up - Percentage of backup jobs that were successfully cloned.Note no value is returned for NetBackup.

Successful Clone OperationsDrill down report from the Clone Summary template that returns details on successfulcloning operations in a table report. Uses data from the Clone Operations data source.

l ID - Identifier that uniquely identifies this clone

l Backup Application - Name of the backup application that cloned the Job. Forexample, NetWorker, NetBackup

l Server - Name of the Media Server to which the Job was cloned

l Media Server - Name of the media server to which the backup was cloned

l Clone Job Name - Name of the cloned Job

l Client - Name of the client on which the clone took place

Reports by System Template

248 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 249: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the clone job

l Clone ID - Identifier for the cloned backup Job

l Session - Number of sessions simultaneously accessing the device

l Status - Status of the cloned Job: Success, Failed

l Error Code - Error code from the backup application, if available

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size in bytes

l Size Scanned - Size of the files scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Job size in bytes

l Restarted Job - Indicates if the job is a restarted job

l Start Time - Time the Job started writing

l End Time - Time the cloned Job completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Cloned Job DetailsReturns details on jobs that have been cloned in a table report. Uses data from the CloneJob Details data source.

l Id - Identifier of the clone job

l Server - Name of the backup server on which the clone took place

l Media Server - Name of the Media Server to which the job was cloned

l Group - Name of the group or policy in which the cloned Job took place

l Schedule - Name of the schedule under which the clone ran

l Client - Name of the client on which the Jobs were cloned

l Job - Name of the cloned Job

l Status - Status of the cloned Job: Success, Failed

l Level - Level of the cloned Job

l Size - Amount of data backed up (in MB)

l Num Files - Number of files cloned

l Start Time - Time the Job started writing

l End Time - Time the cloned Job completed

l App Job Id - Identifier that uniquely identifies the cloned Job on the backup server onwhich the Job ran

l Clone Status - Status of the cloned Job

l Clone Start Time - Time that the clone operation started

l Clone End Time - Time that the clone operation ended

l Clone Storage ID - Identifier of the NetWorker Clone

l Domain Name - Name of the domain associated with the group of the cloned job

Reports by System Template

Cloned Job Details 249

Page 250: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Backup Set - Name of the backup set associated with the cloned job

l Session - Number of sessions that are simultaneously accessing the device of thecloned job

l Proxy - Proxy backup host of the cloned job

Cloned Job Details For Clone OperationReturns cloned job details for clone operation in a table report. Uses data from the CloneJob Details data source.

l Id - Identifier of the clone job

l Server - Name of the backup server on which the clone took place

l Media Server - Name of the Media Server to which the job was cloned

l Group - Name of the group or policy in which the cloned Job took place

l Schedule - Name of the schedule under which the clone ran

l Client - Name of the client on which the Jobs were cloned

l Job - Name of the cloned Job

l Status - Status of the cloned Job: Success, Failed

l Level - Level of the cloned Job

l Size - Amount of data backed up (in MB)

l Num Files - Number of files cloned

l Start Time - Time the Job started writing

l End Time - Time the cloned Job completed

l App Job Id - Identifier that uniquely identifies the cloned Job on the backup server onwhich the Job ran

l Clone Status - Status of the cloned Job

l Clone Start Time - Time that the clone operation started

l Clone End Time - Time that the clone operation ended

l Clone Storage ID - Identifier of the NetWorker Clone

Estimated Protected Backup CapacityReturns the total protected backup capacity of a NetWorker or Avamar environment in atable report. Uses data from the Last Backup Details by Client and Job, Last BackupDetails by Client and Job Within Filtered Group, and NetWorker Last Backup Details byClient and Job Within Filtered Group data sources.

l Non-DB Protected Capacity - Total protected capacity for RMAN and non-MSSQL jobs(in MB)

l MSSQL Protected Capacity - Total protected capacity for Avamar and NetworkerMSSQL jobs (in MB)

Estimated Protected Backup Capacity DetailsReturns details of protected backup capacity of a NetWorker or Avamar environment in atable report. Uses data from the Last Backup Details by Client and Job, Last Backup

Reports by System Template

250 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 251: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Details by Client and Job Within Filtered Group, and NetWorker Last Backup Details byClient and Job Within Filtered Group data sources.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of the server instance

l Client - Name of the client backed up

l Non-DB Protected Capacity - Total protected capacity for RMAN and non-MSSQL jobs(in MB)

l MSSQL Protected Capacity - Total protected capacity for Avamar and NetworkerMSSQL jobs (in MB)

Exposure DetailsReturns information about the time since the last successful backup for the file systemsof a client in a table report. Uses data from the Application Exposure data source.

Run this report against a backup client, and not against the backup server itself. Run thereport against a group of client file systems or databases to calculate an exposure for anapplication, business unit, office, or other group of objects.

l Policy Used - The Data Protection Policy used in the calculation

l Current Backup Exposure - Amount of time for which the application has beenexposed to data loss, measured as the difference between the restore point and thereport's end time

l Average Backup Exposure - Average amount of time for which the application isexposed to data loss, measured as the average difference between sequentialbackups of each component of the application

l Estimated Backup Recovery Time - Estimate of the time that it would take to restorethe application, measured as the total time taken to carry out the backups needed fora restore (calculated from historical data or as a percentage of backup time) plus aminute for each individual backup

l Backup Recovery Time Objective - As specified in the Protection Policy

l Backup Recovery Point Objective - As specified in the Protection Policy

l Storage Recovery Time Objective - As specified in the Protection Policy

l Off-Line Data Overhead - True if the offline overhead value was added to thecalculation, otherwise False

l Restore Time Percentage - Restore time percentage

l No Est Restore Time Reason - List of reasons why the Estimated Restore Time couldnot be calculated, if any

Exposure Time Exceeds RPO for rulesetReturns details when exposure time exceeds RPO in a table report. Report for Backupexposure time exceeds recovery point object rule. Uses data from the ApplicationExposure data source.

l Alert - Identifier of the alert

Reports by System Template

Exposure Details 251

Page 252: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Failed Clone OperationsReturns failed clone operations details in a table report. Uses data from the CloneOperations data source.

l ID - Identifier that uniquely identifies this clone

l Backup Application - Name of the backup application that cloned the Job. Forexample, NetWorker, NetBackup

l Server - Name of the Media Server to which the Job was cloned

l Media Server - Name of the media server to which the backup was cloned

l Clone Job Name - Name of the cloned Job

l Client - Name of the client on which the clone took place

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the clone job

l Clone ID - Identifier for the cloned backup Job

l Session - Number of sessions simultaneously accessing the device

l Status - Status of the cloned Job: Success, Failed

l Error Code - Error code from the backup application, if available

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size in bytes

l Size Scanned - Size of the files scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Job size in bytes

l Restarted Job - Indicates if the job is a restarted job

l Start Time - Time the Job started writing

l End Time - Time the cloned Job completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Failed Maintenance Job DetailsReturns the failed maintenance job details in a table report. Uses data from theMaintenance Job Details data source.

l Id - Unique identifier of the maintenance job

l Backup Application - Application on which the maintenance job occurred

l Server - Name of the backup server on which the Job took place

l Client - Name of the client on which the maintenance job took place

l Schedule - Schedule used by the maintenance job

l Job - Name of the maintenance job

l Job Type - Category of maintenance jobs under which this job is grouped

l Object - Data selection or object operated on by the maintenance job

l Job Id - Unique identifier for the maintenance job

Reports by System Template

252 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 253: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Owner - Owner of the maintenance job

l Status - Indicates if the maintenance job was successful or not

l Err Code - Error code associated with the maintenance job

l Size - Size of data associated with the maintenance job, if any (in MB). For example,data reclaimed from database

l Queue Start - Time the maintenance job was scheduled to run

l Start Time - Time the job started

l End Time - Time the job completed

l Duration - Time the job took

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Failed Restore JobsReturns failed restore jobs in a table report. Uses data from the Restore Details datasource.

l Id - Unique identifier for the restore

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server onwhich the job ran

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Media Server - Name of the Media Server to which the Job was backed up

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the restore job

l Status - Status of the restore: Success, Failed, Missed (TSM only)

l Err Code - Error code associated with the restore

l Size - Amount of data restored (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to viewthe total number of bytes that have been restored

l Num Files - Number of files restored

l Backup Time - Time at which the data being restored was originally backed up

l Size Scanned - Total size of the data scanned (in MB)

l Size Scanned Offset -Number of bytes that must be added to the Size Scanned fieldto be able to view the total number of bytes that have been scanned

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieveoperation and not a restore operation

l Backup Number - Number of the backup that is being restore

l Backup Label - Name of the backup that is being restored

l Recorded Date Time - Timestamp of the restore

l Number Of Files - Number of files restored

Reports by System Template

Failed Restore Jobs 253

Page 254: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Scanned - Size of the scanned and compressed file (in MB)

l Plugin Name - Plug-in name

l Backup Application - Name of the backup application on which the restore occurred

l Queued - Time the restore started queuing

l Started - Time the restore started reading

l Finished - Time the restore completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Failed Staging OperationsReturns details on the staging operations that have failed in a table report. Uses datafrom the Stage Operations data source.

l ID - Identifier of the backup Job

l Backup Application - Backup application on which the staging operation occurred

l Server - Hostname of the backup server

l Process Id - Unique identifier used to identify the process

l Storage Pool - Name of the storage pool from which data has been staged

l Input Volumes - Name of the volume from which data has been staged

l Output Volumes - Name of the volume to which data has been staged

l Status - Completion status of the staging process: Success, Failed

l Size - Amount of data staged (in MB

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the amount of data in bytes

l Num Items - Number of items that were staged

l Errors - String that contains the errors that occurred

l Error Code - Error code associated with the error string

l Start Time - Time that the staging operation started

l End Time - Time that the staging operation ended

Filesystems Not Backed UpReturns a list of those file systems that have not had asuccessful backup during thereporting period in a table report. Uses data from the Backup Job Details and FilesystemConfiguration Configuration data sources.

l Host - Name of the host on which the file system is mounted

l Filesystem - Name of the file system

l Status - Status of the file system

Historical Successful JobsReturns details on historical successful jobs in a table report. Report for Slower thanaverage and smaller than average rule. Uses data from the Backup Job Details datasources.

l Id - Identifier that uniquely identifies this Job

Reports by System Template

254 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 255: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Error Code - Error code from the backup application, if available

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Files Scanned - Number of files scanned

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

Reports by System Template

Historical Successful Jobs 255

Page 256: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Retention -

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (SymantecNetBackup only)

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Number of Copies - Number of inline copies, if any

l Backup Set - Name of the backup set associated with the job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - - Indicates if the backup job is compliant with the data protection policy

l Policy Used - - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Is Snap - If job is a snapshot backup; field hidden by default

l Snap Target - Snap target/replication target; field hidden by default

l Snap Target Platform - Snap target platform type; field hidden by default

l Snap Policy - Snap replication policy name; field hidden by default

l Snap Creation Type - Snap creation type, either Managed or Discovered; field hiddenby default

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions that are simultaneously accessing the device

Reports by System Template

256 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 257: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Hosts Not Backed UpReturns the hosts not backed up in a table report. Uses data from the Backup Job Details,Node Details, and Virtual Hosts data sources.

l Client - Name of the client not backed up

Last 10 Failed BackupsReturns the last ten failed backups in a table report. Uses data from the Backup JobDetails data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Start Time - Time the Job started writing

l End Time - Time the Job completed

Reports by System Template

Hosts Not Backed Up 257

Page 258: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Expiry Date - Date that a Job will expire

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (SymantecNetBackup only)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Legato Networker Bootstrap ReportReturns the entries in the NetWorker bootstrap report in a table report. Uses data from theNetWorker Bootstrap data source.

l Server - Name of the backup server

l Saveset ID - ID of the bootstrap Job

Reports by System Template

258 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 259: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Level - Level of the bootstrap Job

l Volume - ID of the volume containing the bootstrap

l File - Volume file location of the bootstrap

l Record - Volume record location of the bootstrap

l Write Time - Time that the bootstrap record was written

Maintenance Job AttemptsReturns the maintenance job attempt details in a table report. Uses data from theMaintenance Job Attempts and Maintenance Job Details data sources.

l Id - Unique identifier of the maintenance job

l Job Id - Identifier for the maintenance job

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM server instance

l Attempt - Attempt number. For example, first, second, and others

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the Media Server to which the Job was backed up

l Client - Name of the client on which the maintenance job took place

l Schedule - Schedule used by the maintenance job

l Job - Name of the maintenance job

l PID - PID of the underlying system process

l Status - Status of the maintenance job: Success, Failed

l Err Code - Error code associated with the maintenance job

l Description - Status description

l Size - Size of data associated with the maintenance job, if any (in MB). For example,data reclaimed from database

l Size Offset - Number of bytes that must be added to the Size field to be able to viewthe total number of bytes that have been restored

l Num Files - Number of files

l Job Type - Category of maintenance jobs under which this job is grouped

l Object - Data selection or object operated on by the maintenance job

l Owner - Owner of the maintenance job

l Queue Start - Time the maintenance job was scheduled to run

l Start Time - Time the job started

l End Time - Time the job completed

l Backup Application - Application on which the maintenance job occurred

l Duration - Time the backup application took to complete the job

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Reports by System Template

Maintenance Job Attempts 259

Page 260: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Maintenance Job Attempts for Specific JobReturns the maintenance job attempts for specific job details in a table report. Uses datafrom the Maintenance Job Attempts data sources.

l Id - Unique identifier of the maintenance job

l Job Id - Identifier for the maintenance job

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM server instance

l Attempt - Attempt number. For example, first, second, and others

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the Media Server to which the Job was backed up

l PID - PID of the underlying system process

l Status - Status of the maintenance job: Success, Failed

l Err Code - Error code associated with the maintenance job

l Description - Status description

l Size - Size of data associated with the maintenance job, if any (in MB). For example,data reclaimed from database

l Size Offset - Number of bytes that must be added to the Size field to be able to viewthe total number of bytes that have been restored

l Num Files - Number of files

l Start Time - Time the Job started

l End Time - Time the job completed

Maintenance Job DetailsReturns maintenance job details in a table report. Uses data from the Maintenance JobDetails data source.

l Id - Unique identifier of the maintenance job

l Job Id - Identifier for the maintenance job

l Server - Name of the backup server on which the Job took place

l Client - Name of the client on which the maintenance job took place

l Schedule - Schedule used by the maintenance job

l Job - Name of the maintenance job

l Status - Status of the maintenance job: Success, Failed

l Err Code - Error code associated with the maintenance job

l Description -

l Size - Size of data associated with the maintenance job, if any (in MB). For example,data reclaimed from database

l Job Type - Category of maintenance jobs under which this job is grouped

l Object - Data selection or object operated on by the maintenance job

l Owner - Owner of the maintenance job

l Queue Start - Time the maintenance job was scheduled to run

Reports by System Template

260 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 261: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Start Time - Time the job started

l End Time - Time the job completed

l Backup Application - Application on which the maintenance job occurred

l Duration - Time the backup application took to complete the job

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Maintenance Job ErrorsReturns details on individual errors that have occurred on a client in a table report. Usesdata from the Maintenance Job Errors data source.

l Id - Unique identifier of the Maintenance job

l Server - Name of the backup server on which the Job took place

l Client - Name of the client on which the maintenance job took place

l Severity - Severity of the failure

l Error - Error code description associated with the maintenance job

l Err Code - Error code associated with the maintenance job

l Time - Time the failure took place

Maintenance Job SummarySummary of all the maintenance operations that have occurred in a table report. Usesdata from the Num Maintenance Jobs data source.

l Succeeded - Number of maintenance operations that were successful during theperiod specified

l Failed - Number of maintenance operations that failed during the period specified

l Completed - Number of maintenance operations that were completed during theperiod specified

l Success Rate (%) Percentage of maintenance jobs that were successful

Missed Restore JobsReturns missed restore job details in a table report. Uses data from the Restore Details ina data source.

l Id - Unique identifier for the restore

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server onwhich the job ran

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Domain Name - Name of the domain associated with the group

l Session - Number of sessions simultaneously accessing the device

l Queued - Time the restore started queuing

l Start Time - Time the restore started reading

Reports by System Template

Maintenance Job Errors 261

Page 262: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l End Time - Time the restore completed

l Owner - Owner of the restore job

l Status - Status of the restore: Success, Failed, Missed

l Err Code - Error code associated with the restore

l Media Server - Name of the Media Server to which the Job was backed up

l Backup Time - Time at which the data being restored was originally backed up

l Size - Amount of data restored (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to viewthe total number of bytes that have been restored

l Size Scanned - Total size of the data scanned (in MB)

l Size Scanned Offset - Number of bytes that must be added to the Size Scanned fieldto be able to view the total number of bytes that have been scanned

l Num Files - Number of files restored

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieveoperation and not a restore operation

l Backup Number - Number of the backup that is being restore

l Backup Label - Name of the backup that is being restored

l Recorded Date Time - Timestamp of the restore

l Number Of Files - Number of files restored

l Scanned - Size of the scanned and compressed file (in MB)

l Plugin Name - Plug-in name

l Backup Application - Name of the backup application on which the restore occurred

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

NetBackup Backup Job Disk Media DetailsReturns NetBackup backup job disk media details in a table report. Uses data from theBackup Job Disk Media and NetBackup Disk Volume Status data sources.

l Server - Name of the NetBackup Server

l Volume Id - Identifier for the volume

l Path - Path to the volume

l Pool - Pool in which the volume belongs

l Disk Type - Type of underlying disk

l Capacity - Capacity of volume (in GB)

l Status - Active status of the volume

l Administrative State - Administrative state of the volume

l Internal State - Internal state of the volume: up, down

Reports by System Template

262 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 263: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

NetBackup Clone Job Disk Media DetailsReturns NetBackup clone job disk media details in a table report. Uses data from theClone Job Disk Media and NetBackup Disk Volume Status data sources.

l Server - Name of the NetBackup Server

l Volume ID - Identifier for the volume

l Path - Path to the volume

l Pool - Pool associated with the volume

l Disk Type - Type of disk volume if a disk volume, or the type of underlying diskvolume if another volume type

l Capacity - Capacity of volume (in GB)

l Status - Active status of the volume

l Adminsitrative State - Administrative state of the volume

l Internal State - Internal state of the volume: up, down

NetBackup Failed Restarted Clone OperationsReturns NetBackup failed restarted clone operations details in a table report. Uses datafrom the Clone Operations data source.

l Id - Identifier that uniquely identifies this clone

l Backup Application - Name of the backup application that cloned the Job. Forexample, NetWorker, NetBackup

l Server - Name of the backup server on which the clone took place

l Media Server - Name of the Media Server to which the Job was cloned

l Clone Job Name - Name of the cloned Job

l Client - Name of the client on which the clone took place

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the clone job

l Clone ID - Identifier for the cloned backup Job

l Restarted Job - Indicates if the job is a restarted job

l Status - Status of the cloned Job: Success, Failed

l Error Code - Error code from the backup application, if available

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size in bytes

l Size Scanned - Size of the files scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Job size in bytes

l Restarted Job - Indicates if the job is a restarted job

l Start Time - Time the clone operation started writing

l End Time - Time the cloned operation completed

Reports by System Template

NetBackup Clone Job Disk Media Details 263

Page 264: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

NetBackup Last Restarted Job for Specific Backup JobReturns NetBackup last restarted job for specific backup job details in table report. Usesdata from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions simultaneously accessing the device

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

Reports by System Template

264 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 265: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplication - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Duration -

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Retention -

l Ran In Window -

l Started In Window -

l Finished In Window -

l Time In Window -

l Time Out Of Windows -

l Out Of Window Reason -

l Trailing Space In Window -

l Leading Space In Window -

l Valid Level -

l Valid Retention -

l Compliant -

l Policy Used -

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

NetBackup Last Restarted Job for Specific Clone OperationReturns NetBackup last restarted job for specific clone operation details in a table report.Uses data from the Clone Operations and Restarted Jobs data sources.

l Server - Name of the backup server on which the clone took place

l Job Type - Type of job: Backup, Restore, Clone, Maintenance, Vault

l Job ID - Identifier for all job types

l Restarted Job - Original job ID for the last failed restore job

l Start Time - Start time of the last failed restarted job

l End Time - End time of the last failed restarted job

l Id - Identifier that uniquely identifies this clone

Reports by System Template

NetBackup Last Restarted Job for Specific Clone Operation 265

Page 266: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Backup Application - Name of the backup application that cloned the Job. Forexample, NetWorker, NetBackup

l Media Server - Name of the Media Server to which the Job was cloned

l Clone Job Name - Name of the cloned Job

l Client - Name of the client on which the clone took place

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the clone job

l Status - Status of the cloned Job: Success, Failed

l Error Code - Error code from the backup application, if available

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size in bytes

l Size Scanned - Size of the files scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Job size in bytes

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

NetBackup Last Restarted Job For Specific JobReturns NetBackup last restarted job for specific job details in a table report. Uses datafrom the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server onwhich the job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Error Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

Reports by System Template

266 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 267: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size - Amount of data backed up (in MB)

l Files Scanned - Number of files scanned

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Ran In Window -

l Started In Window -

l Finished In Window -

l Time In Window -

l Time Out Of Window -

l Out Of Window Reason -

l Trailing Space In Window -

l Leading Space In Window -

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Retention -

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Valid Level -

l Valid Retention -

l Compliant -

l Policy Used -

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

Reports by System Template

NetBackup Last Restarted Job For Specific Job 267

Page 268: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

NetBackup Last Restarted Job for Specific Maintenance JobReturns the NetBackup last restarted job for specific maintenance job details in a tablereport. Uses data from the Maintenance Job Details and Restarted Jobs data sources.

l Id - Unique identifier of the maintenance job

l Server - Name of the backup server on which the Job took place

l Job Type - Category of maintenance jobs under which this job is grouped

l Job Id - Identifier for the maintenance job

l Restarted Job - Original job ID for the last failed restore job

l Client - Name of the client on which the maintenance job took place

l Job - Name of the maintenance job

l Status - Status of the maintenance job: Success, Failed

l Err Code - Error code associated with the maintenance job

l Size - Size of data associated with the maintenance job, if any (in MB). For example,data reclaimed from database

l Owner - Owner of the maintenance job

l Schedule - Schedule used by the maintenance job

l Restore Job Type - Type of job: Backup, Restore, Clone, Maintenance, Vault

l Object - Data selection or object operated on by the maintenance job

l Queue Start - Time the maintenance job was scheduled to run

l Started - Time the job started

l Finished - Time the job completed

l Backup Application - Application on which the maintenance job occurred

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

NetBackup Last Restarted Job for Specific Restore JobReturns NetBackup last restarted job for specific restore job details in a table report. Usesdata from the Restarted Jobs and Restore Details data sources.

l Id - Unique identifier for the restore

l Server - Name of the backup server on which the restore took place

l Job Type - Type of job: Backup, Restore, Clone, Maintenance, Vault

l Job ID - Identifier for all job types

l Restarted Job - Original job ID for the last failed restore job

l Media Server - Name of the Media Server to which the Job was backed up

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the restore job

Reports by System Template

268 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 269: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Status - Status of the restore: Success, Failed, Missed

l Err Code - Error code associated with the restore

l Size - Amount of data restored (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to viewthe total number of bytes that have been restored

l Size Scanned - Total size of the data scanned (in MB)

l Size Scanned Offset - Number of bytes that must be added to the Size Scanned fieldto be able to view the total number of bytes that have been scanned

l Num Files - Number of files restored

l Backup Time - Time at which the data being restored was originally backed up

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieveoperation and not a restore operation

l Backup Number - Number of the backup that is being restore

l Backup Label - Name of the backup that is being restored

l Recorded Date Time - Timestamp of the restore

l Number Of Files - Number of files restored

l Queue Start - Time the restore started queuing

l Started - Time the restore started reading

l Finished - Time the restore completed

l Plugin Name - Plug-in name

l Scanned - Size of the scanned and compressed file (in MB)

l Backup Application - Name of the backup application on which the restore occurred

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

NetBackup Last Restarted Job for Specific Vault JobReturns NetBackup last restarted job for specific vault job details in a table report. Usesdata from the NetBackup Vault Details and Restarted Jobs data sources.

l Id - Identifier that uniquely identifies this vault Job

l Server - Name of the NetBackup Server

l Job Type - Type of job: Backup, Restore, Clone, Maintenance, Vault

l Job ID - Identifier for all job types

l Restarted Job - Original job ID for the last failed restore job

l Media Server - Name of the NetBackup Media Server

l Group - Name of the Policy associated with the vault

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client

l Profile - Name of the vault profile

l Owner - Owner of the vault job

l Status - Status of the Job backed up: Success, Failed

l Err Code - Error code associated with the Job

Reports by System Template

NetBackup Last Restarted Job for Specific Vault Job 269

Page 270: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Robot - Name of the robot

l Vault - Name of the vault

l Storage Unit - Name of the storage unit

l Expiry Date - Date that the Job will expire

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Job ID 2 - NetBackup Job ID in the activity log

NetBackup Restore Job Disk Media DetailsReturns NetBackup restore job disk media details in a table report. Uses data from theNetBackup Disk Volume Status and Restore Job Disk Media data sources.

l Server - Name of the server that started the restore job

l Volume ID - Identifier for the volume on which the restore took place

l Path - Path to the volume

l Pool - Pool in which the volume belongs

l Disk Type - Type of underlying disk

l Capacity - Capacity of volume (in GB)

l Status - Active status of the volume

l Adminsitrative State - Administrative state of the volume

l Internal State - Internal state of the volume: up, down

NetBackup Vault AttemptsReturns NetBackup vault attempt details in a table report. Uses data from the NetBackupVault Attempts and NetBackup Vault Details data sources.

l Id - Identifier that uniquely identifies this vault Job

l Job Id - Identifier for the vault job

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server onwhich the job ran

l Server - Name of the NetBackup Server

l Sub Name - Name of TSM server instance

l Attempt - Attempt number. For example, first, second, and others

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the NetBackup Media Server

l Group - Name of the Policy associated with the vault

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client

Reports by System Template

270 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 271: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Profile - Name of the vault profile

l PID - PID of the underlying system process

l Status - Status of the Job backed up: Success, Failed

l Err Code - Error code associated with the Job

l Description - Status description

l Size - Amount of data that was backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size

l Num Files - Number of files backed up

l Owner - Owner of the vault job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Robot - Name of the robot

l Vault - Name of the vault

l Session ID - Identifier of the session

l Num Ejected - Number ejected

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Expiry Date - Date that the Job will expire

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Job ID 2 - NetBackup Job ID in the activity log

NetBackup Vault Attempts for Specific JobReturns NetBackup vault attempts for specific job details in a table report. Uses data fromthe NetBackup Vault Attempts data source.

l Id - Identifier that uniquely identifies this vault Job

l Job Id - Identifier for the vault job

l Server - Name of the NetBackup Server

l Sub Name - Name of TSM server instance

l Attempt - Attempt number. For example, first, second, and others

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the NetBackup Media Server

l PID - PID of the underlying system process

l Status - Status of the Job backed up: Success, Failed

l Err Code - Error code associated with the Job

l Description - Status description

l Size - Amount of data that was backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size

Reports by System Template

NetBackup Vault Attempts for Specific Job 271

Page 272: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Num Files - Number of files backed up

l Start Time - Time the backup started to write to tape

l End Time - Time the backup finished writing to tape

NetBackup Vault EjectsReturns NetBackup vault eject details in a table report. Uses data from the NetBackupVault Ejects data source.

l Server - Name of the NetBackup Server

l Sub Name - Name of TSM server instance

l Media Server - Name of the NetBackup Media Server

l Type - Type of vault

l Robot - Name of the robot

l Vault - Name of the vault

l Session - Vault job session

l Volume Group - Name of the volume group

l Volume - Name of the volume

NetBackup Vault Job Disk Media DetailsReturns NetBackup vault job disk media details in a table report. Uses data from theNetBackup Vault Job Disk Media data source.

l Job Id - Identifier that uniquely identifies this vault Job

l Server - Name of the NetBackup Server

l Group - Name of the policy associated with the vault

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client

l Profile - Name of the vault profile

l Queue Start - Time the vault job entered the queue

l Start Time - Time the vault job started

l End Time - Time the vault job finished

l Volume Id - Unique identifier of the volume

l App Job Id - NetBackup Job Identifier

l Path - Path to the Volume

l Pool - Pool the volume belongs to

l Disk Type - Type of disk

l Capacity - Capacity of volume (in GB)

l Status - Status of the volume

l Adminsitrative State - Administrative state of the volume: up, down

l Internal State - Internal state of the volume: up, down

Reports by System Template

272 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 273: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

NetBackup Vault JobsReturns NetBackup vault job details in a table report. Uses data from the NetBackup VaultDetails data source.

l Id - Identifier that uniquely identifies this vault Job

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server onwhich the job ran

l Server - Name of the NetBackup Server

l Media Server - Name of the NetBackup Media Server

l Group - Name of the Policy associated with the vault

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client

l Profile - Name of the vault profile

l Owner - Owner of the vault job

l Status - Status of the Job backed up: Success, Failed

l Err Code - Error code associated with the Job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Robot - Name of the robot

l Vault - Name of the vault

l Storage Unit - Name of the storage unit

l Session ID - Identifier of the session

l Num Ejected - Number ejected

l Expiry Date - Date that the Job will expire

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Job ID 2 - NetBackup Job ID in the activity log

NetBackup Vault PreviewReturns NetBackup vault preview details in a table report. Uses data from the NetBackupVault Preview data source.

l Server - Name of the NetBackup Server

l Sub Name - Name of TSM server instance

l Media Server - Name of the NetBackup Media Server

l Vault - Name of the vault

l Session - Number of sessions simultaneously accessing the device

l Policy - Name of the policy

l Schedule - Name of the schedule under which the Job ran

Reports by System Template

NetBackup Vault Jobs 273

Page 274: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Client - Name of the client

l Job Id - Identifier that uniquely identifies this vault Job

l Volume - Name of the volume

l Size - Amount of data (in MB)

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

Networker Data Domain Details for JobReturns NetWorker Data Domain details for job in a table report. Uses data from theBackup Device Access Filesystem Details, Backup Device Status, Backup Device Config,Backup Job Details with Volume, Data Domain Last Synch Time for Server, FilesystemConfiguration, and Pools On Data Domain data sources.

l Server - Name of the backup server on which the Job took place

l Job - Name of the Job backed up

l End Time - Time the job completed

l Volume Id - Identifier for the volume

l Device Name - Name of the device on which the file system is located. Forexample, /dev/vol0

l Device Path - Device driver path for the device

l Device Type - Type of device. For example, DLT, Ultrium-2

l Data Domain Name - Name of the Data Domain

l Data Domain Pool - Pool to which the volume belongs

l Destination - Unique identifier for the destination of replication

l Synchronised - Indicates whether data is synchronized

l Replicated - Indicates whether data is replicated

Networker Data Domain Details for ServerReturns NetWorker Data Domain details for server in a table report. Uses data from theBackup Device Access Filesystem Details, Backup Device Config, Backup Device Status,Backup Job Device Mapping, Backup Job Details, Clone Job Media, Clone Operations,Data Domain Last Synch Time for Server, Filesystem Configuration, Pools On Data Domaindata sources.

l Server - Name of the backup server on which the Job took place

l Device Name - Name of the device on which the file system is located. Forexample, /dev/vol0

l Client - Name of the client backed up

l Pool - Backup pool in which the backup Job belongs

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Dedupe Ratio - Difference between the Deduplication Ratio and the TotalCompression Factor (as a percentage)

l End Time - Time the job completed

Reports by System Template

274 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 275: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Device Host - Name of the host to which the device is attached

l Device Path - Device driver path for the device

l Device Type - Type of device. For example, DLT, Ultrium-2

l Data Domain Name - Name of the Data Domain

l Export - Export name

l Destination - Unique identifier for the destination of replication

l Data Domain Pool - Pool to which the volume belongs

l Synchronised - Indicates whether data is synchronized

l Replicated - Indicates whether data is replicated

l Clones Replicated - Indicates if clone jobs were successfully replicated or not

Networker Job Size by Client for Data DomainReturns NetWorker job size by client for Data Domain details in a column chart. Uses datafrom the Backup Device Config, Backup Device Status, Backup Job Details with Volume,and Pools On Data Domain data sources.

l Device Access - Device access information

l Client - Name of the client backed up

l Size - Amount of data backed up (in MB)

RecoverPoint Protected CapacityReturns the Protected Data per Recoverpoint server in a table. Uses data fromRecoverPoint Protected Capacity data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Data Protected - Total amount of data protected (in MB)

Restore Job AttemptsReturns the restore job attempt details in a table report. Uses data from the RestoreDetails and Restore Attempts data sources.

l Id - Identifier that uniquely identifies this restore

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server onwhich the job ran

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Media Server - Name of the Media Server to which the Job was backed up

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the restore job

l Status - Status of the restore: Success, Failed, Missed

l Err Code - Error code associated with the restore

l Size - Amount of data restored (in MB)

Reports by System Template

Networker Job Size by Client for Data Domain 275

Page 276: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size Offset - Number of bytes that must be added to the Size field to be able to viewthe total number of bytes that have been restored

l Size Scanned - Total size of the data scanned (in MB)

l Size Scanned Offset - Number of bytes that must be added to the Size Scanned fieldto be able to view the total number of bytes that have been scanned

l Num Files - Number of files restored

l Backup Time - Time at which the data being restored was originally backed up

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieveoperation and not a restore operation

l Backup Number - Number of the backup that is being restore

l Backup Label - Name of the backup that is being restored

l Recorded Date Time - Timestamp of the restore

l Number Of Files - Number of files restored

l Scanned - Size of the scanned and compressed file (in MB)

l Plugin Name - Plug-in name

l Backup Application - Name of the backup application on which the restore occurred

l Queued - Time the restore started queuing

l Started - Time the restore started reading

l Finished - Time the restore completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Restore Job Attempts for Specific JobReturns restore job attempts for specific job details in a table report. Uses data from theRestore Attempts data source.

l Id - Identifier that uniquely identifies this restore

l Job Id - Identifier for the restore job

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Attempt - Attempt number. For example, first, second, and others

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the Media Server to which the Job was backed up

l PID - PID of the underlying system process

l Status - Status of the restore: Success, Failed, Missed

l Err Code - Error code associated with the restore

l Description - Status description

l Size - Amount of data restored (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to viewthe total number of bytes that have been restored

l Num Files - Number of files restored

l Started - Time the restore started reading

Reports by System Template

276 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 277: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Started - Time the restore completed

Restore Job Error DetailsDrill down report from the Restore Details and Failed Restores templates that returnsinformation on restores that have not completed due to error in a table report. Uses datafrom the Restore Details and Restore Job Errors data sources.

l Id - Unique identifier for the restore

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Domain Name - Name of the domain associated with the group

l Client - Name of the client on which the restore took place

l Job - Name of the Job being restored

l Severity - Severity of the restore, if applicable

l Error - Error string associated with the restore

l Err Code - Error code of the restore

l Time - Time the error occurred

l Queue Start - Time the restore started queuing

Restore Job Error Details For Specific JobReturns specific restore jobs that have not completed due to error in a table report. Usesdata from the Restore Job Errors data source.

l Id - Unique identifier for the restore

l Server - Name of the backup server on which the restore took place

l Sub Name - Not applicable

l Client - Name of the client on which the restore took place

l Severity - Severity of the restore, if applicable

l Error - Error string associated with the restore

l Err Code - Error code of the restore

l Time - Time the error occurred

Restore Job Media DetailsReturns a list of volumes that a backup was written to in a table report. Uses data fromthe Restore Job Media data source.

l Volume Id - Unique identifier of the volume to which the restore Job was written

l State - State of the restore: success, failed

l Pool - Backup pool in which the backup Job belongs

l Online - Indicates if the volume is online

l Jukebox - Jukebox in which the volume is located

l Slot - Slot in jukebox occupied by volume

l Expiry Date - Date the volume is due to expire

Reports by System Template

Restore Job Error Details 277

Page 278: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Restore Job SummarySummary of the restore job details in a table report. Uses data from the Restore Statisticsdata source.

l Completed - Total number of jobs that have completed over the reporting period

l Size - Total size of restores that completed (in GB)

l Succeeded - Number of jobs that were successful over the reporting period

l Failed - Number of jobs that failed over the reporting period

l Missed - Number of jobs that were missed over the reporting period

l Success Rate - Success rate of backups over the reporting period

Restore Top 10 Largest ClientsReturns the restore top ten largest clients in a table report. Uses data from the RestoreStatistics data source.

l Restores - Number of restores that completed

l Size - Total size of restores that completed (in GB)

l Files - Total number of files that were restored (millions)

l Share of Total -

Restore Top 10 Least Successful ClientsReturns the restore top ten least successful clients in a table report. Uses data from theRestore Statistics data source.

l Failures - Total number of failures

l Failure Rate - Percentage of failures

Snap Job DetailsReturns all snap job details in a table. Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Storage unit the policy is configured to use

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Session - session associated with the job

Reports by System Template

278 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 279: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Proxy - Proxy backup host

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Error Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the backup. This is hardcoded to full

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when In Window is false. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Size Transferred - Size transferred to server (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted fromthe Size Transferred field to return the Save Set size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

Reports by System Template

Snap Job Details 279

Page 280: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Snap Job SummaryReturns a summary of snap jobs in a table. Uses data from the Num Jobs in Event Stateand Backup Statistics data sources.

l Completed - Completed snap jobs

l Succeeded - Successful snap jobs

l Failed - Failed snap jobs

l Success Rate - Success rate of snap backups over the reporting period

l Active - Active snap jobs

Staging Media DetailsReturns staging media details in a table report. Uses data from the Staging Media datasource.

l Server - Name of the server

l Volume Id - Identifier for the volume

l State - State of the media

l Pool - Pool to which the volume belongs

Reports by System Template

280 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 281: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Online - Indicates if the media is online or not

l Jukebox - Jukebox in which the volume resides

l Slot - Jukebox slot occupied by the volume

l Expiry Date - Date of expiry of the volume

Staging OperationsReturns staging operations details in a table report. Uses data from the NetWorkerStorage Node Config and Stage Operations data sources.

l Id - Identifier of the backup Job

l Backup Application - Backup application on which the staging operation occurred

l Server - Name of the backup server

l Process Id - Unique identifier used to identify the process

l Storage Pool - Name of the storage pool from which data has been staged

l Input Volumes - Name of the volume from which data has been staged

l Output Volumes - Name of the volume to which data has been staged

l Status - Completion status of the staging process: Success, Failed

l Size - Amount of data staged (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the amount of data in bytes

l Num Items - Number of items that were staged

l Errors - String that contains the errors that occurred

l Error Code - Error code associated with the error string

l Start Time - Time that the staging operation started

l End Time - Time that the staging operation ended

Staging SummarySummary of all the staging operations that have occurred on a NetWorker server in atable report. Uses data from the NetWorker Storage Node Config, Num Stages, and TotalStaging Size data sources.

l Completed - Number of staging operations that were completed during the periodspecified

l Num Stages - Number of staging operations that have occurred during the periodspecified

l Total Staging Size - Total amount of data that has been staged during the periodspecified (in GB)

Successful Maintenance Job DetailsReturns details on all maintenance Jobs that were successful on the PureDisk serverduring the specified period in a table report. Uses data from the Maintenance Job Detailsdata source.

l Id - Unique identifier of the maintenance job

l Backup Application - Application on which the maintenance job occurred

l Server - Name of the backup server on which the Job took place

Reports by System Template

Staging Operations 281

Page 282: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Client - Name of the client on which the maintenance job took place

l Schedule - Schedule used by the maintenance job

l Job - Name of the maintenance job

l Job Type - Category of maintenance jobs under which this job is grouped

l Object - Data selection or object operated on by the maintenance job

l Job Id - Identifier for the maintenance job

l Owner - Owner of the maintenance job

l Status - Status of the maintenance job: Success, Failed

l Err Code - Error code associated with the maintenance job

l Size - Size of data associated with the maintenance job, if any (in MB). For example,data reclaimed from database

l Queue Start - Time the maintenance job was scheduled to run

l Start Time - Time the job started

l End Time - Time the job completed

l Duration - Duration the job took

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Successful Restore JobsReturns successful restore job details in a table report. Uses data from the RestoreDetails data source.

l Id - Unique identifier for the restore

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server onwhich the job ran

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Domain Name - Name of the domain associated with the group

l Session - Number of sessions simultaneously accessing the device

l Queued - Time the restore started queuing

l Start Time - Time the restore started reading

l End Time - Time the restore completed

l Owner - Owner of the restore job

l Status - Status of the restore: Success, Failed, Missed

l Err Code - Error code associated with the restore

l Media Server - Name of the Media Server to which the Job was backed up

l Backup Time - Time at which the data being restored was originally backed up

l Size - Amount of data restored (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to viewthe total number of bytes that have been restored

Reports by System Template

282 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 283: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size Scanned - Total size of the data scanned (in MB)

l Size Scanned Offset - Number of bytes that must be added to the Size Scanned fieldto be able to view the total number of bytes that have been scanned

l Num Files - Number of files restored

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieveoperation and not a restore operation

l Backup Number - Number of the backup that is being restore

l Backup Label - Name of the backup that is being restored

l Recorded Date Time - Timestamp of the restore

l Number Of Files - Number of files restored

l Scanned - Size of the scanned and compressed file (in MB)

l Plugin Name - Plug-in name

l Backup Application - Name of the backup application on which the restore occurred

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Successful Staging OperationsReturns successful staging operations details in a table report. Uses data from the StageOperations data source.

l Id - Identifier of the backup Job

l Backup Application - Backup application on which the staging operation occurred

l Server - Name of the backup server

l Process Id - Unique identifier used to identify the process

l Storage Pool - Name of the storage pool from which data has been staged

l Input Volumes - Name of the volume from which data has been staged

l Output Volumes - Name of the volume to which data has been staged

l Status - Completion status of the staging process: Success, Failed

l Size - Amount of data staged (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the amount of data in bytes

l Num Items - Number of items that were staged

l Errors - String that contains the errors that occurred

l Error Code - Error code associated with the error string

l Start Time - Time that the staging operation started

l End Time - Time that the staging operation ended

Top 10 Backup Clients By Avg Daily ChangeReturns the top ten backup client by average daily change in a table report. Uses datafrom the Backup Statistics, Last Backup Details, and Report Times data sources.

l Client - Name of the client that was backed up

l Protected - Amount of data on the backup client that is being protected. Forapplications such as NetWorker and NetBackup, this is determined by looking at the

Reports by System Template

Successful Staging Operations 283

Page 284: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

last full backup of the client. For applications like Avamar, the statistics are deriveddirectly from the application

l Daily Change - Amount of daily change

Top 10 Backup Clients with Best De-Dupe RateReturns the top ten backup clients with best deduplication rate in a table report. Usesdata from the Backup Job Details and Last Backup Details data sources.

l Client - Name of the client that was backed up

l Avg Daily Change - Amount of daily change

l Protected - Amount of data on the backup client that is being protected. Forapplications such as NetWorker and NetBackup, this is determined by looking at thelast full backup of the client. For applications like Avamar, the statistics are deriveddirectly from the application

l Change Rate - Change rate

l De-Dupe Rate - Deduplication rate

Top 10 Backup Clients with Worst De-Dupe RateReturns the top ten backup clients with worst deduplication rate in a table report. Usesdata from the Backup Job Details and Last Backup Details data sources.

l Client - Name of the client that was backed up

l Daily Change - Amount of daily change

l Protected - Amount of data on the backup client that is being protected. Forapplications such as NetWorker and NetBackup, this is determined by looking at thelast full backup of the client. For applications like Avamar, the statistics are deriveddirectly from the application

TSM Backup Set DetailsReturns TSM backup set details in a table report. A backup set is a collection of activefiles that reside on a TSM server. Uses data from the TSM Backup Set data source.

l Name - Name of the backup set

l Client - Name of the client object

l Type - Type of data: file, image, application

l Create Time - Date and time the backup set was created

l Retention - Retention days

l Device Class - Name of the device class

l Description - User-defined description of the device class

l Has Table of Contents - Indicates if a table of contents is available. A value of 1indicates whether the table of contents is available

l Volumes - Volume names containing the data displayed in a comma-separated list

l Filespaces - Filespace names displayed in a comma-separated list

l Size - Size of the backup set (in MB)

l Expiry - Expiration date

Reports by System Template

284 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 285: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

TSM Command Event DetailsReturns TSM command event details in a table report. Uses data from the TSM CommandEvents data source.

l Server - Name of the TSM Server that generated the command

l Backup Server - Name of the backup server on which the command ran

l Media Server - Media server on which the command ran

l Group - Name of the group associated with the command event

l Schedule - Name of the schedule associated with the command event

l Client - Name of the client on which the command event ran

l Job - Name of the command that ran, or the names of the files backed up or restored(if available

l Status - Indicates if the command ran successfully or not

l Error Code - Error code of the command

l Queue Start - Time the command started queueing

l Start Time - Time the command started

l End Time - Time the command completed

TSM Database Backup ErrorsReturns TSM database backup error details in a table report. Uses data from the TSMDatabase Backup Errors data source.

l Id - Unique identifier of the database (catalog) process matching with the TSMDatabase Backup data source

l Message ID - Message ID string corresponding to the error

l Error - Error message string

TSM Database BackupsReturns TSM database backup details in a table report. Uses data from the TSM DatabaseBackup data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Level - Priority of the process

l Output Volume - Name of the volume to which data has been backed up

l Status - Completion status of the database (catalog) backup process: Success, Failed

l Size - Amount of data backed up (in MB)

l Num Items - Number of items backed up

l Error Flag - Indicates if the process returned any errors. Even if the process wassuccessful, it could have errors associated with it

l Throughput - Throughput of size to duration (MB/sec)

Reports by System Template

TSM Command Event Details 285

Page 286: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Start Time - Time the process started

l End Time - Time the process completed

TSM Delete VolumesReturns delete volume process details on the TSM server in a table report. Uses data fromthe TSM Delete Volume data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - UniqUnique identifier used by TSM to identify the process

l Volume - Name of the volume to delete

l Storage Pool - Name of the storage pool in which the volume is located

l Status - Completion status of the delete volume process: Success, Failed

l Num Items - Number of items that were deleted

l Size - Amount of data deleted (in MB)

l Start Time - Time the process started

l End Time - Time the process completed

TSM Expiration ErrorsReturns errors related to a specific expiration job in a table report. Uses data from theTSM Expiration Errors data source.

l ID - Unique identifier of the database (catalog) process matching with the TSMExpiration data source

l Message ID - Message ID string corresponding to the error

l Error - Error message string

TSM ExpirationsReturns the expiration processes running on the TSM server in a table report. Uses datafrom the TSM Expiration data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Status - Completion status of the expiration process: Success, Failed

l Node Details - Details of the TSM server objects on which expiration is occurring. Thisincludes the object name, filespace name, filespace ID, domain name, managementclass and type of files being expired. For example, BACKUP and ARCHIVE

l Objects Examined - Objects that were scrutinized during the expiration process

l Backup Objects Deleted - Backup objects that were deleted during the expirationprocess

l Archive Objects Deleted - Archive objects that were deleted during the expirationprocess

Reports by System Template

286 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 287: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l DB Volumes Deleted - Database volumes that were deleted during the expirationprocess

l Recovery Plans Deleted - Recovery plans that were deleted during the expirationprocess

l Num Errors - Number of errors during the expiration process

l Num Items - Number of items deleted

l Size - Amount of data deleted (in MB)

l Error Flag - Indicates if the process returned any errors. Even if the process wassuccessful, it could have errors associated with it

l Throughput - Throughput of size to duration (MB/sec)

l Start Time - Time the process started

l End Time - Time the process completed

TSM Failed Migration JobsReturns details of all failed TSM migration jobs in a table report. Uses data from the TSMMigration data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Storage Pool - Name of the storage pool from which data has been migrated

l Input Volume - Name of the volume from which data has been migrated

l Output Volume - Name of the volume to which data has been transferred

l Status - Completion status of the migration process: Success, Failed

l Size - Amount of data migrated (in MB)

l Num Items - Total number of items migrated from the storage pool

l Error Flag - Indicates if the process returned any errors. Even if the process wassuccessful, it could have errors associated with it

l Start Time - Time the process started

l End Time - Time the process completed

TSM Failed Reclamation JobsReturns details on failed TSM reclamation jobs that have occurred in the last day in atable report. Uses data from the TSM Reclamation data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Storage Pool - Name of the storage pool from which data has been reclaimed

l Input Volume - Name of the volume from which data has been reclaimed

l Output Volume - Name of the volume to which data has been transferred

l Status - Completion status of the reclamation process: Success, Failed

Reports by System Template

TSM Failed Migration Jobs 287

Page 288: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size - Amount of data reclaimed (in MB)

l Num Items - Number of items reclaimed

l Error Flag - Indicates if the process returned any errors. Even if the process wassuccessful, it could have errors associated with it

l Start Time - Time the process started

l End Time - Time the process completed

TSM Migrated Item Count by Storage PoolReturns the total number of items migrated by storage pool over the period specified in acolumn chart. Uses data from the TSM Total Items Migrated By Storage Pool data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool from which data has been migrated

l Items - Total number of items migrated from the storage pool

l Input Volume - Name of the volume from which data has been migrated

TSM Migrated Size by Storage PoolReturns the total amount of data migrated by storage pool in a column chart. Uses datafrom the TSM Total Size Migrated By Storage Pool data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool

l Size - Total amount of data migrated from the storage pool (in MB)

TSM Migration Errors For Specific JobReturns information on the errors related to a specific migration job in a table report.Uses data from the TSM Migration Errors data source.

l Id - Unique identifier of the migration process matching with the Migration datasource

l Message ID - Message ID string corresponding to the error

l Error - Error message string

TSM Migration JobsReturns details of all TSM migration jobs in a table report. Uses data from the TSMBackup Set and TSM Migration data sources.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Process Id - Unique identifier used by TSM to identify the process

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool from which data has been migrated

l Input Volume - Name of the volume from which data has been migrated

l Output Volume - Name of the volume to which data has been transferred

Reports by System Template

288 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 289: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Status - Completion status of the migration process: Success, Failed

l Size - Amount of data migrated (in MB)

l Num Items - Total number of items migrated from the storage pool

l Error Flag - Indicates if the process returned any errors. Even if the process wassuccessful, it could have errors associated with it

l Throughput - Throughput of size to duration (MB/sec)

l Start Time - Time the process started

l End Time - Time the process completed

TSM Migration SummarySummary of all the TSM Migration jobs that have occurred on a server in a table report.Uses data from the TSM Backup Set, TSM Num Migration Jobs By Storage Pool, TSM TotalItems Migrated By Storage Pool, and TSM Total Size Migrated By Storage Pool datasources.

l Completed - Number of migration jobs that have completed

l Succeeded - Number of migration jobs that have succeeded

l Failed - Number of migration jobs that have failed

l Size - Total size of the migration jobs

l Items - Total number of items migrated from the storage pool

TSM Move ErrorsReturns TSM move error details in a table report. Uses data from the TSM Move Errorsdata source.

l ID - Unique identifier of the data move process matching with the TSM Move datasource

l Message ID - Message ID string corresponding to the error

l Error - Error message string

TSM MovesReturns TSM move details in a table report. Uses data from the TSM Move data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Status - Completion status of the data move process: Success, Failed

l Input Volume - Name of the volume from which data has been moved

l Output Volume - Name of the volume to which data has been moved

l Storage Pool - Name of the storage pool from which data has been moved

l Num Items - Total number of items moved from the storage pool

l Size - Amount of data moved (in MB)

l Un-Readable Files - Files that were not moved because they cannot be read

l Un-Readable Bytes - Bytes that were not moved because they cannot be read

Reports by System Template

TSM Migration Summary 289

Page 290: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Error Flag - Indicates if the process returned any errors. Even if the process wassuccessful, it could have errors associated with it

l Throughput - Throughput of size to duration (MB/sec)

l Start Time - Time the process started

l End Time - Time the process completed

TSM Reclaimed Item Count by Storage PoolReturns the total number of items reclaimed by storage pool in a column chart. Uses datafrom the TSM Total Items Reclaimed By Storage Pool data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool from which data has been reclaimed

l Items - Total number of items reclaimed from the storage pool

TSM Reclaimed Size by Storage PoolReturns the total amount of data reclaimed by storage pool in a column chart. Uses datafrom the TSM Total Size Reclaimed By Storage Pool data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool

l Size - Total amount of data reclaimed from the storage pool (in MB)

l Input Volume - Name of the volume from which data has been moved

l Start Time - Time the process started

TSM Reclamation Errors For Specific JobReturns errors for a specific reclamation job in a table report. Uses data from the TSMReclamation Errors data source.

l Server - Name of the TSM Server

l Id - Unique identifier of the migration process matching with the Reclamation datasource

l Message ID - Message ID string corresponding to the error

l Error - Error message string

TSM Reclamation JobsReturns all TSM reclamation jobs that have occurred in the last day in a table report. Usesdata from the TSM Reclamation data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Storage Pool - Name of the storage pool from which data has been reclaimed

l Input Volume - Name of the volume from which data has been reclaimed

Reports by System Template

290 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 291: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Output Volume - Name of the volume to which data has been transferred

l Status - Completion status of the reclamation process: Success, Failed

l Size - Amount of data reclaimed (in MB)

l Num Items - Number of items reclaimed

l Error Flag - Indicates if the process returned any errors. Even if the process wassuccessful, it could have errors associated with it

l Start Time - Time the process started

l End Time - Time the process completed

l Throughput - Throughput of size to duration (MB/sec)

TSM Reclamation SummarySummary of all the TSM Reclamation jobs that have occurred on a server in a table report.Uses data from the TSM Num Reclamation Jobs By Storage Pool, TSM Total ItemsReclaimed By Storage Pool, TSM Total Size Reclaimed By Storage Pool data sources.

l Completed - Number of reclamation jobs that have completed

l Succeeded - Number of reclamation jobs that have succeeded

l Failed - Number of reclamation jobs that have failed

l Size - Total amount of data reclaimed from the storage pool (in MB)

l Items - Total number of items reclaimed

TSM Storage Pool CopiesReturns TSM storage pool copy details in a table report. Uses data from the TSM StoragePool Copy data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Input Volume - Name of the volume from which the storage pool has been copied

l Output Volume - Name of the volume to which the storage pool has been copied

l Storage Pool - Name of the storage pool from which data has been copied

l Copy Storage Pool - Name of the storage pool to which data has been copied

l Status - Completion status of the storage pool copy process: Success, Failed

l Unreadable Bytes - Bytes that were not copied because they cannot be read

l Unreadable Files - Files that were not copied because they cannot be read

l Num Items - Number of items reclaimed from the storage pool

l Size - Amount of data reclaimed (in MB)

l Error Flag - Indicates if the process returned any errors. Even if the process wassuccessful, it could have errors associated with it

l Start Time - Time the process started

l End Time - Time the process completed

l Throughput - Throughput of size to duration (MB/sec)

Reports by System Template

TSM Reclamation Summary 291

Page 292: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

TSM Storage Pool Copy ErrorsReturns the errors associated with specific storage pool copy jobs in a table report. Usesdata from the TSM Storage Pool Copy Errors data source.

l Id - Unique identifier of the storage pool copy process matching with the TSM StoragePool Copy data source

l Message ID - Message ID string corresponding to the error

l Error - Error message string

TSM Successful Migration JobsReturns details of all successful TSM migration jobs in a table report. Uses data from theTSM Migration data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Storage Pool - Name of the storage pool from which data has been migrated

l Input Volume - Name of the volume from which data has been migrated

l Output Volume - Name of the volume to which data has been transferred

l Status - Completion status of the migration process: Success, Failed

l Size - Amount of data migrated (in MB)

l Num Items - Total number of items migrated from the storage pool

l Error Flag - Indicates if the process returned any errors. Even if the process wassuccessful, it could have errors associated with it

l Start Time - Time the process started

l End Time - Time the process completed

l Throughput - Throughput of size to duration (MB/sec)

TSM Successful Reclamation JobsReturns details on successful TSM reclamation jobs that have occurred in the last day in atable report. Uses data from the TSM Reclamation data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Storage Pool - Name of the storage pool from which data has been reclaimed

l Input Volume - Name of the volume from which data has been reclaimed

l Output Volume - Name of the volume to which data has been transferred

l Status - Completion status of the reclamation process: Success, Failed

l Size - Amount of data reclaimed (in MB)

l Num Items - Number of items reclaimed

Reports by System Template

292 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 293: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Error Flag - Indicates if the process returned any errors. Even if the process wassuccessful, it could have errors associated with it

l Start Time - Time the process started

l End Time - Time the process completed

l Throughput - Throughput of size to duration (MB/sec)

TSM Top 10 Backups with Worst Idle Wait TimesReturns TSM top ten backups with worst idle wait times in a table report. Uses data fromthe Backup Job Details and TSM Reclamation data sources.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions simultaneously accessing the device

l Queue Start - Time the process started queuing

l Start Time - Time the process started

l End Time - Time the process completed

l Idle Wait Time - Time Server spent waiting for backup client

TSM Top 10 Backups with Worst Media Wait TimesReturns TSM top ten backups with worst media wait times in a table report. Uses datafrom the Backup Job Details and TSM Reclamation data sources.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions simultaneously accessing the device

l Queue Start - Time the process started queuing

l Start Time - Time the process started

l End Time - Time the process completed

l Media Wait Time - Time Server spent waiting for backup media

Reports by System Template

TSM Top 10 Backups with Worst Idle Wait Times 293

Page 294: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

TSM Top 10 Clients with Worst Idle Wait TimesReturns TSM top ten clients with worst idle wait times in a table report. Uses data fromthe Backup Job Details and TSM Reclamation data sources.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Client - Name of the client backed up

l Idle Wait Time - Time Server spent waiting for backup client

TSM Top 10 Clients with Worst Media Wait TimesReturns TSM top ten clients with worst media wait times in a table report. Uses data fromthe Backup Job Details and TSM Reclamation data sources.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Client - Name of the client backed up

l Media Wait Time - Time Server spent waiting for backup media

Uncloned BackupsReturns details on backup jobs that have not been cloned in a table report. Uses datafrom the Uncloned Backup Jobs data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

Reports by System Template

294 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 295: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Storage Unit - Storage unit the policy is configured to use

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Size Transferred - Total size of the data transferred (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted fromthe Size Transferred field to return the Job size (in bytes)

l Archive Flag - Flag indicating whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Effective Path - Effective path of the Backup

l Error Code Summary - Error code summary associated with the error message

l Status Code Summary - Status code summary from the job

l Plugin Name - Plug-in name

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Reports by System Template

Uncloned Backups 295

Page 296: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Vault Job Media DetailsReturns a list of volumes that a vault job was written to in a table report. Uses data fromthe NetBackup Vault Job Media data source.

l Volume Id - Unique identifier of the volume

l State - State of the media

l Pool - Pool to which the volume belongs

l Online - Indicates if the media is online or not

l Jukebox - Jukebox in which the volume resides

l Slot - Jukebox slot occupied by the volume

l Expiry Date - Date of expiry of the volume

Database system templatesDPA gathers configuration and status information from a number of different databasecomponents, including the database server, databases, schemas, tables, indexes, anddatafiles. A wide range of reports provide visibility into the configuration and status ofthe database and configuration changes that have occurred over time.

DPA provides reports that allow you to:

l Monitor the overall storage utilization of the database.

l Identify the largest tables and indexes within the database.

The DPA database can be monitored without any additional licensing required.

The architecture of database products and the terminology used by different databasevendors is not consistent. To provide a consistent reporting interface for a variety ofdatabase products, DPA uses standardized terminology to describe the databaseelements that are monitored.

To view reports for backup databases, right-click the database or database group objectsin the configuration tree.

All Database ChangesReturns details about all changes made to the selected database objects in a tablereport. Uses data from the Database Config, Database Params, Database Server Config,Database Server Params, Database Server Status, Database Status, Datafile Config,Datafile Status, Index Config, Log File Configuration, Log File Status, Table Config,Tablespace Config, and Tablespace Status data sources.

l Server - Name of the server that hosts the database

l Type - Type of database component that was changed. For example, server, ortablespace

Reports by System Template

296 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 297: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Object - Name of the database object that was changed

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Connection StatusReturns connection status details in a table report. Uses data from the Connection Statusdata source.

l Server - Name of the server

l Sub Name - Name of TSM server instance

l Connection ID - Connection database identifier

l Database Name - Name of the database

l Connect Time - Time connection was established

l Status - Status of the connection: Active, Inactive, Killed

l Command - Current or most recent command processed by the connection

l Client Host - Originating host name for the connection

l Client User - Originating user name (operating system login name) for the connection

l Client PID - Originating client process ID (operating system process ID) for theconnection

l Client Application - Originating application for the connection

l Used CPU - Total used CPU runtime for this connection (in seconds)

l Used Memory - Total used memory for this connection (in MB)

l Number Logical Reads - Number of logical reads by this connection

l Number Reads - Number of physical reads made by this connection

Control File DetailsReturns control file details in a table report. Uses data from the Control File Configurationdata source.

l Server - Server identifier, usually of the type hostname-port

l Sub Name - Name of the Oracle instance

l Database Name - Name of the database

l Control File Name - Control file physical pathname

l Max Size - Maximum size of control file (in MB)

Database Change SummarySummary of all changes made to the selected database objects in a column chart. Usesdata from the Database Config, Database Params, Database Server Config, DatabaseServer Params, Database Server Status, Datafile Config, Datafile Status, Index Config, LogFile Configuration, Log File Status, Table Config, Tablespace Config, and TablespaceStatus data sources.

l Change - Type of change: Added, Deleted, Modified

l Changes Count - Amount of changes made

Reports by System Template

Connection Status 297

Page 298: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Type - Type of database component that was changed. For example, server ortablespace

Database Config Changes for rulesetReturns the database configuration changes in a table report. Report for Databaseconfiguration changed rule. Uses data from the Database Server Status, Table Config,Database Params, Datafile Config, Index Config, Tablespace Status, Datafile Status,Database Server Params, Database Status, Database Server Config, Tablespace Config,Log File Status, Database Config, Log File Configuration data sources.

l Server - Name of the server

l Sub Name - Name of the Oracle instance

l Alert - Identifier of the alert

Database DetailsReturns database details in a table report. Uses data from the Database Config, DatabaseStatus, Datafile Config, Index Config, Table Config, Tablespace Config, and PartitionConfig data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Creation Date - Database creation date timestamp

l Status - Status of the database: Offline, Online, Restoring, Recovering, RecoveryPending, Suspect, Emergency

l Table Count - Total number of tables in the database

l Index Count - Total number of index tables in the database

l Tablespace Count - Total number of tablespaces in the database

l Datafile Count - Total number of datafiles in the database

l Num Partitions - Total number of partitions in the database

Database Details For ServerReturns database details for server in a table report. Uses data from the Database Config,Database Status, Datafile Config, Index Config, Table Config, Tablespace Config, andPartition Config data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Creation Date - Database creation date timestamp

l Status - Status of the database: Offline, Online, Restoring, Recovering, RecoveryPending, Suspect, Emergency

l Table Count - Total number of tables in the database

l Index Count - Total number of index tables in the database

l Tablespace Count - Total number of tablespaces in the database

l Datafile Count - Total number of datafiles in the database

Reports by System Template

298 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 299: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Num Partitions - Total number of partitions in the database

Database Last 10 ChangesReturns database last ten changes in a table report. Uses data from the Database ServerStatus, Table Config, Database Params, Datafile Config, Index Config, Tablespace Status,Datafile Status, Database Server Params, Database Status, Database Server Config,Tablespace Config, Log File Status, Database Config, Log File Configuration data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Type - Type of database component that was changed. For example, server ortablespace

l Object - Name of the database object that was changed

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp of the change

l Difference - Description of what changed if Modified was indicated

Database Parameter Change DetailsReturns database parameter change details in a table report. Uses data from theDatabase Params data source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Value - Parameter value

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Database ParametersReturns database parameter details in a table report. Uses data from the DatabaseParams data source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Parameter Name - Name of the parameter

l Value - Parameter value

Database Schema Details For ServerReturns database schema details for server in a table report. Uses data from the IndexConfig, Schema Config, and Table Config data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

Reports by System Template

Database Last 10 Changes 299

Page 300: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Schema Name - Name of the schema

l Table Count - Total number of tables in the tablespace

l Index Count - Number of indexes for the table

Database Server DetailsReturns database server details in a table report. Uses data from the Database Config,Database Server Config, Database Server Status, and Schema Config data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Vendor - Name of the database vendor. For example, Oracle

l Product - Name of the database product. For example, PostgreSQL

l Version - Version of the database product

l Max Connections - Maximum number of simultaneous connections allowed

l Status - Status of the server: Started, Mounted, Open, Open Migrate

l Status Time - Time of the last status change

l Database Count - Total number of databases of that product and version

l Schema Count - Total number of schemas belonging to database of that product andversion

Database Server Parameter Change DetailsReturns database server parameter change details in a table report. Uses data from theDatabase Server Params data source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Name - Name of the parameter

l Value - Value of the parameter

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp of the change

Database Server ParametersReturns database server parameters in a table report. Uses data from the DatabaseServer Params data source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Name - Name of the parameter

l Value - Value of the parameter

Datafile Configuration Change DetailsReturns datafile configuration change details in a table report. Uses data from theDatafile Config data source.

l Server - Name of the server that hosts the database

Reports by System Template

300 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 301: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

l Physical Name - Physical location (file system path) of the datafile

l Max Size - Maximum size of data store (in MB)

l Size Increment - Size by which the data store will grow (in MB)

l Percent Increment - Percentage by which the data store will grow

l Increment Type - Indicates if the data store will grow by incremental size orpercentage

l Auto Increment - Indicates if the logfile is set to grow automatically

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp of the change

l Difference - Description of what changed if Modified was indicated

Datafile DetailsReturns datafile details in a table report. Uses data from the Datafile Config and DatafileStatus data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

l Physical Name - Physical location (file system path) of the datafile

l Max Size - Maximum size of data store (in MB)

l Size Increment - Size by which the data store will grow (in MB)

l Percent Increment - Percentage by which the data store will grow

l Increment Type - Indicates if the data store will grow by incremental size orpercentage

l Auto Increment - Indicates if the logfile is set to grow automatically

l Size - Current size of the datafile (in MB)

l Size Used - Amount of space used in the datafile (in MB)

l State - Current state of datafile: Offline, Online, Recovery, Recovery Pending, Suspect,Defunct, System

Datafile Details for DatabaseReturns datafile details for database in a table report. Uses data from the Datafile Configand Datafile Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

Reports by System Template

Datafile Details 301

Page 302: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

l Physical Name - Physical location (file system path) of the datafile

l Size Increment - Size by which the data store will grow (in MB)

l Percent Increment - Percentage by which the data store will grow

l Increment Type - Indicates if the data store will grow by incremental size orpercentage

l Size Used - Amount of space used in the datafile (in MB)

l Size - Current size of the datafile (in MB)

l Max Size - Maximum size of data store (in MB)

l Auto Increment - Indicates if the logfile is set to grow automatically

l State - Current state of datafile: Offline, Online, Recovery, Recovery Pending, Suspect,Defunct, System

Datafile Details for TablespaceReturns datafile details for tablespace in a table report. Uses data from the DatafileConfig and Datafile Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

l Physical Name - Physical location (file system path) of the datafile

l Size Increment - Size by which the data store will grow (in MB)

l Percent Increment - Percentage by which the data store will grow

l Increment Type - Indicates if the data store will grow by incremental size orpercentage

l Size Used - Amount of space used in the datafile (in MB)

l Size - Current size of the datafile (in MB)

l Max Size - Maximum size of data store (in MB)

l Auto Increment - Indicates if the logfile is set to grow automatically

l State - Current state of datafile: Offline, Online, Recovery, Recovery Pending, Suspect,Defunct, System

Datafile UtilizationReturns the logical and actual utilization of datafile storage space in a table report. Usesdata from the Datafile Config and Datafile Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

Reports by System Template

302 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 303: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size - Current size of the datafile (in MB)

l Size Used - Amount of space used in the datafile (in MB)

l Current Utilization - Current usage of the datafile (as a percentage) (SQL Server andOracle only)

l Max Size - Maximum size of data store (in MB)

l Logical Utilization - Logical usage of the datafile as a percentage of the maximumpermitted datafile size (Oracle only)

Datafile Utilization Trend ChartReturns the logical and actual utilization trend of datafile storage space in a line chart.Uses data from the Datafile Config and Datafile Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

l Current Utilization - Current usage of the datafile (as a percentage) (SQL Server andOracle only)

l Logical Utilization - Logical usage of the datafile as a percentage of the maximumpermitted datafile size (Oracle only)

Datafile Utilization for TablespaceReturns the logical and actual utilization trend of datafile storage space in a table report.Uses data from the Datafile Config and Datafile Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

l Size - Current size of the datafile (in MB)

l Size Used - Amount of space used in the datafile (in MB)

l Current Utilization - Current usage of the datafile (as a percentage) (SQL Server andOracle only)

l Max Size - Maximum size of data store (in MB)

l Logical Utilization - Logical usage of the datafile as a percentage of the maximumpermitted datafile size (Oracle only)

Index Configuration Change DetailsReturns index configuration change details in a table report. Uses data from the IndexConfig data source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

Reports by System Template

Datafile Utilization Trend Chart 303

Page 304: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Schema Name - Name of the schema

l Index Name - Name of the table Index

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp of the change

l Difference - Description of what changed if Modified was indicated

Index Details For DatabaseReturns index details for database in a table report. Uses data from the Index Config andIndex Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Index Name - Name of the table Index

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Size - Total size of data held in index (in MB)

Index Details For SchemaReturns index details for schema in a table report. Uses data from the Index Config andIndex Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Index Name - Name of the table Index

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Size - Total size of data held in index (in MB)

Index Details For TablespaceReturns index details for tablespace in a table report. Uses data from the Index Configand Index Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

Reports by System Template

304 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 305: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Schema Name - Name of the schema

l Index Name - Name of the table Index

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Size - Total size of data held in index (in MB)

Index Details for TableReturns index details for table in a table report. Uses data from the Index Config andIndex Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Index Name - Name of the table Index

l Index Size - Total size of the table index

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

Logfile Configuration Change DetailsReturns logfile configuration change details in a table report. Uses data from the Log FileConfiguration data source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Logfile Name - Name of the log file

l Group Number - Group number associated with the log file (Oracle only)

l Physical Name - Path and filename of the log file

l Creation Time - Database creation time

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Logfile DetailsReturns log file details in a table report. Uses data from the Log File Configuration and LogFile Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Logfile Name - Name of the log file

Reports by System Template

Index Details for Table 305

Page 306: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Group Number - Group number associated with the log file (Oracle only)

l Physical Name - Path and filename of the log file

l Creation Time - Database creation time

l Size - Maximum size of log file (in MB)

l Size Used - Amount of space used in the log file (in MB)

l State - Status of the logfile: Offline, Online, Recovering, Recovery Pending, Suspect,Defunct, System, Active, Inactive, Unused, Current, Clearing, Clearing Current,Invalidated

Partition Details for DatabaseReturns partition details for database in a table report. Uses data from the PartitionConfig data source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Name - Name of the partition

l Table Name - Name of the database table

l Index Name - Name of the table index

l Tablespace Name - Name of the tablespace

Partition Details for IndexReturns partition details for index in a table report. Uses data from the Partition Configdata source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Name - Name of the partition

l Table Name - Name of the database table

l Index Name - Name of the table index

l Tablespace Name - Name of the tablespace

Partition Details for TableReturns partition details for table in a table report. Uses data from the Partition Configdata source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Name - Name of the partition

Reports by System Template

306 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 307: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Table Name - Name of the database table

l Index Name - Name of the table Index

l Tablespace Name - Name of the tablespace

Table Configuration Change DetailsReturns table configuration change details in a table report. Uses data from the TableConfig data source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Table Details for DatabaseReturns table details for database in a table report. Uses data from the Index Config,Index Status, Table Config, and Table Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Name - Name of database table

l Table Size - Total size of data in the table (in MB)

l Number Rows - Total rows in the table

l Is Partitioned - Indicates if this table is partitioned

l Tablespace Name - Name of the tablespace

l Index Size - Total size of data held in index (in MB)

l Index Count - Number of indexes for the table

l Total Size - Total size of the table and index (in MB)

Table Details for SchemaReturns table details for schema in a table report. Uses data from the Index Config, IndexStatus, Table Config, and Table Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

Reports by System Template

Table Configuration Change Details 307

Page 308: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Table Name - Name of the database table

l Table Size - Total size of data in the table (in MB)

l Number Rows - Total rows in the table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Index Size - Total size of data held in index (in MB)

l Index Count - Number of indexes for the table

l Total Size - Total size of the table and index (in MB)

Table Details for TablespaceReturns table details for tablespace in a table report. Uses data from the Index Config,Index Status, Table Config, and Table Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Number Rows - Total rows in the table

l Table Size - Total size of data in the table (in MB)

l Index Count - Number of indexes for the table

l Index Size - Total size of data held in index (in MB)

l Total Size - Total size of the table and index (in MB)

Tablespace Configuration Change DetailsReturns tablespace configuration change details in table report. Uses data from theTablespace Config and Tablespace Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Type - Type of tablespace: Undo, Temporary, Permanent

l State - Current state of the tablespace: Offline, Online, Read Only

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Reports by System Template

308 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 309: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Tablespace DetailsReturns tablespace details in a table report. Uses data from the Datafile Config, DatafileStatus, Index Config, Table Config, Tablespace Config, and Tablespace Status datasources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l TableSpace Name - Name of the tablespace

l Type - Type of tablespace: Undo, Temporary, Permanent

l State - Current state of the tablespace: Offline, Online, Read Only

l Is Read Only - Indicates whether the tablespace is read only

l Table Count - Total number of tables in the tablespace

l Index Count - Number of indexes for the table

l Datafile Count - Total number of datafiles in the tablespace

l Datafile Size - Total size of datafiles in the tablespace (in MB)

l Datafile Size Used - Total size used in datafiles in the tablespace (in MB)

Tablespace Details for DatabaseReturns tablespace for database details in a table report. Uses data from the DatafileConfig, Datafile Status, Index Config, Table Config, Tablespace Config, and TablespaceStatus data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Type - Type of tablespace: Undo, Temporary, Permanent

l State - Current state of the tablespace: Offline, Online, Read Only

l Is Read Only - Indicates whether the tablespace is read only

l Table Count - Total number of tables in the tablespace

l Index Count - Number of indexes for the table

l Datafile Count - Total number of datafiles in the tablespace

l Datafile Size - Total size of datafiles in the tablespace (in MB)

l Datafile Size Used - Total size used in datafiles in the tablespace (in MB)

Tablespace UtilizationReturns tablespace utilization details in a table report. Uses data from the Datafile Configand Datafile Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

Reports by System Template

Tablespace Details 309

Page 310: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Tablespace Name - Name of the tablespace

l Size - Current size of the datafile (in MB)

l Size Used - Amount of space used in the datafile (in MB)

l Current Utilization - Current usage of the datafile (as a percentage) (SQL Server andOracle only)

l Max Size - Maximum size of data store (in MB)

l Logical Utilization - Logical usage of the datafile as a percentage of the maximumpermitted datafile size (Oracle only)

Top 10 Growing Tables by RowsReturns the top ten growing tables by rows in a table report. Uses data from the TableStatus data source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Name - Name of the database table

l Number Rows After - Number of rows in the table at the start of the time period

l Number Rows Before - Number of rows in the table at the end of the time period

l Num Rows Grown By - Percentage increase in number of rows

Top 10 Largest Database Tables By Row CountReturns the top ten largest database tables by row count in a table report. Uses data fromthe Table Status data source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Name - Name of the database table

l Number Rows - Total number of rows in table

Top 10 Largest Database Tables By SizeReturns the top ten database tables by size in a table report. Uses data from the IndexConfig, Index Status, Table Config, and Table Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Name - Name of the database table

l Number Rows - Total number of rows in table

l Table Size - Total size of the table

Reports by System Template

310 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 311: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Index Size - Total size of the table index (in MB)

l Total Size - Total size of the table and index (in MB)

DPA system templatesThe following are descriptions of system templates in DPA:

Agent ErrorsReturns information about errors that have occurred on the agent in a table report. Usesdata from the Request History data source.

l Module - Name of the module that generated the error

l Error Message - String describing the error

l Agent - Hostname or IP Address of the DPA Data Collection Agent that is gathering thedata

l Function - Name of the function that generated the error

l Target - Name of the target machine monitored

l Count - Number of times the error occurred

l First Occurrence - First time the error occurred

l Last Occurrence - Last time the error occurred

Analysis Engine HistoryReturns details about any jobs run by the analysis engine in a table report. Uses datafrom the Analysis History data source.

l Server - Server on which the analysis job ran

l Analysis Name - Name of the analysis

l Ruleset Name - Name of the rule used by the analysis

l View - Group on which the analysis job ran

l Object - Object against which the analysis job ran

l Status - Indicates whether the analysis successfully ran or not

l Total Time - Total time taken for the analysis job to run (in seconds)

l Scheduled Time - Time the analysis job was scheduled to run

Analysis Engine PerformanceReturns the status of the Analysis Engine over a time period in a column chart. Uses datafrom the Analysis Engine Status data source.

l Server - Server on which the analysis jobs are running

l Running - Number of analyses that are currently running

l Waiting - Number of analyses that are queued to run

l Assigned - Number of analyses that are assigned to run

Reports by System Template

DPA system templates 311

Page 312: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

DPA Client License Details for rulesetReturns DPA client license details in a table report. Report for Running out of backupclient licenses rule. Uses data from the DPA Enabler Activity, License Configuration, andUser Input data sources.

l Alert - Identifier of the alert

DPA Collector LogReturns information about messages that have been logged by the collector process in atable report. Uses data from the Process Log data source.

l Server - Name of the server that is running the agent: DPA

l Level - Severity of message: Fatal, Warn, Error, Info, Debug, Debug low, Trace

l Host Name - Name of the host from which the message was generated

l Process - Server process that generated the message: controller, reporter, listener,publisher, ae (analysis engine), webapp, agent, gui, tool, installer

l Process Id - Identifier of the process that generated the message

l Thread Id - Identifier of the thread from which the message generated

l Context - Any additional information about the message source

l Location - Code location that was the source of the error message (for C this is themodule name, for Java this is the class name)

l Function - Function in the code that was the source of the error message (relative tothe Location field)

l Message - First 2000 characters of the message

l Timestamp - Timestamp of the message

DPA Listener LatencyReturns listener performance information. Displays latency in milliseconds over time in aline chart. Uses data from the DPA Metrics data source.

l Server - Name of the DPA server

l Latency - The 99th percentile latency (in milliseconds)

DPA Listener Request RateReturns listener performance. Displays request rate (requests/second) over time in a linechart. Uses data from the DPA Metrics data source.

l Server - Name of the DPA Server

l Request Rate - Rate at which requests are processed (in requests/second)

DPA Reporter Median Report Run TimeDisplays the median time taken to run a report over time in a line chart. Uses data fromthe DPA Metrics data source.

l Server - Name of the DPA Server

Reports by System Template

312 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 313: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Median - The median time taken to run a report

DPA Server LogsReturns information about messages that have been logged by the DPA server process ina table report. Uses data from the Process Log data source.

l Server - Name of the Server running the agent: DPA

l Level - Severity of message: Fatal, Warn, Error, Info, Debug, Debug low, Trace

l Host Name - Name of the host from which the message was generated

l Process - Server process that generated the message: controller, reporter, listener,publisher, ae (analysis engine), webapp, agent, gui, tool, installer

l Process Id - Identifier of the process that generated the message

l Thread Id - Identifier of the thread from which the message generated

l Context - Any additional information about the message source

l Location - Code location that was the source of the error message (for C this is themodule name, for Java this is the class name)

l Function - Function in the code that was the source of the error message (relative tothe Location field)

l Message - First 2000 characters of the message

l Timestamp - Timestamp of the message

HTTP Request Performance StatisticsReturns HTTP request performance statistics in a table report. Uses data from the HTTPRequest Performance Statistics data source.

l Server - Name of the Server running the agent: DPA

l Client Host -

l Request Method -

l Response Code -

l Time Taken in Milliseconds -

l URL -

l Request ID -

l Start Time -

l End Time -

Listener PerformanceReturns listener performance details in a table report. Uses data from the Listener Statusdata source.

l Server - Name of the server on which the listener is installed

l Queue Length - Length of the queue inside the Listener

l Queries - Number of database queries performed (/second

l Preprocessing Errors - Number of errors the listener encountered while parsing datareceived from Data Collection Agents

l Processing Errors - Number of SQL errors the listener encountered while insertingdata into the database

Reports by System Template

DPA Server Logs 313

Page 314: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Listener Busy Errors - TNumber of times the listener has sent a busy message back toa Data Collection Agent to tell it that it has reached the Listener’s maximum queuesize

Node ListReturns a list of objects in a table report. Uses data from the Node Details data source.

l Node - Name of the object

Node TopologyReturns object topology details in a topology report. Uses data from the Node TopologyReport datasource.

l Source - Source name

l Name -

l Parameters - Parameters names

l Target - Target name

l Node - Node name

l Type - Type of array

l Label - Name of the field returned

l ReportObject -

l ToolTip -

l Group - Name of the group

Objects with Replication ExposuresReturns objects with replication alerts in a table report. Uses data from the Objects withReplication Exposures data source.

l Node Name - Name of the object

l Number of replication alerts - Number of replication alerts

Publisher PerformanceReturns details about the number of reports scheduled and running on the DPA server ina column chart. Uses data from the Publisher Status data source.

l Server - Server on which the scheduled reports are running

l Running - Number of scheduled reports that are currently running

l Waiting - Number of scheduled reports that are queued to run

l Assigned - Number of scheduled reports that are assigned to run

Replication Alerts by Age by GroupReturns alerts exposure by age by group in a table report. Uses data from the ReplicationAlerts by Group by Age data source.

l Group Name - Name of the group

l Over 3 Weeks - Alerts over three weeks old

l 1-3 Weeks - Alerts one to three weeks old

Reports by System Template

314 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 315: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l 1-6 days - Alerts one to six days old

Replication Alerts by GroupReturns alerts by group in a table report. Uses data from the Replication Alerts by Groupdata source.

l Group Name - Name of the group

l Critical Alerts - List of critical alerts

l Other Alerts - List non-critical alerts

Report HistoryReturns details about reports that have been run from the Analysis Engine and thePublisher in a table report. Uses data from the Report History data source.

l Id - Unique identifier for the report

l Server - Server on which the report was run

l Report - Name of the report or control panel

l User - Name of the user that ran the report

l Object - Name of the objects that the report was ran against

l Status - Indicates whether the report was successful

l Period - Duration of the time window selected for the report (in seconds)

l Total Time - Total time that the report took to run

l Datasource Time - Total time that was spent processing data sources (in seconds)

l Num Datasource Values - Total number of rows and fields returned from all datasources)

l Num Result Values - Total number of rows and fields returned from the report afterprocessing by any operators

l Start Time - Time the report started

l End Time - Time the report finished

l Run Origin - Identifies the origin

Request HistoryReturns details about requests that have run for an object in a table report. Uses datafrom the Request History data source.

l Module - Name of the module that is performing the data collection. For example,EMC RecoverPoint

l Error Message - Messages associated with request

l Agent - Hostname or IP Address of the DPA Data Collection Agent that is gathering thedata

l End Time - Time the request completed

l Start Time - Time the request started

l Function - Name of the function that is performing the data collection

l Target - Name of the target machine monitored

l Status - Status of the last run of the request

Reports by System Template

Replication Alerts by Group 315

Page 316: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Run ID - An internal field for replication analysis

l Report Size - Size of the report returned

Scheduled Report HistoryReturns details of scheduled reports that have been run from the Publisher in a tablereport. Uses data from the Report History and Scheduled Report Forecast data sources.

l Server - Server on which the scheduled reports were run

l Report Name - Name of the report or control panel used by the scheduled report

l Scheduler Start Time - Time that the scheduled report is expected to run

l Object - Name of the object that the report will be ran against

l User - Name of the user that ran the report

l Status - Indicates whether the report was successful

l Total Time - Total time that the report took to run

l Start Time - Time the report started

l End Time - Time the report finished

Unsupported AgentsReturns information on unsupported DPA Data Collection Agents in a table. Uses datafrom the Agent Configuration data source.

l Agent Name - Name of the DPA data collection agent

l Version - Version of the agent

Licensing system templatesLicensing reports display information on the licenses configured on the backup servers.

Expired Licenses for rulesetReturns expired license details in a table report. Report for Expired Licenses rule. Usesdata from the License Configuration data source.

l Node - Name of the object

l Sub Name - Name of TSM server instance

l Alert - Identifier of the alert

License ConformanceReturns license conformance details in a table report. Uses data from the LicenseConformance data source.

l Node - Name of the object

l Sub Name - Name of TSM server instance

l License Name - Name of the license

l Num Licensed - Number of licenses bought

l Num Used - Number of licenses used

Reports by System Template

316 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 317: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Conformance - Conformance rating percentage

l Notes - License notes

License DetailsReturns the total and used number of DPA client and capacity type licenses in a tablereport. Uses data from the License Configuration data source.

l Node - Name of the object

l Sub Name - Name of TSM server instance

l Product - Product on which the license acts

l Identifier - Text which identifies the license function

l Code - Internal code which identifies the license function

l Instance - Instance of this license on this object

l Tier - Tier to which this license applies, if any

l Platform - Platform to which this license is restricted, if any

l Description - Informative description of the license function

l Instances - How many instances of the function is provided by this license

l Valid - Indicates if the license is currently valid

l Expires - Indicates when this license expires, if ever

License Details - ExpiredReturns the licenses that have expired details in a table report. Uses data from theLicense Configuration data source.

l Node - Name of the object

l Sub Name - Name of TSM server instance

l Product - Product on which the license acts

l Identifier - Text which identifies the license function

l Code - Internal code which identifies the license function

l Instance - Instance of this license on this object

l Tier - Tier to which this license applies, if any

l Platform - Platform to which this license is restricted, if any

l Description - Informative description of the license function

l Instances - How many instances of the function is provided by this license

l Valid - Indicates if the license is currently valid

l Expires - Indicates when this license expires, if ever

License SummarySummary of the licenses configured in a table report. Uses data from the LicenseConfiguration data source.

l Identifier - Text which identifies the license function

l Instances - How many instances of the function is provided by this license

Reports by System Template

License Details 317

Page 318: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Nearly Expired Licenses for rulesetReturns nearly expired licenses in a table report. Report for Licenses Nearing Expirationrule. Uses data from the License Configuration, Report Times, and User Input datasources.

l Node - Name of the object

l Alert - Identifier of the alert

Media management system templatesMedia Management reports display information on the media configured on the backupapplication.

The two types of Media Management reports include:

l Overviews, which are high level reports that summarize media utilization.

l Detailed Media reports, which are detailed reports about individual volumes.

For more specific details on the various reports, select one of the reports described in thefollowing sections.

Backup Device Number Of Volumes Mounted By DeviceReturns the number of volumes mounted on each device in a column chart. Uses datafrom the Number of Volumes by Device data source.

l Device Host - Host to which the backup device is assigned

l Device Name - Name of the backup device

l Number of Volumes - Number of volumes that have been mounted in the device overthe specified period

Backup Device Number Of Volumes Mounted By NodeReturns the number of volumes mounted on each object in a column chart. Uses datafrom the Number of Volumes by Device data source.

l Device Host - Host to which the backup device is assigned

l Number of Volumes - Number of volumes that have been mounted in the device overthe specified period

Backup Device Number Of Volumes Mounted Daily By DeviceReturns the number of volumes mounted each day on each device in a column chart.Uses data from the Number of Volumes by Device data source.

l Device Host - Host to which the backup device is assigned

l Device Name - Name of the backup device

l Number of Volumes - Number of volumes that have been mounted in the device overthe specified period

Reports by System Template

318 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 319: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Jukebox Number Of Volumes Mounted DailyReturns the number of volumes mounted each day on each jukebox in a column chart.Uses data from the Number of Volumes by Jukebox data source.

l Jukebox - Name of the jukebox

l Number of Volumes - Number of volumes that have been mounted in the jukeboxover the specified period

Empty Media By JukeboxReturns empty media by jukebox details in a table report. Uses data from the MediaCount By Location data source.

l Server - Name of the backup server

l Jukebox - Name of the jukebox in which the media is located

l Media Count - Total number of volumes configured on each backup server

Empty Media By Jukebox RAGReturns empty media by jukebox Red, Amber, Green (RAG) traffic-light style report in ahealth status chart. Uses data from the Media Count By Location data source.

l Server - Name of the backup server

l Media Count - Total number of volumes configured on each backup server

Empty Media by Pool and JukeboxReturns empty media by pool and jukebox details in a table report. Uses data from theMedia Count By Pool and Location data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l Pool - Pool to which the volume belongs

l Media Count - Total number of volumes configured on each backup server

Media Age DistributionReturns all the media configured on a backup server in a column chart. It identifies howold each tape is based on the last time to which the tape was written. Uses data from theMedia Details data source.

l Range -

l Items -

Media ContentsReturns the contents of jobs on a tape in a table report. Uses data from the MediaContents data source.

l Id - Unique identifier for a backup Job stored on the volume

l Server - Name of the backup server on which the Job took place

Reports by System Template

Backup Jukebox Number Of Volumes Mounted Daily 319

Page 320: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Sub Name - Name of the TSM server instance

l Media Server - Name of the Media Server to which the Job was backed up

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Status - Status of the Job backed up: Success, Failed

l Err Code - Error code from the backup application, if available

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Queue Start - Time the Job started queuing

l Files Scanned - Number of files scanned. This value is not available from all backupapplications

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Expiry Date - Date that a Job will expire

Media CountReturns the total number of volumes configured on each backup server in a column chart.Uses data from the Media Count data source.

l Media Count - Total number of volumes configured on each backup server

Media Count Available Volumes By JukeboxReturns media count available volumes by jukebox in a column chart. Uses data from theMedia Count By Location and Media Count By State and Location data sources.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count By Jukebox and StateReturns media count by jukebox and state in a column chart. Uses data from the MediaCount By State and Location data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

Reports by System Template

320 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 321: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Media Count - Total number of volumes configured on each backup server

Media Count By PoolReturns the number of volumes managed by the backup servers selected broken down bypool over time in a column chart. Uses data from the Media Count By Pool data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Pool - Name of the pool to which the volume belongs

l Media Count - Total number of volumes configured on each backup server

Media Count By Pool and StateReturns the number of volumes in a specific state in each individual pool trended overtime in a column chart. Uses data from the Media Count By Pool and State data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Pool - Name of the pool to which the volume belongs

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count By Pool and State for rulesetReturns the media count by pool and state in a table report. Report for Empty tapesrunning low rule. Uses data from the Media Count By Pool and State and User Input datasources.

l Server - Name of the backup server

l Alert - Identifier of the alert

Media Count By ServerReturns the media count by server in a column chart. Uses data from the Media Countdata source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Media Count - Total number of volumes configured on each backup server

Media Count By StateReturns the number of volumes managed by the backup servers calculated by state overtime in a column chart. Uses data from the Media Count By State data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Reports by System Template

Media Count By Pool 321

Page 322: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Media Count of Offline Expired VolumesReturns the total number of expired volumes that are offline in a column chart. This reportenables bringing them back from offline for reuse. Uses data from the Media Count datasource.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Media Count - Total number of volumes configured on each backup server

Media Count of Online/Offline VolumesReturns media count of online and offline volumes in a column chart. Uses data from theMedia Count data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count Volumes Used By JukeboxReturns the total number of volumes used in each jukebox over the reporting period toenable planning future tape usage based on historical usage in a column chart. Usesdata from the Media Count By Location data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l Media Count - Total number of volumes configured on each backup server

Media DetailsReturns details of all voumes on a server in a table report. Uses data from the MediaDetails data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)(TSM only)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

Reports by System Template

322 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 323: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE,OFFSITE, DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Cleaning TapesReturns details of all cleaning tapes on a server in a table report. Uses data from theMedia Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)(TSM only)

l Online - Indicates if the volume is online

Reports by System Template

Media Details For Cleaning Tapes 323

Page 324: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE,OFFSITE, DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Empty VolumesReturns details of all empty volumes on a server in a table report. Uses data from theMedia Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

Reports by System Template

324 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 325: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)(TSM only)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE,OFFSITE, DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Frozen VolumesReturns details of all frozen volumes on a server in a table report. Uses data from theMedia Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

Reports by System Template

Media Details For Frozen Volumes 325

Page 326: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)(TSM only)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE,OFFSITE, DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Reports by System Template

326 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 327: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Media Details For Full VolumesReturns details of all volumes that are full in a table report. Uses data from the MediaDetails data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)(TSM only)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

Reports by System Template

Media Details For Full Volumes 327

Page 328: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE,OFFSITE, DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Offline Expired VolumesReturns details of all offline volumes that have expired in a table report. Uses data fromthe Media Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)(TSM only)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

Reports by System Template

328 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 329: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE,OFFSITE, DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details for Offline VolumesReturns details of all volumes that are not online in table reports. Uses data from theMedia Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)(TSM only)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

Reports by System Template

Media Details for Offline Volumes 329

Page 330: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE,OFFSITE, DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Online VolumesReturns details of all volumes that are online in a table report. Uses data from the MediaDetails data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)(TSM only)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

Reports by System Template

330 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 331: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE,OFFSITE, DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Partial VolumesReturns details of all partially full volumes in a table report. Uses data from the MediaDetails data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)(TSM only)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

Reports by System Template

Media Details For Partial Volumes 331

Page 332: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE,OFFSITE, DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Used VolumesReturns information on all tapes that have been written to during the reporting period in atable report. Uses data from the Media Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)(TSM only)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

Reports by System Template

332 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 333: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE,OFFSITE, DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details of Available VolumesReturns information on all tapes that are either Empty or Partially Full or that have expiredand are available for reuse in a table report. Uses data from the Media Details datasource.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)(TSM only)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

Reports by System Template

Media Details of Available Volumes 333

Page 334: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE,OFFSITE, DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details Top 10 Oldest VolumesReturns media details top ten oldest volumes in a table report. Uses data from the MediaDetails data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)(TSM only)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

Reports by System Template

334 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 335: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE,OFFSITE, DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details With Retention Over 8 YearsReturns media details with retention greater than or equal to eight years in a table report.Uses data from the Media Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)(TSM only)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

Reports by System Template

Media Details With Retention Over 8 Years 335

Page 336: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE,OFFSITE, DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Retention DistributionReturns media retention distribution, when retention data is available, in a column chart,Uses data from the Media Details data source.

l Range -

l Items -

Media Size DistributionReturns distribution of how much media is stored on each tape in a column chart. Usesdata from the Media Details data source.

l Range Volumes -

Reports by System Template

336 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 337: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Media SummaryReturns the number of volumes and usage broken by several statistics in a table report.Uses data from the Media Count and Media Usage data sources.

l Media Count - Total number of volumes configured on each backup server

l Media Usage - Total amount of data stored on all media (in MB)

Media UsageReturns the amount of data that is stored on media in a column chart. Uses data from theMedia Usage data source.

l Media Usage - Total amount of data stored on all media (in MB)

Media Usage By PoolReturn the total amount of data stored on media calculated by pool in a line chart. Usesdata from the Media Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Pool - Pool in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

Media Usage By ServerReturn the total amount of data stored on media calculated by server in a column chart.Uses data from the Media Usage data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Media Usage - Total amount of data stored on all media (in MB)

Media Reclamation DistributionReturns media reclamation distribution details in a column chart. Uses data from theMedia Details data source.

l Range -

l Items -

RPO Violation DetailsReturns RPO violation details in a table. Uses data from the RPO Violation Details datasource.

l Recover point name -

l CG copy name -

l Policy name -

l Description -

l Severity -

l Category -

Reports by System Template

Media Summary 337

Page 338: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Root CauseReturns root cause for protection processes errors in a table. Uses data from the RootCause Report data source.

l Root Cause - Name of the event that exists on the object in the data path. Forexample, Backup agent is down on backup client

l Object (Type) - Name of the object where the event exists

l #Affected Objects - Number of objects the event affected in the duration of the failedbackup job

l #Affected Alerts - Number of times the event occurred in the duration of the failedbackup job

l First Occurrence - First time the event occurred in the duration of the failed backupjob

l Last Occurrence - Last time the event occurred in the duration of the failed backup job

Root Cause for CG DetailsReturns root cause consistency group error details in a table. Uses data from the RootCause For CG Details data source.

l Server - Name of the RecoverPoint management server

l CG - Name of consistency group

l Source Site - Name of the source site/cluster of the replication

l Source CG Copy - Name of the source CG copy of the replication

l Target Site - Name of the target site/cluster of the replication

l Target CG Copy - Name of the target CG copy of the replication

l Replication Type - Type of replication technology

l Replication State - State of the replication

l Peak Time Lag - Peak time lag in replication of the copy over the last polling period

l Required RPO - RPO defined in the data protection policy for the protected object

Root Cause for Job DetailsReturns root cause for job error details in a table. Uses data from the Root Cause For JobDetails data source.

l Job Name - Name of the job

l Group - Name of the group in which the job occurred

l Client - Name of the client on which the job took place

l Status - Status of the job: Success, Failed

l Started - Time the job started writing

l Finished - Time the job completed

l Error Code - Error code associated with the job

Reports by System Template

338 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 339: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

TSM DR MediaReturns TSM disaster recovery media details in a table report. Uses data from the TSMDisaster Recovery Media data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Location - Location of the host, if any

l State - State of the media: MOUNTABLE, NOTMOUNTABLE, COURIER, VAULT,VAULTRETRIEVE, COURIERRETRIEVE, REMOTE

l Pool - Pool in which the volume is located

l Library Name - Name of the library in which the volume is located

l Volume Type - Type of volume

l Last Update - Date the volume was last updated

Volume Expiration ReportReturns a distribution report showing when media is expected to expire in a columnchart. Uses data from the Media Details data source.

l Count - Number of volumes due to expire

l

Operations system templates

Backup Device AvailabilityReturns backup device availability details in a table report. Uses data from the BackupDevice Status data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Host - Name of the host to which the device is attached

l Total - Amount of backup devices

l Up -

l Available - Backup devices that are available

Backup Device Availability By ServerReturns backup device availability by server in a column chart. Uses data from theBackup Device Status data source.

l Server - Name of the backup server

l Status - Status of the drive: Up, Down, Service

l Value -

Reports by System Template

TSM DR Media 339

Page 340: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Device Availability RAGReturns backup device availability Red, Amber, Green (RAG) traffic-light style report in atable report. Uses data from the Backup Device Status data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Available - Backup devices that are available

Backup Mount RequestsReturns any mounts for which a device is waiting in a table report. Uses data from theBackup Pending Mounts data source.

l Server - Name of the backup server for the outstanding request

l Type - Indicates if the tape is required for backup or restore

l Volume - Volume label of the tape required, if known

l Pool - Pool of the volume that is required

l Number Outstanding - Number of tapes that are being waited on

l Since - Amount of time that the server has been waiting for the tapes

l Severity - Severity of the failure

Empty Media plus Device AvailabilityReturns empty media plus device availability in a table report. Uses data from the BackupDevice Status and Media Count By Location data sources.

l Server - Name of the backup server

l Available - Available devices

l Empty Media - Empty media

Performance system templatesPerformance reports provide you with information to analyze the performance of backupclients and devices. There are two types of performance reports:

l Backup Client Performance

l Device Performance

Rather than just success or failure, the DPA user now has the time to look for largestclients, slowest clients, most unreliable clients and make efforts to identify and addressany issues.

A list of the slowest clients within a backup environment is key to improving the overallefficiency of the backup system. By focusing on the slowest backup clients in a largebackup environment the overall throughput of the system can be raised significantly,often with no extra purchases beyond some minor infrastructure upgrades. It can act as atargeted work list for a backup system administrator to fix problems and suggestupgrades; improving the backup system in the most cost effective manner.

Reports by System Template

340 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 341: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Aggregate Disk ActivityReturns information on disk drive activity in a line chart. Uses data from the Disk Activitydata source.

l Busy - Average activity level for the disks (as a percentage)

Aggregate Disk OperationsReturns information on aggregate disk operations in a line chart. Uses data from the DiskPerformance data source.

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

l Sectors Read - Number of sectors read

l Sectors Written - Number of sectors written to

Aggregate Disk PerformanceReturns information on disk drive performance in a line chart. Uses data from the DiskPerformance data source.

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Bytes Transferred - Number of kilobytes transferred from disk

Aggregate Fibre Channel Device PerformanceReturns information on Fibre Channel device performance in a line chart. Uses data fromthe Fibre Channel Device Performance From Switch data source.

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

Aggregate Fibre Channel Port PerformanceReturns information on Fibre Channel performance in a line chart. Uses data from theFibre Channel Performance data source.

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

l Frame In - Number of frames received (1000s/second)

l Frames Out - Number of frames sent (1000s/second)

Aggregate LUN PerformanceReturns performance information for all LUNs in a line chart. Uses data from the LUNPerformance data source.

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

Reports by System Template

Aggregate Disk Activity 341

Page 342: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Aggregate Processor UtilizationReturns information on the average CPU utilization for a group of hosts in a line chart.Uses data from the Processor Utilization data source.

l Processor Utilization - Utilization on the processor (as a percentage)

Aggregate Tape Drive PerformanceReturns information on tape drive performance in a line chart. Uses data from the TapeDrive Performance data source.

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Total Throughput - Data throughput for reads and writes (KB/second)

Aggregate Tape Library Drive PerformanceReturns information on tape drive performance broken down by switch in a line chart.Uses data from the Tape Drive Performance From Switch data source.

l Data Out - Data out of the switch (KB/second)

Aggregate Virtual Fibre Channel Port PerformanceReturns the virtual Fibre Channel port performance in line chart. Uses data from the FibreChannel Performance data source.

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

l Frame In - Number of frames received (1000s/second)

l Frames Out - Number of frames sent (1000s/second)

Backup Client Performance DistributionReturns the average spread of client performance across all clients in a column chart.Uses data from the Backup Job Details data source.

l Range -

l Items -

Backup Client Slowest/Fastest Jobs for ClientReturns the slowest and fastest clients based on the throughput of backup jobs that haverun on the clients in a table report. Uses data from the Backup Job Details data source.

In order to calculate the throughput of a client, only full backups that are more than 1 GBin size are considered. Incremental backups can spend a long time scanning a file systembefore sending data which can lead to an incorrect calculation of the overall throughput.Backups of less than 1 GB usually complete so quickly that the throughput calculatedmay not be accurate. If required, either of these parameters can be modified in the ReportEditor.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

Reports by System Template

342 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 343: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Proxy - Proxy backup host

l Session - Number of sessions simultaneously accessing the device

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l App Type - Name of the TDP that was used to perform the backup

l Size Offset - Number of bytes that should be added or subtracted from the Size fieldto return the Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from theSize Scanned field to return the Save Set size in bytes

l Size Transferred Offset - Number of bytes that should be added or subtracted fromthe Size Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Owner - Owner of the backup job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

Reports by System Template

Backup Client Slowest/Fastest Jobs for Client 343

Page 344: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Parent Job ID - NetBackup job ID of the parent job

l Duration - Duration of a Job

l Retention - Retention days

l Average File Size - Average size of each file

l Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Files Scanned - Number of files scanned

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Expires - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Transferred - Total size of the data transferred (in MB)

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Job ID 2 - NetBackup Job ID in the activity log

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Device Avg/Max Throughput by DeviceReturns backup device average and maximum throughput by device in a column chart.Uses data from the Tape Drive Performance From Best Source data source.

l Device Host - Name of the host that the device is connected to

l Device Name - Name of the device

l Average Throughput - Average of the write and read throughput (KB/second)

l Maximum Throughput - Maximum of the write and read throughput (KB/second)

Backup Device Performance SummarySummary of backup device performance in a table report. Uses data from the Tape DrivePerformance From Best Source data source.

l Read Throughput - Throughput of the device when performing read operations (KB/second)

l Write Throughput - Throughput of the device when performing write operations (KB/second)

Reports by System Template

344 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 345: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Write Activity - Time that the drive has spent performing write operations (as apercentage)

l Read Activity - Time that the drive has spent performing read operations (as apercentage)

l Total Activity - Time that the drive has spent performing read and write operations (asa percentage)

Backup Device Performance Summary By DeviceSummary of backup device performance by device in a table report. Uses data from theTape Drive Performance From Best Source data source.

l Device Host - Name of the host that the device is connected to

l Device Name - Name of the device

l Average Read Throughput - Average throughput of the drive during the reportingwindow, when performing read operations (KB/second)

l Average Write Throughput - Average throughput of the drive during the reportingwindow, when performing write operations (KB/second)

l Write Activity - Time that the drive has spent performing write operations (as apercentage)

l Read Activity - Time that the drive has spent performing read operations (as apercentage)

l Max Read Throughput - Throughput of the device when performing read operations(KB/second)

l Max Write Throughput - Throughput of the device when performing write operations(KB/second)

l Total Activity - Time that the drive has spent performing read and write operations (asa percentage)

Backup Device Throughput AggregateReturns backup device throughput aggregate details in a line chart. Uses data from theTape Drive Performance From Best Source data source.

l Throughput - Average of the write and read throughput (KB/second)

Backup Device Throughput by DeviceReturns backup device throughput by device details in a line chart. Uses data from theTape Drive Performance From Best Source data source.

l Device Host - Name of the host that the device is connected to

l Device Name - Name of the device

l Throughput - Average of the write and read throughput (KB/second)

Backup Device Throughput for DeviceReturns backup device throughput for device details in a line chart. Uses data from theTape Drive Performance From Best Source data source.

l Device Host - Name of the host that the device is connected to

l Device Name - Name of the device

Reports by System Template

Backup Device Performance Summary By Device 345

Page 346: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Read Throughput - Throughput of the device when performing read operations (KB/second)

l Write Throughput - Throughput of the device when performing write operations (KB/second)

Backup Top 10 Fastest ClientsReturns the top ten fastest clients based on the throughput of backup jobs that have runon the clients in a table report. Uses data from the Backup Job Details data source.

In order to calculate the throughput of a client, only full backups that are more than 1 GBin size are considered. Incremental backups can spend a long time scanning a file systembefore sending data which can lead to an incorrect calculation of the overall throughput.Backups of less than 1 GB usually complete so quickly that the throughput calculatedmay not be accurate. If required, either of these parameters can be modified in the ReportEditor.

The Backup Top 10 Fastest Clients report can be used to identify the Fastest machines inthe environment to benchmark how fast backups are running.

l Client - Name of the client backed up

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Cumulative Time Active -

l Throughput - Average of the write and read throughput (MB/second)

l Scanned Throughput - Scanned throughput (MB/second)

l Jobs -

l Act Thruput - (MB/second)

Backup Top 10 Slowest ClientsReturns the top ten slowest clients based on the throughput of backup jobs that have runon the clients in a table report. Uses data from the Backup Job Details data source.

l Client - Name of the client backed up

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Cumulative Time Active -

l Throughput - Average of the write and read throughput (MB/second)

l Scanned Throughput - Scanned throughput (MB/second)

l Jobs -

l Act Thruput - (MB/second)

Reports by System Template

346 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 347: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Celerra Replication PerformanceReturns Celerra replication performance details in a line chart. Uses data from the CelerraReplication Performance data source.

l Server - Hostname or IP address of the EMC Celerra being monitored

l Name - Name of the replication set

l Current Transfer Rate - Total amount of data being read and written to the replicationlink (KB/second)

l Current Read Rate - Amount of data being read from the replication link (KB/second)

l Current Write Rate - Amount of data being written to the replication link (KB/second)

Celerra Replication Performance SummarySummary for Celerra replication performance details in table report. Uses data from theCelerra Replication Performance data source.

l Server - Hostname or IP address of the EMC Celerra being monitored

l Name - Name of the replication set

l Average Transfer Rate - Average amount of data being read and written to thereplication link (KB/second)

l Average Read Rate - Average amount of data that has been read from the replicationlink (KB/second)

l Average Write Rate - Average amount of data that has been written to the replicationlink (KB/second)

Data Domain Average Replicated CapacityReturns Data Domain average replicated capacity details in a line chart. Uses data fromthe Average Replicated Capacity data source.

l Hostname - Name of the host

l Destination Host - Unique identifier for the destination of replication

l Average Capacity - Average replicated capacity (in MB)

Data Domain Data Transfer RateReturns Data Domain data transfer rate in a line chart. Uses data from the ReplicationData Transfer Statistics data source.

l Hostname - Hostname of replicating server

l Source - Identifier for replication source

l Destination - Identifier for replication destination

l Destination Host - Unique identifier for the destination of replication

l Transfer Rate - Transfer Difference divided by Time Difference, where:

n Transfer Difference is the difference in value of the field f_sentcompressedbetween two consecutive rows

n Time Difference is the difference in value of field f_endtime values between twoconsecutive rows, where:

– f_sent_compressed and f_endtime are fields taken from the table repl_perf

Reports by System Template

Celerra Replication Performance 347

Page 348: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Data Domain Replication Time LagReturns the replication time lag value over time as a graph. Uses data from theReplication Performance data source.

l Hostname - Hostname of replicating server

l Source - Identifier for replication source

l Destination - Identifier for replication destination

l Time Lag - Calculated as the difference between the Date Gathered and Synchronized

Disk Activity By DiskReturns disk activity by disk in a line chart. Uses data from the Disk Activity By Devicedata source.

l Hostname - Name of the host to which the disk is attached

l Device - Name of the disk

l Busy - Activity level for the disk (as a percentage)

Disk Activity By HostReturns disk activity by host in a line chart. Uses data from the Disk Activity By Node datasource.

l Hostname - Name of the object to which the disks are attached

l Busy - Average activity level for the object's disks (as a percentage)

Disk Operations by DiskReturns disk operations by disk in a line chart. Uses data from the Disk Performance ByDevice data source.

l Hostname - Name of the host to which the disk is attached

l Device - Name of the disk

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

l Sectors Read - Number of sectors read

l Sectors Written - Number of sectors written to

Disk Operations by HostReturns disk operations by host in a line chart. Uses data from the Disk Performance ByNode data source.

l Hostname - Name of the object to which the disk is attached

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

l Sectors Read - Number of sectors read

l Sectors Written - Number of sectors written to

Reports by System Template

348 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 349: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Disk Performance By DiskReturns disk performance by disk in a line chart. Uses data from the Disk Performance ByDevice data source.

l Hostname - Name of the host to which the disk is attached

l Device - Name of the disk

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Bytes Transferred - Number of kilobytes transferred from disk

Disk Performance By HostReturns disk performance by disk in a line chart. Uses data from the Disk Performance ByNode data source.

l Hostname - Name of the object to which the disk is attached

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Bytes Transferred - Number of kilobytes transferred from disk

DPA Reporter Median Report Run TimeDisplays the median time taken to run a report over time in a line chart. Uses data fromthe DPA Metrics data source.

l Server - Name of the DPA Server

l Median - The median time taken to run a report

Fibre Channel Device PerformanceReturns Fibre Channel device performance details in a line chart. Uses data from the FibreChannel Device Performance From Switch data source.

l Hostname - Name of the host in which the HBAs are installed

l Device - Name of the device on the host. For example, /dev/rmt/1n

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

Fibre Channel Device Performance By NodeReturns Fibre Channel device performance by object details in a line chart. Uses datafrom the Fibre Channel Device Performance From Switch data source.

l Hostname - Name of the host in which the HBAs are installed

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

Reports by System Template

Disk Performance By Disk 349

Page 350: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Fibre Channel Device Performance SummarySummary of the Fibre Channel device performance in a table report. Uses data from theFibre Channel Device Performance From Switch data source.

l Hostname - Name of the host in which the HBAs are installed

l Device - Name of the device on the host. For example, /dev/rmt/1n

l Avg Write - Amount of data sent

l Max Write - Max data sent

l Write Activity - Average write activity (as a percentage)

l Avg Read - Amount of data received

l Max Read - Max data received

l Read Activity - Average read activity (as a percentage)

Fibre Channel Port PerformanceReturns Fibre Channel port performance information in a line chart. Uses data from theFibre Channel Performance By Node data source.

l Hostname - Name of the object

l Data - The sum of the Data In and Data Out displayed by the object(KB/second)

l Frames - The sum of Frames In and Frames Outdisplayed by the object (1000s/second)

Fibre Channel Port Performance By NodeReturns Fibre Channel port performance by object details in a line chart. Uses data fromthe Fibre Channel Performance By Node data source.

l Hostname - Name of the object

l Data In - Amount of data received by the object (KB/second)

l Data Out - Amount of data sent from the object (KB/second)

l Frames In - Number of frames received by the object (1000s/second)

l Frames Out - Number of frames sent from the object (1000s/second)

Fibre Channel Port Performance By PortReturns Fibre Channel port performance by port details in a line chart. Uses data from theFibre Channel Performance By Port data source.

l Hostname - Name of the object

l Sub Name - Name of TSM server instance

l Port - Name of the port

l Data In - Amount of data received by the port (KB/second)

l Data Out - Amount of data sent from the port (KB/second)

l Frames In - Number of frames received by the port (1000s/second)

l Frames Out - Number of frames sent from the port (1000s/second)

Reports by System Template

350 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 351: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Fileserver Average Response TimesReturns the average read and write response times over time for NFS and CIFS operationsin a line chart. Uses data from the File server performance data source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l CIFS Average Read Operation Duration - Average duration of CIFS reads(microsecond/call)

l CIFS Average Write Operation Duration - Average duration of CIFS writes(microsecond/call)

l NFS Average Read Operation Duration - Average duration of NFS reads (microsecond/call)

l NFS Average Write Operation Duration - Average duration of NFS writes (microsecond/call)

Fileserver Cache Hit RatesReturns file server cache hit rate details in a line chart. Uses data from the Inode CacheHit Rate and Name Cache Hit Rate data sources.

l Node - Name of the object

l Inode Cache Hit Rate - Percentage of successful cache lookups when attempting tomap an inode to a block on a file system

l Name Cache Hit Rate - Percentage of successful cache lookups when attempting tomap a filename to an inode on a file system

Fileserver Cache Hit Rates By NodeReturns file server cache hit rate by object details in a line chart. Uses data from theInode Cache Hit Rate and Name Cache Hit Rate data sources.

l Node - Name of the object

l Inode Cache Hit Rate - Percentage of successful cache lookups when attempting tomap an inode to a block on a file system

l Name Cache Hit Rate - Percentage of successful cache lookups when attempting tomap a filename to an inode on a file system

Fileserver Client PerformanceReturns file server client performance details in a line chart. Uses data from the File serverclient performance data source.

l Node - Name of the file server

l Client - Name of the file server client

l Total Operations - Total number of client operations (/second)

Fileserver Data ThroughputReturns file server data throughput in a line chart. Uses data from the File serverperformance data source.

l Node - Name of the file server

Reports by System Template

Fileserver Average Response Times 351

Page 352: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Sub Name - Identifier for the Storage Array

l Total Throughput - Total throughput of CIFS and NFS data (KB/second)

Fileserver Data Throughput By ProtocolReturns file server data throughput by protocol in a line chart. Uses data from the Fileserver performance data source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l Total CIFS - Total of CIFS data in and data out (KB/second)

l Total NFS - Total of NFS data in and data out (KB/second)

Fileserver Filesystem PerformanceReturns file server file system performance details in a line chart. Uses data from the FileServer Filesystem Performance data source.

l Node - Name of the file server

l Mountpoint - Name of the file server file system

l Protocol - Name of the file server protocol: CIFS, NFS

l Total Operations - Total number of file system operations (/second)

l Read Operations - Number of file system read operations (/second)

l Write Operations - Number of file system write operations (/second)

l Other Operations - Number of file system lookup, locking and similar operations (/second)

Fileserver OperationsReturns file server operations in a line chart. Uses data from the File server performancedata source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l Operations - Total of operations (/second)

Fileserver Operations By ProtocolReturns file server operations by protocol in a line chart. Uses data from the File serverperformance data source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l NFS operations - Number of NFS operations per second (/second)

l CIFS operations - Number of CIFS operations per second (/second)

l DAFS operations - Number of DAFS operations per second (/second)

l HTTP operations - Number of HTTP operations per second (/second)

l iSCSI operations - Number of iSCSI operations per second (/second)

l FCP operations - Number of FCP operations per second (/second)

Reports by System Template

352 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 353: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Idle - Percentage of time NFS was idle

l Preoccupied - Percentage of time NFS was processing

l Send - Percentage of time NFS was sending data

l Receive - Percentage of time NFS was receiving data

Fileserver Operations with DirectionReturns file server operations with direction in a line chart. Uses data from the File serverperformance data source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l CIFS Read operations - Number of CIFS read operations (/second)

l CIFS Write operations - Number of CIFS write operations (/second)

l NFS Read operations - Number of NFS read operations (/second)

l NFS Write operations - Number of NFS write operations (/second)

Fileserver Performance SummarySummary of file server performance details in a table report. Uses data from the Fileserver performance data source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l Read Operations - Number of CIFS and NFS read operations (/second)

l Write Operations - Number of CIFS and NFS write operations (/second)

l Data In - Amount of CIFS and NFS data received (KB/second)

l Data Out - Amount of CIFS and NFS data sent (KB/second)

l Average Read Size - Average size of CIFS and NFS data read (in KB)

l Average Write Size - Average size of CIFS and NFS data written (in KB)

l Protocol - Type of protocol: CIFS, NFS

Filesystem Disk PerformanceReturns file system disk performance details in a line chart. Uses data from theFilesystem Disk Performance data source.

l Filesystem node - Name of the object to which the file system is attached

l Filesystem - Name of the file system

l Filesystem Sub Name - Identifier for the storage array on which the file system resides

l Disk node - Name of the object to which the disk is attached

l Disk - Name of the disk

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

Reports by System Template

Fileserver Operations with Direction 353

Page 354: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Filesystem Operations By PartitionReturns file system operations by partition in a line chart. Uses data from the FilesystemPerformance By Filesystem data source.

l Hostname - Name of the object on which the file systems reside

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Ops - Total of the Read and Write operations (/second)

Filesystem Operations by DirectionReturns file system operations by direction in a line chart. Uses data from the FilesystemPerformance By Filesystem data source. This report shows the type of operations thatoccur on each file system over time.

l Hostname - Name of the object on which the file systems reside

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

Filesystem Performance SummarySummary of the file system performance in a table report. Uses data from the FilesystemPerformance By Filesystem data source.

l Hostname - Name of the object on which the file systems reside

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

l Average Read Size - Average size of read operations to the disk (in bytes)

l Average Write Size - Average size of write operations to the disk (in bytes)

Filesystem Throughput by PartitionReturns file system throughput by partition in a line chart. Uses data from the FilesystemPerformance By Filesystem data source.

l Hostname - Name of the object on which the file systems reside

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Throughput - Total of throughput of read and write (KB/second)

Reports by System Template

354 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 355: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Filesystem Throughput with DirectionReturns file system throughput with direction in a line chart. Uses data from theFilesystem Performance By Filesystem data source.

l Hostname - Name of the object on which the file systems reside

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

Host PerformanceReturns host performance in a line chart. Uses data from the Filesystem Utilization,Memory Configuration, Memory Status, Network Interface Performance By Interface, andProcessor Utilization data sources.

l Memory Utilization - Average memory utilization of Used and Total memory

l Processor Utilization - Utilization on the processor (as a percentage)

l Filesystem Utilization - Average file system utilization for all hosts (as a percentage)

l Hostname - Name of the host

l Sub Name - Name of the storage array

l Interface - Interface name

l Data Out - Amount of data leaving the interface (KB/second)

l Data In - Amount of data coming into the interface (KB/second)

Host Performance During BackupReturns host performance during backup in a line chart. Uses data from the Diskperformance By Device, Memory Configuration, Memory Status, Network InterfacePerformance By Interface, and Processor Utilization data sources.

l Processor Utilization - Utilization on the processor (as a percentage)

l Utilization - Utilization of Used and Total memory

l Hostname - Name of the host on which the network interface is located

l Interface - Interface name

l Data In - Amount of data coming into the interface (KB/second)

l Data Out - Amount of data leaving the interface (KB/second)

l Device - Name of the disk

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

Host Performance For ClientReturns host performance for client in a line chart. Uses data from the FilesystemUtilization, Memory Configuration, Memory Status, Network Interface Performance ByInterface, and Processor Utilization data sources.

l Utilization - Utilization of Used and Total memory

Reports by System Template

Filesystem Throughput with Direction 355

Page 356: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Processor Utilization - Utilization on the processor (as a percentage)

l Filesystem Utilization - Average file system utilization for all hosts (as a percentage)

l Data Out - Amount of data leaving the interface (KB/second)

l Data In - Amount of data coming into the interface (KB/second)

LUN OperationsReturns LUN operation details in a line chart. Uses data from the LUN Performance By LUNdata source.

l Node - Name of the array on which the LUN is configured

l Sub Name - Name of the storage array

l Name - Name of the LUN

l Ops - Total of the Read and Write operations (/second)

LUN Operations By LUNReturns LUN operation by LUN details in a line chart. Uses data from the LUN PerformanceBy LUN data source.

l Node - Name of the array on which the LUN is configured

l Sub Name - Name of the storage array

l Name - Name of the LUN

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

LUN PerformanceReturns LUN performance in a line chart. Uses data from the LUN Performance By LUNdata source.

l Node - Name of the array on which the LUN is configured

l Sub Name - Name of the storage array

l Name - Name of the LUN

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

LUN Performance By NodeReturns LUN performance by object in a line chart. Uses data from the LUN PerformanceBy Node data source.

l Node - Name of the array on which the LUNs are configured

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

Reports by System Template

356 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 357: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

LUN ThroughputReturns LUN throughput in a line chart. Uses data from the LUN Performance By LUN datasource.

l Node - Name of the array on which the LUN is configured

l Sub Name - Name of the storage array

l Name - Name of the LUN

l Throughput - Total of throughput of read and write (KB/second)

LUN Throughput By LUNReturns LUN throughput by LUN in a line chart. Uses data from the LUN Performance ByLUN data source.

l Node - Name of the array on which the LUN is configured

l Sub Name - Name of the storage array

l Name - Name of the LUN

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

Mirror PerformanceReturns mirror performance in a line chart. Uses data from the Mirror Performance datasource.

l Node - Name of the object on which the mirror resides

l Path - Path to the mirror

l Update Speed - Speed at which the mirror is updating (KB/second)

Process Memory Usage For Specific ProcessReturns the CPU utilization and memory usage of processes that run on a host in a linechart. Uses data from the Process Status data source. Use this report to identifyprocesses that are consuming too much memory and CPU on a machine.

l Hostname - Name on which the process is running

l PID - Identifier of the process

l Process Name - Name of the process

l Memory - Amount of memory used by the process (in MB)

Processor Utilization By CPUReturns the utilization of each individual CPU on a host or group of hosts over time in aline chart. Uses data from the Processor Utilization By CPU data source.

l Hostname - Hostname in which the processors are running

l Sub Name - Name of site in which RecoverPoint Appliance is located

l Sub Name 2 - Name of RecoverPoint Appliance

l Num - Processor number

l CPU Utilization - Utilization on the processor (as a percentage)

Reports by System Template

LUN Throughput 357

Page 358: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Processor Utilization By NodeReturns the average CPU utilization on a host over time by averaging the utilization acrossall processors on that host in a line chart. Uses data from the Processor Utilization ByClient data source.

l Hostname - Name of the host

l Processor Utilization - Utilization on the processor (as a percentage)

RecoverPoint Consistency Group Data LagReturns RecoverPoint consistency group data lag details in a line chart. Uses data fromthe Consistency Group Copy Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

l Peak Data Lag - Peak data amount of data that was queued for replication over thepolling period (in MB)

RecoverPoint Consistency Group High Load RatioReturns RecoverPoint consistency group high load ration in a line chart. Uses data fromReport Times and the Consistency Group Copy CS Performance data sources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

l High Load Time - Percentage time of High load

RecoverPoint Consistency Group Incoming Write RatesReturns RecoverPoint consistency group incoming write rate in a line chart. Uses datafrom the Consistency Group Copy Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

l Average Peak Incoming Writes - Average peak amount of data that changed persecond over the polling period (MB/second)

l Average Peak Total Output Rate - Average peak amount of data transferred on the linkto the target per second (MB/second). This value includes the amount of datatransferred during both initialization and replication phases. It does not include anytime in which the link was halted

l Maximum Peak Incoming Writes - Maximum peak amount of data that changed persecond over the polling period (MB/second)

l Maximum Peak Total Output Rate - Maximum peak amount of data transferred on thelink to the target per second (MB/second). This value includes the amount of datatransferred during both initialization and replication phases. It does not include anytime in which the link was halted

Reports by System Template

358 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 359: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

RecoverPoint Consistency Group Incoming Write Rates for Last DayReturns RecoverPoint consistency group incoming write rate for last day in a table. Usesdata from the Consistency Group Copy Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

l Average Peak Incoming Writes - Average amount of data changed per second over thepolling period (MB/second)

l Average Peak Total Output Rate - Average peak amount of data transferred on the linkto the target per second (MB/second)

l Maximum Peak Incoming Writes - Maximum amount of data changed per second overthe polling period (MB/second)

l Maximum Peak Total Output Rate- Maximum peak amount of data transferred on thelink to the target per second (MB/second)

l Start time-Start time for the period over which performance statistics are gathered

l End time- End time for the period over which performance statistics are gathered

RecoverPoint Consistency Group Journal LagReturns RecoverPoint consistency group journal lag details in a line chart. Uses data fromthe Consistency Group Copy Status data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the Copy

l Journal Lag - Size of the journal lag (in MB)

RecoverPoint Consistency Group ThroughputReturns RecoverPoint consistency group throughput details in a line chart. Uses datafrom the Consistency Group Copy Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

l Peak Total Output Rate - Peak amount of data transferred on the link to the target persecond (MB/second). This value includes the amount of data transferred during bothinitialization and replication phases. It does not include any time in which the linkwas halted

RecoverPoint Consistency Group Time LagReturns RecoverPoint consistency group time lag details in a line chart. Uses data fromthe Consistency Group Copy Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

Reports by System Template

RecoverPoint Consistency Group Incoming Write Rates for Last Day 359

Page 360: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Average Time Lag - Average time lag in replication of the copy over the last pollingperiod (in seconds)

l Peak Time Lag - Peak time lag in replication of the copy over the last polling period (inseconds)

RecoverPoint Consistency Group Transaction LagReturns RecoverPoint consistency group transaction lag details in a line chart. Uses datafrom the Consistency Group Copy Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

l Peak Writes Lag - Peak number of IO transactions that were queued for replicationover the polling period

RecoverPoint RPA CompressionShows two different graphs over time, and they are superimposed on top of each other inthe display to be able to see the correlation between the two:

l Compression Data over Time — This is the ratio of the total size of the data on storageand the amount of data that was transferred across the network.

l CPU Utilization Data over Time —This is the average CPU utilization over time.

Uses data from the RPA Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located

l Name - Name of the RecoverPoint Appliance

l Compression - Level of compression achieved (as a percentage)

l CPU Utilization - Utilization of the CPU due to compression. This field is populatedonly if compression is enabled

RecoverPoint RPA LatencyReturns RecoverPoint RPA latency details in a line chart. Uses data from the RPAPerformance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located

l Name - Name of the RecoverPoint Appliance

l Latency - Latency of network writes (in milliseconds)

RecoverPoint RPA ThroughputReturns RecoverPoint RPA throughput details in a line chart. Uses data from the RPAPerformance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located

l Name - Name of the RecoverPoint Appliance

l Latency - Latency of network writes (in milliseconds)

Reports by System Template

360 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 361: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

RecoverPoint RPA WritesReturns RecoverPoint RPA Write details in a line chart. Uses data from the RPAPerformance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located

l Name - Name of the RecoverPoint Appliance

l Writes - Total number of writes performed by the application

RecoverPoint RPA Site CompressionReturns RecoverPoint RPA site compression details in a line chart report. Uses data fromthe RPA Site Performance datasource.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located. Production site

l Name - Name of the RecoverPoint Appliance

l To Site - Name of the remote site

l Compression - Level of compression achieved (as a percentage)

RecoverPoint RPA Site LatencyReturns RecoverPoint RPA site latency details in a line chart report. Uses data from theRPA Site Performance datasource.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located. Production site

l Name - Name of the RecoverPoint Appliance

l To Site - Name of the remote site

l Latency - Latency of network writes from Site to To Site (in milliseconds)

RecoverPoint RPA Site Packet LossReturns RecoverPoint RPA site packet loss details in a line chart report. Uses data fromthe RPA Site Performance datasource.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located. Production site

l Name - Name of the RecoverPoint Appliance

l To Site - Name of the remote site

l Packet Loss - Packet loss on the network (as a percentage)

RecoverPoint RPA Site ThroughputReturns RecoverPoint RPA site throughput details in a line chart report. Uses data fromthe RPA Site Performance datasource.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located. Production site

Reports by System Template

RecoverPoint RPA Writes 361

Page 362: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Name - Name of the RecoverPoint Appliance

l To Site - Name of the remote site

l WAN Throughput - Total throughput of WAN traffic from Site to To Site (KB/second)

l WAN Initial Throughput - Throughput of WAN initialization traffic from site to site (KB/second)

RecoverPoint RPA WAN ThroughputReturns RecoverPoint RPA site throughput details in a line chart report. Uses data fromthe Report Times and RPA CS Performance datasources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located. Production site

l Name - Name of the RecoverPoint Appliance

l Average WAN Throughput - Average WAN throughput (bytes/second)

l Maximum WAN Throughput - Maximum of WAN initialization traffic (bytes/second)

l Result Duration -

RecoverPoint RPA WAN Throughput for Last DayReturns RecoverPoint RPA site throughput for last day details in a table report. Uses datafrom the RPA Throughput Statistics datasource.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located. Production site

l Name - Name of the RecoverPoint Appliance

l Average WAN Throughput - Average throughput of WAN traffic (KB/second)

l Maximum WAN Throughput - Maximum of WAN initialization traffic (KB/second)

l Start Time- Start time for the period over which performance statistics are gathered

l End Time- End time for the period over which performance statistics are gathered

Remote Mirror PerformanceReturns remote mirror performance details in a line chart. Uses data from Remote MirrorPerformance data source.

l Source node - Name of the object on which the source mirror resides

l Source path - Path to the mirror source

l Mirror node - Name of the object on which the remote mirror resides

l Mirror path - Path to the remote mirror

l Update speed - Speed at which the remote mirror is updating (KB/second)

Server Performance During BackupReturns server performance during backup details in a line chart. Uses data from theMemory Configuration, Memory Status, Network Interface Performance By Interface, andProcessor Utilization data sources.

l Processor Utilization - Utilization on the processor (as a percentage)

l Utilization - Average memory utilization of Used and Total memory

Reports by System Template

362 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 363: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Data In - Amount of data coming into the interface (KB/second)

l Data Out - Amount of data leaving the interface (KB/second)

l Errors In - Number of errors coming in to the interface (/second)

l Errors Out - Number of errors leaving the interface (/second)

l Packets In - Number of packets coming in to the interface (1000s/second)

l Packets Out - Number of packets leaving the interface (1000s/second)

Solid State Storage PerformanceReturns solid state storage performance details in a line chart. Uses data from the SolidState Storage Performance data source.

l Hostname - Name of machine hosting solid state storage device

l Read Throughput - Amount of data moved into NVRAM (KB/second)

l Write Throughput - Amount of data moved out of NVRAM (KB/second)

Tape Drive Performance By DriveReturns tape drive performance by drive details in a line chart. Uses data from the TapeDrive Performance By Device data source.

l Hostname - Object to which the drive is attached

l Device Name - Name of the device

l Port - Port used to access the device

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Total Throughput - Total of Read and Write throughput (KB/second)

Tape Drive Performance By NodeReturns tape drive performance by object details in a line chart. Uses data from the TapeDrive Performance By Node data source.

l Hostname - Object to which the drives are attached

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Total Throughput - Total of Read and Write throughput (KB/second)

Tape Drive Performance SummarySummary of the tape drive performance in a table report. Uses data from the Tape DrivePerformance By Device data source.

l Hostname - Node to which the drive is attached

l Device Name - Name of the device

l Port - Port used to access the device

l Avg. Write Throughput - Average data throughput for writes (KB/second)

l Max Write Throughput - Maximum data throughput for writes (KB/second)

l Write Activity - Data throughput for writes (as a percentage)

Reports by System Template

Solid State Storage Performance 363

Page 364: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Avg. Read Throughput - Average data throughput for reads (KB/second)

l Max Read Throughput - Maximum data throughput for reads (KB/second)

l Read Activity - Data throughput for reads (as a percentage)

Tape Drive Throughput on Server During BackupReturns tape drive throughput on server during backup in a line chart. Uses data from theTape Drive Performance By Device data source.

l Hostname - Node to which the drive is attached

l Library Name - Name of the tape library to which the drive belongs. Physical tapedrives do not return information on the tape library in which they are a member

l Device Name - Name of the device

l Port - Port used to access the device

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

Tape Library Drive PerformanceReturns tape library drive performance details in a line chart. Uses data from the TapeDrive Performance From Switch data source.

l Library - Library on which the tape drive is located

l Drive - Name of the tape drive

l Data Out - Data out of the switch (KB/second)

Tape Library Drive Performance By NodeReturns tape library drive performance by object in a line chart. Uses data from the TapeDrive Performance From Switch data source.

l Library - Library on which the tape drive is located

l Data Out - Data out of the switch (KB/second)

Tape Library Drive Performance SummarySummary of tape library drive performance details in a line chart. Uses data from the TapeDrive Performance From Switch data source.

l Library - Library on which the tape drive is located

l Drive - Name of the tape drive

l Avg Write - Average data out of the switch (KB/second)

l Max Write - Maximum data out of the switch (KB/second)

l Write Activity - Data out of the switch (as a percentage)

l Avg Read - Average data into the switch (KB/second)

l Max Read - Maximum data into the switch (KB/second)

l Read Activity - Data into the switch (as a percentage)

Reports by System Template

364 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 365: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Total ThroughputReturns total throughput for the host in a line chart. Uses data from the Network InterfacePerformance by Node and Fibre Channel Performance by Node data sources.

l Hostname - Name of the host on which the network interface is located

l Total Throughput - Sum of the Data In and Data Out fields for Network Interface andFibre Channel Port Performance

Virtual Fibre Channel Port Performance By NodeReturns virtual fibre channel port performance by object in a line chart. Uses data fromthe Fibre Channel Performance By Node data source.

l Hostname - Name of the object

l Data In - Amount of data received by the object (KB/second)

l Data Out - Amount of data sent from the object (KB/second)

l Frames In - Number of frames received by the object (1000s/second)

l Frames Out - Number of frames sent from the object (1000s/second)

Virtual Fibre Channel Port Performance By PortReturns virtual fibre channel port performance by port in a line chart. Uses data from theFibre Channel Performance By Port data source.

l Hostname - Name of the object

l Sub Name - Name of server instance, if applicable

l Port - Name of the port

l Data In - Amount of data received by the port (KB/second)

l Data Out - Amount of data sent from the port (KB/second)

l Frames In - Number of frames received by the port (1000s/second)

l Frames Out - Number of frames sent from the port (1000s/second)

Virtual Host Disk PerformanceReturns virtual host disk performance details in a line chart. Uses data from the VirtualHost Disk Performance data source.

l Virtual Host - Name of the Virtual Centre server

l Virtualization Server - Hostname of a Virtualization Server managed by Virtual Centre

l Device - Identifier for the disk

l Read Throughput - Data read throughput (KB/second)

l Write Throughput - Data write throughput (KB/second)

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

Reports by System Template

Total Throughput 365

Page 366: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Virtual Host Network Interface PerformanceReturns the network interface performance of virtual machines in a line chart. Uses datafrom the Virtual Host Network Interface Performance data source.

l Virtual Host - Name of the Virtual Centre server

l Virtualization Server - Name of the virtual machine

l Interface - Identifier for the network interface

l Data In - Data incoming (KB/second)

l Data Out - Data outgoing (KB/second)

l Packets In - Number of packets incoming (thousands/second)

l Packets Out - Number of packets outgoing (thousands/second)

Virtual Host Processor UtilizationReturns the processor percentage utilization of virtual machines in a line chart. Uses datafrom the Virtual Host Configuration and Virtual Host Status data sources.

l Virtual Host - Name of the Virtual Centre server

l Utilization - CPU utilization of the virtual machine (in MHz)

Webserver Response TimeReturns information on the response of a test on a web page in a line chart. Uses datafrom the Webserver Response data source.

l Hostname - Name of the web server

l Page Requested - Page being requested

l Response Time - Response time (in seconds)

l Valid Response - Indicates if the response from the web server was valid

Xsigo Aggregate Infiniband Port PerformanceReturns the percentage utilization of the Infiniband port, aggregated over the selectedobjects in a line chart. Uses data from the Infiniband Port Performance data source.

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

l Packets In - Number of packets received (/second)

l Packets Out - Number of packets sent (/second)

Xsigo Infiniband Port Performance by NodeReturns the percentage utilization of the Infiniband port, displayed by object, in a linechart. Uses data from the Infiniband Port Performance data source.

l Hostname - Name of the Xsigo Director object

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

l Packets In - Number of packets received (/second)

Reports by System Template

366 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 367: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Packets Out - Number of packets sent (/second)

Xsigo Infiniband Port Performance by PortReturns performance information on the InfiniBand ports on Xsigo switches in a linechart. Uses data from the Infiniband Port Performance data source.

l Hostname - Name of the Xsigo Director object

l Sub Name - Identifier for the switch

l Name - Identifier for the InfiniBand port

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

l Packets In - Number of packets received (/second)

l Packets Out - Number of packets sent (/second)

Xsigo Virtual Port Queue Depth SummarySummary of the queue activity for virtual ports on a Xsigo appliance in a table report.Uses data from the Fibre Channel Performance By Port and Network InterfacePerformance By Interface data sources.

l Hostname - Name of the object

l Port - Name of the port

l Port Type - Type of port

l Average Queue Depth - Average length of the I/O queue

l Maximum Queue Depth - Maximum length of the I/O queue

l Minimum Queue Depth - Minimum length of the I/O queue

Provisioning system templatesThe following section describes provisioning system templates.

Fileserver Top 10 Most Available AggregatesReturns fileserver top ten most available aggregate details in a table report. Uses datafrom the Aggregate Configuration, Aggregate Status, Disk Configuration, and Disk Statusdata sources.

l Node - Name of the filer on which this aggregate exists

l Name - Name of the aggregate

l Aggregate Capacity - (in MB)

l Used Space - Space on the aggregate used for volumes (in MB)

l Available Space - (in MB)

l Available FS Capacity - (in MB)

l Unallocated Space - (in MB)

l Potential Available FS Capacity - (in MB)

Reports by System Template

Xsigo Infiniband Port Performance by Port 367

Page 368: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Recoverability system templatesRecoverability analysis is available in two forms:

l DPA reports available from the reporting area.

l The Replication Analysis section, which in the DPA web console shows a graphicalrepresentation of recovery points and gaps in the data protection environment.

They summarize the exposures, exclusions, unprotected objects and obsolete recoverypoints. Replication Analysis is used to drill down and view the status of replicationoperations and the storage mapping for objects and individual arrays, file systems, andapplications.

All Nodes Of Type Symmatrix CGReturns all objects of type Symmetrix consistency group details in a Table report. Usesdata from the All Nodes Of Type data source.

l Node Name - Name of the object

l Host Name - Name of the host

l Type - Type of object

Masking Configuration for Storage ArrayReturns information for masking, masking views and storage groups for Symmetrix andCLARiiON in a table report. Uses data from the Masking Configuration data source.

l Module - Name of the module executed

l Data Source - Name of the data source executed

l Sub - Name of storage array

l Name - Name of the storage array where the object is located

l Initiator - Initiator of the session

l Storage Array - Name of the storage array for the object

l Device - Name of the device on the storage array where the object is located

l Director - Identifier for the Symmetrix Director

l Port - Port identifier

l Lun - Logical unit number (LUN) through which the disk can be accessed by thesource

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running orhas never run before

Masking Configuration for InitiatorReturns masking configuration for initiator details in a table report. Uses data from theMasking Configuration data source.

l Module - Name of the module executed

l Data Source - Name of the data source executed

l Sub - Name of storage array

Reports by System Template

368 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 369: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Name - Name of the storage array where the object is located

l Initiator - Initiator of the session

l Storage Array- Name of the storage array for the object

l Device - Name of the device on the storage array where the object is located

l Director - Identifier for the Symmetrix Director

l Port - Port identifier

l Lun - Logical unit number (LUN) through which the disk can be accessed by thesource

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running orhas never run before

MirrorView ConfigurationReturns MirrorView/A configuration details in a table report. Uses data from theMirrorview Configuration data source.

l Data Source - Name of the data source executed

l Name - Name of the file system or application being replicated

l Source Storage Array - Name of the storage array for the source object

l Source Storage Array UID - Unique identifier of the storage array for the source object

l Source Device - Name of the device on the storage array where the source object islocated

l Target Storage Array - Name of storage array where the source is being replicated

l Target Storage Array UID - Unique identifier of the storage array for the target object

l Target Device - Name of the device where the source is being replicated

l Mirrorview Type - Type of MirrorView

l Mirrorview UID - Identifier for MirrorView

l Update Type - Type of update

l Update Interval - Update interval

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running orhas never run before

l MV Group Name - MirrorView group name

MirrorView/A PerformanceReturns performance data for MirrorView/A sessions in a table report. Uses data from theMirrorview Performance and System Variable data sources.

l Id - Identifier that uniquely identifies this Job

l Module - Name of the module executed

l Storage Array - Name of the storage array for the object

l Name - Name of the file system or application being replicated

l Mirrorview UID - Unique identifier for MirrorView

l Replication Method - Method by which the object has been replicated

Reports by System Template

MirrorView Configuration 369

Page 370: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Started - Identifies when the job started

l Completed - Identifies when the job completed

l Duration - Total duration of all jobs (in seconds)

l Defined RPO - As specified in the Protection Policy (in seconds)

l MB Transferred - Amount of MB transferred

l Peer Storage Array - the Remote Storage Array. It can be the source or the target,depending on whether the MirrorView on the selected array is the source or thetarget.

l Peer Mirrorview Name - Target MirrorView session

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running orhas never run before

l RPO Time - Time of the RPO

MirrorView/A Performance for CGReturns performance data for MirrorView/A sessions for consistency groups in a tablereport. Uses data from the Mirrorview CG Performance and System Variable data sources.

l Storage Array - Name of the storage array for the object

l CG - Name of the consistency group

l Replication Method - Method by which the object has been replicated

l Started - Identifies when the job started

l Completed - Identifies when the job completed

l Duration - Total duration of all jobs (in seconds)

l Defined RPO - As specified in the Protection Policy (in seconds)

l MB Transferred - Amount of MB transferred

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running orhas never run before

l RPO Time - Time of the RPO

RDF ConfigurationReturns RDF configuration for storage array in a table report. Uses data from the RDFConfiguration by Destination, RDF Configuration by Source, and RDFG Configuration overtime data sources.

l Id - Identifier that uniquely identifies this Job

l Data Source - Name of the data source executed

l Source Storage Array - Name of the storage array for the source object

l Source Device - Name of the device on the storage array where the source object islocated

l Source RDFG Number - Number of the source RDFG

l Target Storage Array - Name of storage array where the source is being replicated

l Target Device - Name of the device where the source is being replicated

Reports by System Template

370 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 371: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l RDFG Name - Name of the RDFG

l Target RDFG Number - Number of the target RDFG

l Mode -

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running orhas never run before

l Device Type - Type of device. For example, DLT, Ultrium-2

l Cycle Time - Cycle time (in seconds)

RDF Configuration for CGReturns RDF configuration for consistenct group details in a table report. Uses data fromthe CG Configuration, RDF Configuration by Source, and RDFG Configuration over timedata sources.

l Agent Name - Name of the agent

l Solutions Enabler Host - Name of the Solutions Enabler Host

l CG Name - Name of the consistency group

l Source Storage Array - Name of the storage array for the source object

l Source Device - Name of the device on the storage array where the source object islocated

l Target Storage Array - Name of storage array where the source is being replicated

l Target Device - Name of the device where the source is being replicated

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running orhas never run before

l Id - Identifier that uniquely identifies this Job

l Data Source - Name of the data source executed

l Source RDFG Number - Number of the source RDFG

l RDFG Name - Name of the RDFG

l Target RDFG Number - Number of the target RDFG

l Mode -

l Cycle Time - Cycle time (in seconds)

RDF Configuration for DGReturns RDF configuration for DG details in a table report. Uses data from the DGConfiguration, RDF Configuration by Destination, RDF Configuration by Source, and RDFGConfiguration over time data sources.

l Source Storage Array - Name of the storage array for the source object

l Source Device - Name of the device on the storage array where the source object islocated

l Source RDFG Number - Number of the source RDFG

l Target Storage Array - Name of storage array where the source is being replicated

l Target Device - Name of the device where the source is being replicated

Reports by System Template

RDF Configuration for CG 371

Page 372: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l RDFG Name - Name of the RDFG

l Target RDFG Number - Number of the target RDFG

l Mode -

l Device Type - Type of device. For example, DLT, Ultrium-2

l DG Name - Name of DG

l Cycle Time - Cycle time (in seconds)

RDFG ConfigurationReturns RDFG configuration details in a table report. Uses data from the RDFGConfiguration over time data source.

l Storage Array - Name of the storage array where the object is located

l RDFG - Name of the RDFG

l Cycle Time - Cycle time (in seconds)

l RDFG Type - Type of the RDFG

l Remote Storage Array - Name of storage array where the source is being replicated

l Remote RDFG - Name of the remote RDFG

RDFG PerformanceReturns performance data for RDF/A groups in a table report. Uses data from the RDFAPerformance data source.

l Id - Identifier that uniquely identifies this Job

l Module - Name of the module executed

l Target Storage Array - Target storage array of the RDF group

l Target RDFG Number - Number of the target RDFG

l RDFG Name - Name of the RDFG

l Replication Method - Method by which the object has been replicated

l Duration - Total duration of all jobs to complete (in seconds)

l RPO Time - Time of the RPO

l MB Transferred - Amount of MB transferred

l Cycle Time - Cycle time (in seconds)

l Source Storage Array - Source storage array of the RDF group

l Source RDFG Number - Number of the source RDFG

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running orhas never run

Recoverability Detailed ExposuresReturns details recoverability exposures in a table report. Uses data from theRecoverability Gaps data source. Run this report against a backup host, and not againstthe backup server itself. Run the report against a group of host file systems or databases

Reports by System Template

372 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 373: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

to calculate an exposure for an application, business unit, office, or other group ofobjects.

l Category - Category of exposure

l Gap - Reason why the gap was triggered

l Group - DPA group, if applicable

l Host - Host for the replicated object

l Path - Path to the replicated object. The path will depend on the replicated objecttype (for example, a directory path for a file system, or an application storage object)

l Protected Object - Name of the protected object

l Issued - Indicates when the gap was issued

l Storage Array - Source storage array for the replicated object

l Replication Method - Method by which the object is replicated

l Severity - Severity of the exposure

l Gap Details - Additional details on the gap

l Replication Time - Time the gap was triggered

l GAP_REPORT_RP_ID

l GAP_REPORT_Storage Array_ID

l GAP_REPORT_GAP_ID

l GAP_REPORT_Replication Method_ID

l GAP_REASON_ID

l GAP_REPORT_NODE_ID

l GAP_REPORT_ACTUAL_PATH

Recoverability Detailed Exposures for rulesetReturns details for recoverability detailed exposures in a table report. Report forRecoverability Exposure rule. Uses data from the Recoverability Gaps data source.

l Host - Host for the replicated object

l Alert - Identifier of the alert

Recoverability Replicated Object Process ViewReturns a visualization of the recoverability of one or more backup objects in a topologyreport. Uses data from the Recoverability Replicated Object Process View data source.

l Type - Type of backup object. For example, filesystem, database, application

l ToolTip -

l Parameters -

l Node - Name of the object

l ReportObject -

l Source - Source of the view

l Label - Name of the field returned

l Name - Name of the object

l Target - Name of the target

Reports by System Template

Recoverability Detailed Exposures for ruleset 373

Page 374: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Group - Name of the backup group

Recoverability Replicated Object Storage MappingReturns recoverability replicated object storage mapping details in a table report. Usesdata from the Recoverability Replicated Object Storage Mapping data source.

l Node Initiator - Node initiator

l Primary Storage Array - Name of the primary storage array

l Primary Device ID - Identifier of the device in storage array

l Primary Device Name - Name of the device in storage array

l Source RDF Group - Source RDF Group name

l Source MV Session - Source MV session identifier

l Replication Method - Method by which the object has been replicated

l Target Storage Array - Name of the storage array where the source is being replicated

l Target Device ID - Identifier of the storage array where the source is being replicated

l Target Device Name - Name of the device where the source is being replicated

l Target RDF Group - Target RDF Group name

l Target MV Session - Target MV session identifier

l Storage Group - Name of storage group

l Vendor Status - Status as retrieved from the storage array

l Execution Time - Time that replication was executed

l Last Recovery Time - Last recovery time

l Relevant - Indicates whether relevant

l Alert - Recoverability alert

Recoverability ExcludesReturns the gaps that have been excluded from recoverability reporting by client in atable report. Uses data from the Recoverability Excludes data source.

l Client - Client for the managed object

l Path - Path to the managed object

l Storage Array - Name of the storage array where the object is located

l Replication Method - Method by which the object is replicated

l Gap - Type of gap excluded

l exclude id - Exclude identifier

l Replication Method Ed - Replication method identifier

l reason id - Reason identifier

l User - User who created the exclusion

l Date - Date of exclusion

l Approver - DPA user who approved the exclusion

l Expiration - Timestamp on which the exclusion expires

l Comments - User comments

Reports by System Template

374 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 375: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Recoverability Exposures SummarySummary of recoverability exposures in a table report. Uses data from the RecoverabilityGaps data source.

l Category - Category of exposure

l Gap - Reason why the gap was triggered

l Group - DPA group, if applicable

l Host - Host for the replicated object

l Path - Path to the replicated object. The path will depend on the replicated objecttype (for example, a directory path for a file system, or an application storage object)

l Replicated Object - Identifier for the replicated object

l Replication Method - Method by which the object is replicated

l Issued - Indicates when the gap was issued

l RP Time - Time the gap was triggered

l Storage Array - Source storage array for the replicated object

l Severity - Severity of the exposure

l Gap Details - Additional details on the gap

l GAP_REPORT_RP_ID -

l GAP_REPORT_storage array_ID -

l GAP_REPORT_GAP_ID -

l GAP_REPORT_replication method_ID -

l GAP_REASON_ID -

l GAP_REPORT_ACTUAL_PATH -

l GAP_REPORT_NODE_ID -

Recoverability GapsReturns recoverability gap details in a table report. Uses data from the RecoverabilityGaps data source.

l Category - Category of exposure

l Gap - Reason why the gap was triggered

l Group - DPA group, if applicable

l Host - Host for the replicated object

l Path - Path to the replicated object. The path will depend on the replicated objecttype (for example, a directory path for a file system, or an application storage object)

l Replicated Object - Identifier for the replicated object

l Replication Method - Method by which the object is replicated

l Issued - Indicates when the gap was issued

l Replication Time - Time the gap was triggered

l Storage Array - Source storage array for the replicated object

l Severity - Severity of the exposure

l Gap Details - Additional details on the gap

Reports by System Template

Recoverability Exposures Summary 375

Page 376: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l GAP_REPORT_RP_ID -

l GAP_REPORT_storage array_ID -

l GAP_REPORT_GAP_ID -

l GAP_REPORT_Replication Method_ID -

l GAP_REASON_ID -

l GAP_REPORT_ACTUAL_PATH -

l GAP_REPORT_NODE_ID -

Recoverability Host Analysis StatusReturns recoverability host analysis status details in a table report. Uses data form theRecoverability Host Analysis Tasks data source.

l task id - Identifier for the task

l Node - DPA object on which the task is run

l Task Name - Name for the task

l Start Date - Date task began

l End Date - Date task completed

l Status - Completion status of the task

l Run Id - Run identifier

l Ret Code - Return code

Recoverability Obsolete Recovery PointsReturns the recovery points that have been rendered out of date by changes in the sourcein a table report. Uses data from the Recoverability Obsolete Recovery Points data source.

l Service - DPA group in the view

l Client - Client for the managed object

l Replicated Object - Identifier for the object being replicated

l Storage Array - Identifier for the engine source of the object

l Storage Array Type - Type of engine. For example, Symmetrix

l Replication Method - Method by which object was replicated

l Status - Status of the recovery point. For example, valid, invalid

l Time - Timestamp of the recovery point

l RP_ID - Recovery point identifier

Recoverability Replication ConfigurationReturns recoverability replication configuration details in a table report. Uses data fromthe Recoverability Replication Configuration data source.

l Server - Name of the server on which the managed object is located

l Protected Object - Name of the file system or application being replicated

l Type - Type of backup object. For example, file system, database, application

l Source Storage Array - Name of the engine for the source object

l Source Device - Name of the device on the engine where the source object is located

Reports by System Template

376 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 377: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Replication Method - Method by which object is replicated

l Target Storage Array- Name of engine where the source is being replicated

l Target Device - Name of the device where the source is being replicated

l Hop - Number for the hop associated with the replication

Server to Storage ConfigurationReturns recoverability server to storage mappings details in a table report. Uses data fromthe Recoverability Server To Storage Mappings Tabular data source.

l Server - Name of the server containing the backup object

l Type - Type of backup object. For example, file system, database, application

l Protected Location - Name of the object

l Disk - Physical name of the device on the server containing the object

l VG - Name of the Volume Group on the host associated with the object

l LV - Name of the Logical Volume associated with the object

l Storage Array - Name of the storage array containing the physical device. Forexample, a storage array

l Storage Array Device - Name of the device on the storage array used by the object

Recoverability Server To Storage Mappings TopologyReturns recoverability server to storage mappings details in a topology report. Uses datafrom the Recoverability Server To Storage Mappings Topology data source.

l Type -

l ToolTip -

l Node - Name of the object

l Source - Source of the view

l Label - Name of the field returned

l Name - Name of the object

l Target - Name of the target

l Group - Name of the backup group

Recoverability StatusReturns recoverability status details in a health status report. Uses data from theRecoverability Recovery Points data source.

l Host - Server on which the replicated object is located

l Status - Status of the recovery point: valid, invalid

Recoverability Status By ObjectReturns recoverability status by object, which is the scope selected, in a health statusreport. Uses data from the Recoverability Recovery Points data source.

l Status - Status of the scope selected. Taken from the worst status of the RecoveryPoint that is part of the scope's decedents. The status can be valid, invalid

l Object - Name of the Scope

Reports by System Template

Server to Storage Configuration 377

Page 378: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Recoverability Status Monitor By ClientReturns recoverability status monitor by client in a health status report. Uses data fromthe Node Details and Recoverability Gaps data sources.

l Client - Host for the replicated object

l Num Gaps - Number of gaps

Recoverability Storage To Server Mappings TopologyReturns recoverability storage to server mappings in a topology report. Uses data fromthe Recoverability Storage To Server Mappings Topology data source.

l Type -

l ToolTip -

l Node - Name of the object

l Source - Source of the view

l Label - Name of the field returned

l Name - Name of the object

l Target - Name of the target

l Group - Name of the backup group

Recoverability TasksReturns recoverability task request information in DPA. Uses data from the RecoverabilityTasks data source.

l Node - The node the task runs on

l Task Name - The task name

l Start Date - Start of task

l Status - status of task

Recoverability Unprotected NodesReturns all of the objects that are not fully recoverable in a table report. Uses data fromthe Recoverability Unprotected File Systems data source.

l Service - DPA group in the view

l Host - Name of the server that the object is on

l Replicated Object - Name of the object without a recovery point

Recoverability VisualizationReturns recoverability visualization in a topology chart. Uses data from the RecoverabilityVisualization data source.

l Protected Object Name - Name of the protected object

l Content -An xml representing the topology that is rendered to the UI

l Managed Object Type -Type of the replicated object

l Protected_Object_Parent_Name - hidden by default

Reports by System Template

378 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 379: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Protected Object Inspected Object Id - hidden by default

Recoverability Visualization DetailsReturns an overview for each Recovery Point in the system in a table chart. Uses datafrom the Recoverability Visualization Details data source.

l Replication Status - In_Progress, Valid, SLA, Invalid, Deleted, Missing, Unknown

l Status - Icon for the status of the Recovery Point (red, yellow, green)

l Replicated Object - Name of the replicated object

l Type - Type of the replicated object

l Hop - Number for the hop associated with the replication

l Storage Array - Storage array that contains this Recovery Point

l Replication Method - Method of replication used

l Recoverability Type - The type of the Recovery Point. Could be Crash Consistent orRecoverable. Applicable only to valid application based Recovery Points

l Base Time - Time this Recovery Point can roll back to in respect to the protectedobject

l Recovery-Point Name - name of the Recovery Point image (if exists)

l RP-ID - (Hidden field)

Remote Replication RPO for MV/AReturns remote replication RPO for MirrorView in a line chart. Uses data from theConditional Report, Mirrorview Replication Lag, and System Variable data sources.

l Storage Array - Name of the storage array for the object

l Name - Name of the file system or application being replicated

l Duration - Total duration of the replication (in seconds)

l RPO - Recovery point objective (in seconds)

l User-defined max RPO -

l RPO Heuristic Threshold -

Remote Replication RPO for SRDF/AReturns remote replication RPO for SRDF/A in a line chart. Uses data from the ConditionalReport, SRDF/A Replication Lag, and System Variable data sources.

l Storage Array - Name of the storage array where the object is located

l RDFG Number - Number of the RDFG

l Duration - Total duration of the replication (in seconds)

l R2_behind_R1 - Replication lag (in seconds)

l Default max RPO -

l user-defined max RPO -

Reports by System Template

Recoverability Visualization Details 379

Page 380: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Remote Replication RPO forecast for MV/AReturns trended forecast for remote replication for MirrorView objects in a line chart. Usesdata from the Conditional Report, Mirrorview Replication Lag, and System Variable datasources.

l Storage Array - Name of the storage array for the object

l Name - Name of the file system or application being replicated

l Duration - Total duration of the replication (in seconds)

l RPO - Recovery point objective (in seconds)

l User-defined max RPO - As specified in the Protection Policy

l RPO Heuristic Threshold -

Remote Replication RPO forecast for SRDF/AReturns trended forecast for remote replication for SRDF/A objects in a line chart. Usesdata from the Conditional Report, SRDF/A Replication Lag, and System Variable datasources.

l Storage Array - Name of the storage array where the object is located

l RDFG Number - Number of the RDFG

l Duration - Total duration of the replication (in seconds)

l R2_behind_R1 - Replication lag (in seconds)

l Default max RPO -

l user-defined max RPO - As specified in the Protection Policy

Replication RPO ComplianceReturns an overview for compliance status for each Recovery Point in the system in atable. Uses data from the Replication RPO Compliance data source.

l Compliance Status - Status of the compliance of the Recovery Point; for example,valid, invalid, N/A

l Host - Host the Recovery Point resides on

l Protected Object - Name of the protected object

l Copy Type - Type of the replication method

l Type - Type of the protected object; for example, file system, application

l Target Copy -

l Replication Method -

l Replication Alerts - Number of alerts that are are associated to the Recovery Point

l Compliance - (as a percentage) - Calculated by the formula: ((Current time minus theTime of the Recovery Point) divided by (RPO defined in the protection policy))multiplied by 100

l Actual RPO - Calculated by the formula: Current time minus the Time of the RecoveryPoint

l Required RPO - RPO defined in the protection policy

l Target Copy Node ID - hidden by default

Reports by System Template

380 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 381: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Target Copy Node Type - hidden by default

Storage Replication StatusReturns all storage replication and their status in a table. Uses data from the StorageReplication Status data source.

l Source Storage Array - Name of the storage array for the source object

l Source Device - Name of the device on the storage array where the source objectislocated

l Replication Method - Method by which the object has been replicated

l Target Storage Array - Name of storage array where the source is being replicated

l Target Device - Name of the device where the source is being replicated

l Creation Time - Database creation time

l Deletion Time - Time that the replication was overridden

l Status - Replication status

Resource Utilization system templatesResource Utilization reports display information on the utilization of devices managed bythe backup server.

DPA provides two methods of measuring utilization:

l Current utilization is a measure of the percentage of the existing data file that isoccupied.

l Logical utilization is a measure of the percentage that the existing contents of themaximum size to which the datafile can grow.

Aggregate Network Interface PerformanceReturns information on the performance of a network in a line chart. Uses data from theNetwork Interface Performance data source.

l Packets - Number of packets leaving the interface (thousands/second)

Aggregate Virtual Network Interface PerformanceReturns information on the performance of a virtual network interface in a line chart. Usesdata from the Network Interface Performance data source.

l Packets - Number of packets leaving the interface (thousands/second)

BTD Storage Utilization By NodeReturns information on storage utilization by object in a line chart. Uses data from the VTLConfiguration and VTL Status data sources.

l Hostname - Hostname of the VTL

l Utilization - Amount of disk capacity used by the VTL (in GB)

Reports by System Template

Storage Replication Status 381

Page 382: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Client OccupancyReturns backup client occupancy in a table report. Uses data from the Backup ClientOccupancy By Client - Logical and Backup Client Occupancy By Client - Physical datasources.

l Client - Name of the backup client

l Physical - Amount of physical storage used (in MB). Physical space is the total spacetaken up by data for the filespace including space that is no longer active in itself butpart of a set of data that is still active

l Logical - Amount of logical storage used (in MB). Logical space is purely the spacetaken up by active data

Backup Client Occupancy by PoolReturns the amount of physical and logical storage used over a period of time for eachclient in a table report. Uses data from the Backup Client Occupancy data source.

l Pool - Storage pool which contains the client filespace

l Physical - Amount of physical storage used (in MB). Physical space is the total spacetaken up by data for the filespace including space that is no longer active in itself butpart of a set of data that is still active

l Logical - Amount of logical storage used (in MB). Logical space is purely the spacetaken up by active data

Backup Device Utilization by DeviceReturns the percentage of time that a tape drive is in used over time in a column chart.Uses data from the Tape Drive Performance From Best Source data source.

l Device Host - Name of the host that the device is connected to

l Device Name - Name of the device

l Active - Throughput of the device when performing write operations (as a percentage)

Backup Server UtilizationReturns the percentage utilization of a backup server in a line chart. Uses data from theBackup Server Utilization data source.

l Server - Name of the backup server

l Utilization - Percentage that the server is being utilized

CG UtilizationReturns information on Consistency Group utilization in a line chart. Uses data fromConsistency Group Copy Performance.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the Consistency Group

l Name - Name of the copy within the consistency group

l Transfer Time - Percentage of time that the link was up

l Initialization Time - Percentage of time that the link was initializing

Reports by System Template

382 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 383: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l High Load Time - Percentage time of High load

Client Occupancy SummarySummary of the client occupancy details in a table report. Uses data from the BackupClient Occupancy By Client - Logical and Backup Client Occupancy By Client - Physicaldata sources.

l Client - Name of the backup client

l Physical - Amount of physical storage used (in MB). Physical space is the total spacetaken up by data for the filespace including space that is no longer active in itself butpart of a set of data that is still active

l Logical - Amount of logical storage used (in MB). Logical space is purely the spacetaken up by active data

Client Occupancy TrendReturns the client occupancy trend in a line chart. Uses data from the Backup ClientOccupancy By Client - Logical and Backup Client Occupancy By Client - Physical datasources.

l Client - Name of the backup client

l Physical - Amount of physical storage used (in MB). Physical space is the total spacetaken up by data for the filespace including space that is no longer active in itself butpart of a set of data that is still active

l Logical - Amount of logical storage used (in MB). Logical space is purely the spacetaken up by active data

Current Memory Usage By NodeReturns current memory usage by object in a column chart. Uses data from the MemoryConfiguration and Memory Status data sources.

l Hostname - Name of the host

l Sub Name - Name of the storage array

l Total Memory - Total of the physical and virtual memory (in MB)

l Used - Amount of memory in use on the machine (in MB)

Data Domain Average Hourly Data IngestedReturns Data Domain average hourly data ingested in a line chart. Uses data from theTape Drive Performance Write Throughput (MB) data source.

l Hostname - Name of the client

l Library Name - Name of the tape library to which the drive belongs

l Avg. Data Ingested - Amount Count and Write Throughput (MB/second)

Data Domain Boost StatisticsReturns current data domain boost information in a table report. Uses data from the DataDomain Boost Statistics data source.

l Hostname - Name or IP address of the Data Domain server

l Pre Compression Received - Number of pre-compression KB/second received

Reports by System Template

Client Occupancy Summary 383

Page 384: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Post Compression Received - Number of local compression KB/second received

l Num Bytes Received - Number of physical network bytes/second received

l Num Bytes Read - Number of bytes/second read

Data Domain Boost Storage Unit StatisticsReturns information on Data Domain Boost Storage Unit statistics in a table. Uses datafrom the Data Domain Boost Storage Unit Statistics.

l Hostname - Name or IP address of the Data Domain server

l Name - Storage unit name

l Original Size - Storage unit original size (in MB)

l Post Global Dedupe Size - Size after global deduplication (in MB)

l Post Local Compression Size - Size after deduplication + local compression (in MB)

l Metadata Size - Size of metadata (in MB)

Data Domain Client Deduplication RatioReturns information on Data Domain cilent deduplication ratios in a table. Uses data fromthe Deduplication Status data source.

Note that the dedup ratio field in this report are based on metrics at the time that thedata was ingested on the Data Domain. It is not possible to report on the physical size offiles being stored on the Data Domain. This is a current limitation within Data Domain.

l Data Domain Name - Name of the Data Domain

l Client - Name of the client

l Dedup Ratio - Deduplication ratio for client calculated as (Pre Deduplication/Post<p>Deduplication)-1/(Pre Deduplication/Post Deduplication

l Post-Deduplication - Size after compression and deduplication

l Pre-Deduplication- Size before compression and deduplication

l Backup Application - the backup application associated with the backups

Data Domain Compression FactorReturns the ratio for the size of data compressed against the original data size over timein a line chart. Uses data from the Access Group Configuration and VTL Status datasources.

l Hostname - Name or IP address of the Data Domain server

l Compression Factor - Ratio of compressed data size to data backed up

Data Domain Daily Compression StatisticsReturns Data Domain daily compression statistics in a line chart. Uses data from the DailyCompression Statistics data source.

l Hostname - Name or IP address of the Data Domain server

l Total Compression Factor - Difference between the Pre Compression Size and the PostLocal Compression Size (in MB)

l Dedupe Ratio - Difference between the Deduplication Ratio and the TotalCompression Factor (as a percentage)

Reports by System Template

384 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 385: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Global Compression Factor - Size after deduplication (in MB)

l Local Compression Factor - Size after deduplication + local compression (in MB)

l Reduction - (as a percentage)

Data Domain Data IngestedReturns information on Data Domain data ingested in a line chart over time. Uses datafrom the Data Ingested Usage data source.

l Hostname - Name of the Data Domain

l Pre Compression - Uncompressed data backed up by the system

l Post Compression - Used space of file system "data"

Data Domain Data Written ToReturns data on the statistics of Data Domain daily compression in a table. Uses datafrom the Daily Compression Statistics data source.

l Pre Compression Size - Size before compression (in MB)

l Post Global Compression Size - Size after deduplication (in MB)

l Post Local Compression Size - Size after deduplication + local compression (in MB)

Data Domain DeDuplication RatioReturns the ratio for the size of data deduplicated against the original data size over timein a line chart. Uses data from the Access Group Configuration and VTL Status datasources.

l Hostname - Name or IP address of Data Domain

l Dedupe Ratio - Difference between the Deduplication Ratio and the TotalCompression Factor (as a percentage)

Data Domain File Distribution By CountReturns Data Domain file distribution by count.

l DataDomain name - Data Domain host

l Less than day - Number of files on the Data Domain with an age of less than a day

l 1 day-1week - Number of files on the Data Domain with an age of more than a day butless than a week

l 1-2 weeks - Number of files on the Data Domain with an age of more than a week butless than 2 weeks

l 2 weeks-1 month - Number of files on the Data Domain with an age of more than 2weeks but less than a month

l 1-2 months - Number of files on the Data Domain with an age of more than a monthbut less than 2 months

l 2-3 months - Number of files on the Data Domain with an age of more than 2 monthsbut less than 3 months

l 3-6 months - Number of files on the Data Domain with an age of more than 3 monthsbut less than 6 months

l 6 months-1 year - Number of files on the Data Domain with an age of more than 6months but less than a year

Reports by System Template

Data Domain Data Ingested 385

Page 386: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Greater than year - Number of files on the Data Domain with an age of more than ayear

Data Domain File Distribution By SizeReturns Data Domain file distribution by size.

l DataDomain name - Data Domain host

l Less than day - Total size files on the Data Domain with an age of less than a day

l 1 day-1 week - Total size files on the Data Domain with an age of more than a day butless than a week

l 1-2 weeks - Total size files on the Data Domain with an age of more than a week butless than 2 weeks

l 2 weeks-1 month - Total size files on the Data Domain with an age of more than 2weeks but less than a month

l 1-2 months - Total size files on the Data Domain with an age of more than a monthbut less than 2 months

l 2-3 months - Total size files on the Data Domain with an age of more than 2 monthsbut less than 3 months

l 3-6 months - Total size files on the Data Domain with an age of more than 3 monthsbut less than 6 months

l 6 months-1 year - Total size files on the Data Domain with an age of more than 6months but less than a year

l Greater than year - Total size files on the DataDomain with an age of more than a year

Data Domain Reduction RatiosReturns information on Data Domain reduction ratios in a line chart over time. Uses datafrom the VTL Status and Daily Compression Statistics data sources.

l Hostname - Name of the Data Domain

l Daily Backup Volume - Daily size before compression (in MB)

l Daily Reduction - he daily reduction ratio achieved

l Total Reduction - The total reduction ratio achieved

Data Domain System UtilizationReturns information on Data Domain system utilization in a line chart. Uses data from theData Ingested Usage and Filesystem Capacity by Client data sources.

l Hostname - Name of the Data Domain

l Capacity - Total capacity of the file system "data" (in MB)

l Pre Compression - Uncompressed data backed up by the system

l Post Compression - Used space of file system "data"

Data Domain UtilizationReturns information on Data Domain utilization in a table. Uses data from Data DomainModes, Filesystem Status, Filesystem Utilization by Client, and Filestystem Capacity byClient.

l Hostname - Name of the host on which the file system is mounted

Reports by System Template

386 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 387: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Capacity - Total capacity on the host (in MB)

l Sub name - Identifier for the storage array

l Filesystem - Name of the file system

l Used Capacity - Amount of space used on the file system (in MB)

l Utilization - Average utilization for all hosts (as a percentage)

l Free Capacity - Amount of free space on the file system (in MB)

l Dedup Ratio - The dedup ratio that Data Domain is achieving

l Last Days Change (GB)- The amount of space used per Data Domain in the 24 hours

l Cleanable Space - Amount of space that can be cleaned (in MB)

DataProtector Database UsageReturns Data Protector database usage in a line chart. Uses data from the DatabaseUsage data source.

l Server - Name of the Data Protector Server

l Database Name - Name of the internal database

l Table Name - Name of the database table

l Size - Size of the table (in MB)

l Used Records - Number of records used in the table

l Total Records - Number of total records allocated in the table

DataProtector System DynamicsReturns Data Protector system dynamic details in a table report. Uses data from theSystem Dynamics data source.

l Server - Name of the Data Protector server

l Client - Name of the Data Protector client

l Num Filenames - Total number of filenames in the internal database

l Num Active Filenames - Number of active filenames in the internal database

l Num Created Per Day - Average number of files created per day (as a percentage)

l Num Deleted Per Day - Average number of files deleted per day (as a percentage)

l Active Growth Per Year - Growth in active filenames over the year (as a percentage)

l Total Growth Per Year - Total growth in files over the year (as a percentage)

l Dynamics - One of: Low, Medium, High, Critical

EDL 3D Compression RatioReturns the ratio for the size of data compressed against the original data size over timein a line chart. Uses data from the VTL Status data source.

l Hostname - Hostname of the VTL

l Data Compression Ratio - Ratio of compressed data size to data backed up

Reports by System Template

DataProtector Database Usage 387

Page 388: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

EDL 3D DeDupe QueueReturns the EDL 3D deduplication queue in a line chart. Uses data from the VTL Statusdata source.

l Hostname - Hostname of the VTL

l Waiting for Dedup - VTL is waiting for deduplication to begin (in MB)

l Wont be Deduped - VTL will not be deduplicated (in MB)

EDL 3D Total Reduction RatioReturns EDL 3D total reduction ratio in a line chart. Uses data from the VTL Status datasource.

l Hostname - Hostname of the VTL

l Total Reduction Ratio - Ratio of data protected to data backed up

Fabric UtilizationReturns fabric utilization in a pie chart. Uses data from the Fibre Channel Port Status datasource.

l Count - Port count

Fibre Channel Port UtilizationReturns the utilization of Fibre Channel ports in a line chart. Uses data from the FibreChannel Performance By Port and Fibre Channel Port Status data sources.

l Hostname - Name of the object

l Sub Name - Name of server instance, if applicable

l Port - Port identifier. For example, Port 1

l Data Out Utilization - Amount of data sent from the port (as a percentage)

l Data In Utilization - Amount of data received by the port (as a percentage)

Filesystem Aggregate UtilizationReturns file system aggregate utilization details in a line chart. Uses data from theFilesystem Utilization data source.

l Filesystem Utilization - Average file system utilization for all hosts (as a percentage)

Filesystem Average Disk ActivityReturns the average percentage of time that the disks are busy across all file servers fromwhich the report has been run in a line chart. Uses data form the Filesystem Disk Activityand Filesystem Disk Status data sources.

l Filesystem node - Name of the object to which the file system is attached

l Filesystem - Name of the file system

l Data Disks -

l Data busy - (as a percentage)

l Parity Disks -

Reports by System Template

388 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 389: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Parity Busy - (as a percentage)

Filesystem Average Disk Activity for rulesetReturns details filesystem average disk activity in a table report. Report for NetAppvolume would benefit from more disks rule. Uses data from the Filesystem Disk Activity,Filesystem Disk Status, and User Input data sources.

l Filesystem node - Name of the object to which the file system is attached

l Alert - Identifier of the alert

Filesystem Disk ActivityReturns the file system disk activity in a line chart. Uses data from the Filesystem DiskActivity data source.

l Filesystem node - Name of the object to which the file system is attached

l Filesystem - Name of the file system

l Filesystem Sub Name - Name of the storage array on which the file system resides

l Disk node - Name of the object to which the disk is attached

l Disk - Name of the disk

l Busy - Average activity level for the disks (as a percentage)

Filesystem Peak Snapshot UtilizationReturns file system peak snapshot utilization in a table report. Uses data from theFilesystem Configuration and Filesystem Status data sources.

l Hostname - Name of the host on which the file system is mounted

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Peak Snapshot Utilization - (as a percentage)

l Cleanable Space - Amount of space that can be cleaned (in MB)

Filesystem Snapshot UtilizationReturns file system snapshot utilization in a line chart. Uses data from the FilesystemConfiguration and Filesystem Status data sources.

l Hostname - Name of the host on which the file system is mounted

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Snapshot Utilization - (as a percentage)

l Cleanable Space - Amount of space that can be cleaned (in MB)

Filesystem UtilizationReturns the utilization of all file systems on a host or group of hosts over time in a tablereport. Uses data from the Filesystem Configuration and Filesystem Status data sources.

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

Reports by System Template

Filesystem Average Disk Activity for ruleset 389

Page 390: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Space Usage - Amount of space used on the file system (in MB)

l Inode Usage - (1000)

l Capacity - Total space on the file system available for standard usage (in MB)

l Files - Maximum number of files on the file system (1000)

l Space Utilization - (as a percentage)

l Inode Utilization - (as a percentage)

l Cleanable Space - Amount of space that can be cleaned (in MB)

Filesystem Utilization By NodeReturns the average file system utilization on a host over time by averaging the utilizationacross all file systems on that host in a line chart. Uses data from the FilesystemUtilization By Client data source.

l Hostname - Name of the host

l Utilization - Average file system utilization for each host (as a percentage)

Filesystem Utilization By PartitionReturns file system utilization by partition in a line chart. Uses data from the FilesystemUtilization By Partition data source.

l Hostname - Name of the host

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Filesystem Utilization - Average file system utilization for the file system (as apercentage)

Filesystem Utilization CurrentReturns the percentage of the existing data file that is occupied in a column chart. Usesdata from the Filesystem Utilization By Partition data source.

l Hostname - Name of the host

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Filesystem Utilization - Average file system utilization for the file system (as apercentage)

Filesystem Utilization for rulesetReturns details on the filesystem utilization in a table report. Report for Filesystemutilization high and increasing rule. Uses data from the Filesystem Utilization By Partitionand User Input data sources.

l Hostname - Name of the host

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Alert - Identifier of the alert

Reports by System Template

390 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 391: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

HP VLS Capacity Utilization TrendReturns HP Virtual Library System capacity utilization trend in a line chart. Uses data fromthe VTL Status data source.

l Hostname - Hostname of the VTL

l Physical Capacity Utilization - Percentage usage of physical capacity

l Logical Capacity Utilization - Percentage usage of logical capacity

HP VLS ThroughputReturns Virtual Library System throughput in a line chart. Uses data from the VTL Statusdata source.

l Hostname - Hostname of the VTL

l Throughput - Device throughput (MB/second)

l Replication Throughput In - Inbound replication throughput (MB/second)

l Replication Throughput Out - Outbound replication throughput (MB/second)

MTree Daily Compression StatisticsReturns MTree daily compression statistics in a table report. Uses data from the MTreeDaily Compression Statistics data source.

l Hostname - Name or IP address of the Data Domain server

l Name - MTree name

l Pre Compression Size - Size before compression (in MB)

l Post Global Compression Size - Size after deduplication (in MB)

l Post Local Compression Size - Size after deduplication + local compression (in MB)

MTree Quota Utilization'Returns the MTree quota utilization details per MTree in a line graph over time. Uses datafrom the Quota Configuration data source.

l Pre Compression Soft Limit Utilization - The Pre Compression Size divided by the SoftLimit value, then this value is multiplied by 100

l Pre Compression Hard Limit Utilization - The Pre Compression Size divided by theHard Limit value, then this value is multiplied by 100

Memory UtilizationReturns the aggregate memory utilization over time of memory on all hosts selected in thereport in a line chart. Uses data from the Memory Configuration and Memory Status datasources.

l Utilization - (as a percentage)

Memory Utilization By NodeReturns the utilization over time of memory on a per host basis in a line chart. Uses datafrom the Memory Configuration and Memory Status data sources.

l Hostname - Name of the host

Reports by System Template

HP VLS Capacity Utilization Trend 391

Page 392: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Sub Name - Name of the storage array

l Used - Amount of memory in use on the machine (in MB)

l Utilization - (as a percentage)

Memory Utilization CurrentReturns the percentage of the existing data file that is occupied in a column chart. Usesdata from the Memory Configuration and Memory Status data sources.

l Utilization - (as a percentage)

Network Interface Performance By InterfaceReturns network interface performance by interface in a line chart. Uses data from theNetwork Interface Performance By Interface data source.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

l Data In - Amount of data coming into the interface (KB/second)

l Data Out - Amount of data leaving the interface (KB/second)

l Packets In - Number of packets coming in to the interface (1000s/second)

l Packets Out - Number of packets leaving the interface (1000s/second)

l Data - (KB/second)

l Packets - (1000s/second)

Network Interface Performance By NodeReturns network interface performance by object in a line chart. Uses data from theNetwork Interface Performance By Node data source.

l Hostname - Name of the host on which the network interface is located

l Data - (KB/second)

l Packets - (1000s/second)

Network Interface Performance SummaryThis report shows the maximum and average throughput by network interface, andperformance in kilobytes per second by interface.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

l Max Throughput - (KB/second)

l Average Throughput - (KB/second)

Reports by System Template

392 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 393: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Network Interface Utilization By Interface and DirectionReturns network interface utilization by interface and direction in a line chart. Uses datafrom the Network Interface Performance By Interface and Network Interface Status datasources.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

l Data In Utilization - Amount of data coming into the interface (as a percentage)

l Data Out Utilization - Amount of data leaving the interface (as a percentage)

NetWorker VBA UtilizationReturns information on NetWorker Virtual Basic Appliance (VBA) utilization in a table.Uses data from the VBA Configuration and VBA Status data sources.

l Server - Name of the Networker server

l Name - Name of the VBA

l Total Capacity - Total capacity (MB)

l Used Capacity - Used capacity of the VBA (MB)

l Capacity Utilization - Percentage usage of total capacity

Process CPU UtilizationReturns the CPU utilization of all processes running on a machine over the report’s timeperiod in a line chart. Uses data from the Process Status data source.

l Hostname - Name on which the process is running

l PID - Identifier of the process

l Process Name - Name of the process

l CPU - Amount of CPU used by the process (as a percentage)

Process CPU Utilization For Specific ProcessReturns the utilization of CPUs for specific processes over a period of time in a line chart.Uses data from the Process Status data source.

l Hostname - Name on which the process is running

l PID - Identifier of the process

l Process Name - Name of the process

l CPU - Amount of CPU used by the process (as a percentage)

Process Memory UsageReturns the memory usage of processes running on a machine in a line chart. Uses datafrom the Process Status data source.

l Hostname - Name on which the process is running

l PID - Identifier of the process

l Process Name - Name of the process

Reports by System Template

Network Interface Utilization By Interface and Direction 393

Page 394: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Memory - Amount of memory used by the process (in MB)

RecoverPoint Journal UtilizationReturns the percentage journal utilization (journal usage of total journal capacity) overtime in a line chart. Uses data from the Consistency Group Copy Status data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the Copy

l Journal Utilization - Current utilization of the journal (as a percentage)

System Statistics RAGReturns system statistics Red, Amber, Green (RAG) traffic-light style report details in ahealth status report. Uses data from the Disk Activity By Device, Network Interface Status,Network Interface Performance By Interface, Memory Status, Filesystem Utilization ByPartition, Processor Utilization By Client, and Memory Configuration data sources.

l Hostname - Name of the host

l CPU - Utilization on the CPU (as a percentage)

l Memory - Utilization on the memory (as a percentage)

l Node - Name of the object

l Disk - Utilization on the disk (as a percentage)

l Filesystem - Utilization on the file system (as a percentage)

l Net In - Net utilized in (as a percentage)

l Net Out - Net utilized out (as a percentage)

TSM Client Occupancy SummarySummary of TSM client occupancy details in a table report. Uses data from the BackupClient Occupancy By Client - Logical, Backup Client Occupancy By Client - Physical, andTSM Total Logical Occupancy data sources.

l Client - Name of the backup client

l Physical - Amount of physical storage used (in MB). Physical space is the total spacetaken up by data for the filespace including space that is no longer active in itself butpart of a set of data that is still active

l Logical - Amount of logical storage used (in MB). Logical space is purely the spacetaken up by active data

TSM Database UtilizationReturns the utilization of the TSM database and recovery log over time in a line chart.Uses data from the TSM Database Utilization data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Object - One of: Database, Recovery Log

l Utilization - Utilization of the assigned capacity (as a percentage)

Reports by System Template

394 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 395: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

TSM Storage Pool UtilizationReturns the utilization of storage pools over time against the high migration point andlow migration point values. Uses data from the Backup Pool Configuration and BackupPool Status data sources. This report allows users to see how close pool utilization is tothe migration thresholds.

l Server - Hostname of backup server on which the pool is located

l Sub Name - Name of TSM server instance

l Pool Name - Name of the storage pool

l Utilization - Percentage of storage pool utilized

l High Mig. Pct - Value at which the TSM server automatically starts migration for thisstorage pool. This value is determined when the number of volumes containing datareaches this percentage of the total number of volumes in the storage pool. The totalnumber of volumes includes the maximum number of scratch volumes

l Low Mig. Pct - Value at which the TSM server stops migration for this storage pool.This value is determined when the number of volumes containing data reaches thispercentage of the total number of volumes in the storage pool

Tape Library Aggregate UtilizationReturns the total utilization across all tape libraries in a column chart. Uses data from theTape Library Configuration and Tape Library Status data sources.

l Utilization - Number of slots that are occupied with tapes (as a percentage). Thisvalue is the combined utilization for all tape libraries managed by the ACSLS server

Tape Library Aggregate Utilization TrendReturns the aggregate utilization across all tape libraries over a given time period in a linechart. Uses data from the Tape Library Configuration and Tape Library Status datasources.

l Utilization - Number of slots that are occupied with tapes (as a percentage). Thisvalue is the combined utilization for all tape libraries managed by the ACSLS server

Tape Library Capacity UtilizationReturns tape library capacity utilization in a line chart. Uses data from the Tape LibraryStatus data source.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring adevice directly. Instead its name is populated in the Hostname field. This field ispopulated if monitoring a device that manages multiple libraries such as an EDL

l Physical Capacity Utilization - Percentage usage of physical capacity

l Logical Capacity Utilization - Percentage usage of logical capacity

Tape Library Compression RatioReturns the size of data compressed against the original data size over time in a linechart. Uses data from the Tape Library Status data source.

l Hostname - Name of the device being monitored

Reports by System Template

TSM Storage Pool Utilization 395

Page 396: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Library Name - Name of the tape library. This field is not populated if monitoring adevice directly. Instead its name is populated in the Hostname field. This field ispopulated if monitoring a device that manages multiple libraries such as an EDL

l Data Compression Ratio - Ratio of compressed data size to data backed up

Tape Library Deduplication RatioReturns the size of data deduplicated against the original data size over time in a linechart. Uses data form the Tape Library Status data source.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring adevice directly. Instead its name is populated in the Hostname field. This field ispopulated if monitoring a device that manages multiple libraries such as an EDL

l Dedupe Ratio - Difference between the Deduplication Ratio and the TotalCompression Factor (as a percentage)

Tape Library Slot Utilization TrendReturns the utilization of each tape library at a point in time and trended over time in aline chart. Uses data from the Num Volumes and Tape Library Configuration data sources.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring adevice directly. Instead its name is populated in the Hostname field. This field ispopulated if monitoring a device that manages multiple libraries such as an EDL

l Slot Utilization -

Tape Library ThroughputReturns tape library throughput details in a line chart. Uses data from the Tape LibraryStatus data source.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring adevice directly. Instead its name is populated in the Hostname field. This field ispopulated if monitoring a device that manages multiple libraries such as an EDL

l Throughput - Throughput of size to duration (MB/sec)

l Replication Throughput In - Inbound replication throughput (MB/second)

l Replication Throughput Out - Outbound replication throughput (MB/second)

Tape Library Usage By LibraryReturns tape library usage by library details in a column chart. Uses data from the TapeLibrary Configuration and Tape Library Status data sources.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring adevice directly. Instead its name is populated in the Hostname field. This field ispopulated if monitoring a device that manages multiple libraries such as an EDL

l Num Volumes - Number of volumes in the library

l Num Empty Slots - Number of empty slots

Reports by System Template

396 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 397: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Tape Library UtilizationReturns the utilization of each individual tape library at a point in time in a column chart.Uses data from the Tape Library Configuration and Tape Library Status data sources.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring adevice directly. Instead its name is populated in the Hostname field. This field ispopulated if monitoring a device that manages multiple libraries such as an EDL

l Utilization - (as a percentage)

Tape Library Utilization TrendReturns the utilization trend of each individual tape library at a point in time in a linechart. Uses data from the Tape Library Configuration and Tape Library Status datasources.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring adevice directly. Instead its name is populated in the Hostname field. This field ispopulated if monitoring a device that manages multiple libraries such as an EDL

l Utilization - (as a percentage)

Tape Library Volume Utilization TrendReturns the utilization of each tape library volume over time in a line chart. Uses datafrom the Tape Library Volume Status data source.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring adevice directly. Instead its name is populated in the Hostname field. This field ispopulated if monitoring a device that manages multiple libraries such as an EDL

l Utilization - (as a percentage)

Top 10 Offending ClientsReturns the top ten offending clients in a table report. Uses data from the Backup DeviceConfig, Backup Device Status, Backup Job Details, Backup Job Media, and Pools On DataDomain data sources.

l Server - Name of the backup server

l Client - Name of the client backed up

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Data Domain Name - Name of the Data Domain

l De-Dupe Ratio - (as a percentage)

Reports by System Template

Tape Library Utilization 397

Page 398: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Top 10 Offending JobsReturns the top ten offending jobs in a table report. Uses data from the Backup DeviceConfig, Backup Device Status, Backup Job Details, Backup Job Media, and Pools On DataDomain data sources.

l Server - Name of the backup server

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Level - Level of the backup. This is hardcoded to full

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Data Domain Name - Name of the Data Domain

l De-Dupe Ratio - (as a percentage)

Top 5 Busiest ServersReturns the top five busiest servers in a table report. Uses data from the ProcessorUtilization By Client data source.

l Node - Name of the host

l CPU Utilization - Utilization on the CPU (as a percentage)

VTL Aggregate Storage UtilizationReturns VTL aggregate storage utilization details in a line chart. Uses data from the VTLConfiguration and VTL Status data sources.

l Utilization - (as a percentage)

Virtual Fibre Channel Port UtilizationReturns the utilization of virtual Fibre Channel ports in a line chart. Uses data from theFibre Channel Performance By Port and Fibre Channel Port Status data sources.

l Hostname - Name of the object

l Sub Name - Name of server instance, if applicable

l Port - Port identifier. For example, Port 1

l Data Out Utilization - Amount of data sent from the port (as a percentage)

l Data In Utilization - Amount of data received by the port (as a percentage)

Virtual Host Memory UtilizationReturns virtual host memory utilization details in a line chart. Uses data from the VirtualHost Configuration and Virtual Host Status data sources.

l Virtual Host - Name of the Virtual Centre server

l Memory Used - Amount of memory used by the virtual machine (in MB)

l Utilization - Amount of memory utilization (as a percentage)

Reports by System Template

398 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 399: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Virtual Network Interface Performance By InterfaceReturns the virtual network interface performance by interface in a line chart. Uses datafrom the Network Interface Performance By Interface data source.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

l Data In - Amount of data coming into the interface (KB/second)

l Data Out - Amount of data leaving the interface (KB/second)

l Packets In - Number of packets coming in to the interface (1000s/second)

l Packets Out - Number of packets leaving the interface (1000s/second)

l Data -

l Packets -

Virtual Network Interface Performance By NodeReturns the virtual network interface performance by object in a line chart. Uses datafrom the Network Interface Performance By Node data source.

l Hostname - Name of the host on which the network interface is located

l Data - Amount of data leaving the object (KB/second)

l Packets - Number of packets leaving the object (1000s/second)

Virtual Network Interface Performance SummarySummary of the virtual network interface performance in a column chart. Uses data fromthe Network Interface Performance By Interface data source.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

l Max Throughput - (KB/second)

l Average Throughput - (KB/second)

Xsigo Infiniband Port UtilizationReturns the percentage utilization of the Infiniband port or ports in a line chart. Uses datafrom the Infiniband Port Status and Infiniband Port Performance data sources.

l Hostname - Name of the Xsigo Director object

l Sub Name - Identifier for the switch

l Name - Identifier for the InfiniBand port

l Data In Utilization - Amount of data received (KB/second)

l Data Out Utilization - Amount of data sent (KB/second)

Reports by System Template

Virtual Network Interface Performance By Interface 399

Page 400: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

ROI system templatesThe return on investment (ROI) reports compare the costs of backing up an environmentby traditional backup application compared to Avamar deduplication.

Deduplication Cost SavingsReturns the cost savings of an Avamar installation for each machine being backed up in atable report. Uses data from the Backup Server Status, Total Size, Total Size Scanned,and User Input data sources. The cost savings are calculated by looking at how much itwould cost to fully protect each client using a traditional backup application compared tothe cost to fully protect each client using Avamar.

l Server - Hostname of the backup server

l Client -

l Data Backed Up - Total amount of data backed up (in GB)

l Data Protected - (in GB)

l Cost/GB for backups - Current cost to back up a single gigabyte of data in theenvironment

l Cost of Deduplicated Backups -

l Cost of Traditional Backups -

l Cost Saving Due to Deduplication -

Deduplication ROI TrendReturns the ROI (return on investment) for an Avamar installation over time in a line chart.Uses data from the Backup Server Status, Total Size, Total Size Scanned, and User Inputdata sources. The return on investment is calculated by looking at how much it wouldcost to fully protect the environment using a traditional backup application compared tothe cost to fully protect the environment using Avamar.

l Purchase cost - Total cost of the Avamar installation. This is the cost against whichthe savings are balanced to show overall ROI.

l Cost of Deduplicated Backups -

l Cost of Traditional Backups -

l Cost Saving Due to Avamar -

l Return on Investment - The values are in units of currency. For example, if the cost ofthe Avamar installation is $10,000 and the cost of carrying out backups is 1 cent pergigabyte, enter 10,000 for Purchase cost and 0.01 for Cost/GB for backups.To obtain the best ROI information, run the report with a start time of when Avamarwas first monitored and an end time of the current time.

Scheduling system templatesScheduling reports display information on when backup Jobs were run and which deviceswere in use.

The Scheduling reports are broken down into reports about the scheduling of backupsand the scheduling of devices.

Reports by System Template

400 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 401: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Active Clone Job DistributionReturns the number of active (running) Jobs over time. Uses data from the Active Jobsdata source.

l Active Clones - Number of Jobs that are active

Backup Active Job DistributionReturns information on the distribution of active backups in a column chart. Uses datafrom the Active Jobs data source.

l Active Jobs - Number of active clone jobs

Backup Client ScheduleReturns backup client schedule in a timeline chart. Uses data from the Backup Job Detailsand SLA Schedule Details data sources. This report is similar to the Job Schedule report.The difference is that information on jobs is rolled up on a per-client basis so that a row isdisplayed for each client.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Proxy - Proxy backup host

l Session - Number of sessions simultaneously accessing the device

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Started - Time the Job started writing

l Finished - Time the Job completed

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Transferred - Total size of the data transferred (in MB)

l Archive Flag - Indicates whether Job was an archive or a backup

Reports by System Template

Active Clone Job Distribution 401

Page 402: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Effective Path - Effective path of the Backup

l Error Code Summary - Error code summary associated with the error message

l Status Code Summary - Status code summary from the job

l Plugin Name - Plug-in name

l Num. Successful Copies - Number of successful copies

l Num. Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policySchedule - Name of the schedule

l Start Time - Start times for each schedule component

l End Time - End times for each schedule component

Reports by System Template

402 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 403: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Duration - Durations of each schedule component

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Device SchedulingReturns when devices are in use by analyzing performance information from the drives ina timeline chart. Uses data from the Tape Drive Performance From Best Source datasource. This report does not return data for backup applications that do not providedevice performance information such as Symantec NetBackup.

l Device Host - Name of the host that the device is connected to

l Device Name - Name of the device

l Write Throughput - Throughput of the device when performing write operations (KB/second)

l Read Throughput - Throughput of the device when performing read operations (KB/second)

Backup Device Shared UsageReturns backup device usage for shared devices in a timeline chart. Uses data from theBackup Device Config and Backup Device Status data sources. This report can be used inshared storage environments to show the utilization of the underlying physical tape driveinstead of looking at things from a host-centric view. This report will return no data in anon-shared environment.

l Hardware Id - Identifier such as the device serial number that uniquely maps it to aphysical device

l Status - Status of the drive: Up, Down, Service

Backup Device UsageReturns details on the backup device usage in a timeline chart. Uses data from theBackup Device Status data source.

l Hardware ID - Identifier such as the device serial number that uniquely maps it to aphysical device

l Status - Status of the drive: Up, Down, Service

Backup Group ForecastReturns when groups are scheduled to run in a timeline chart. Uses data from the AvamarGroup Forecast and NetBackup Group Forecast data sources.

l Server - Name of the backup server

l Group - Name of group associated with schedule

Reports by System Template

Backup Device Scheduling 403

Page 404: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Schedule - Name of the schedule on the backup server

l Start Time - Date and time a schedule run starts

l End Time - Date and time a schedule run ends

l Duration - Total duration of a run

Backup Job DistributionReturns the total number of jobs completed over time in a line chart. Uses data from theNum Jobs data source. This report appears when jobs are completed on a backup serveror on a set of clients. This report allows users to identify the busiest times during thebackup window so that users can schedule backups at other times or plan outages.

l Num Jobs - Number of jobs that have completed

Backup Job Distribution By Media ServerReturns the total number of jobs by the media server for which the backup was performedcompleted over time in a line chart. Uses data from the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

l Media Server - Name of the Media Server on which the backup or archive occurred

Backup Job ForecastReturns the jobs that are expected to run between two times in a table reports. Uses datafrom the Avamar Job Forecast and NetBackup Job Forecast data sources.

l Server - Name of the backup server on which the backup Job will run

l Group - Name of the backup group in which the Job is scheduled to run

l Client - Name of the backup client on which the Job will run

l Job - Name of the backup Job

l Schedule - Name of the schedule associated with the forecasted Job

l Scheduled Start - Time the Job is scheduled to start

l Scheduled End- Time the Job is scheduled to end

Backup Job Forecast versus ActualReturns the difference between the forecasted Jobs and the jobs that actually were run ina table report. Uses data form the Avamar Job Forecast, Backup Job Details, Backup JobStatus, and NetBackup Job Forecast data sources.

l Server - Name of the backup server

l Group - Name of the group or policy under which the Job is running

l Schedule - Name of the schedule under which the Job is running

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Size - Amount of data backed up (in MB)

Reports by System Template

404 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 405: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Attempts - Number of attempts that took place before the Job completed

l Scheduled Start - Start time of schedule

l Scheduled End - End time of schedule

Backup Job Forecast versus Actual SummaryReturns the difference between the forecasted Jobs and the jobs that actually were run ina table report. Uses data form the Avamar Job Forecast, Backup Job Details, Backup JobStatus, and NetBackup Job Forecast data sources.

l Queued - Time the Job started queuing

l Running -

l [null]-N -

l [others]-N -

l [null]-A -

l [others]-A -

l Success -

l Failed -

l Completed -

l Expected -

l Missing -

Backup Job ScheduleReturns when individual Jobs on a client or backup server were run in a timeline chart.Uses data from the Backup Job Details and SLA Schedule Details data sources.

The Job Schedule report appears when backups of individual jobs are starting andcompleting. To display additional information on each job, move the cursor over aspecific candle in the chart.

To display whether a job was completed within a backup window in the job schedulereport, enable service level reporting. Service level reporting is a system-wide attributeand must be enabled by an administrator. The EMC Data Protection Advisor Installation andAdministration Guide provides more information.

If the Job Schedule report runs after SLA Reporting is enabled, the following occurs: Jobsthat completed within the backup window are marked in green, Jobs that completed outof the window are marked in red.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

Reports by System Template

Backup Job Forecast versus Actual Summary 405

Page 406: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions simultaneously accessing the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Expires - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Transferred - Total size of the data transferred (in MB)

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Number of seconds waiting for the backup media

l Total Reduction Ratio -The ratio for the size of data compressed and deduplicatedagainst the original data size over time.

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Effective Path - Effective path of the Backup

l Error Code Summary - Summary of the error codes associated with the backup

l Status Code Summary - Status summary code of the backup job

l Plugin Name - Plug-in name

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

Reports by System Template

406 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 407: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Schedule - Name of the schedule

l Start Time - Start times for each schedule component

l End Time - End times for each schedule component

l Duration - Durations of each schedule component

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Job Schedule For Specific ClientReturns when clients are actively performing backups in a timeline chart. Uses data fromthe Backup Job Details and SLA Schedule Details data sources. This report is similar tothe Backup Job Schedule template. The difference is that information on jobs is rolled upon a per-client basis so that a row is displayed for each client.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

Reports by System Template

Backup Job Schedule For Specific Client 407

Page 408: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions simultaneously accessing the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

l Size - Amount of data backed up (in MB)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Expires - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication

l Size Transferred - Total size of the data transferred (in MB)

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Total number of inline copies taken, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Number of seconds waiting for the backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Effective Path - Effective path of the Backup

l Error Code Summary - Error code summary associated with the error message

l Status Code Summary - Status code summary from the job

l Plugin Name - Plug-in name

l Num Successful Copies - Number of successful copies

Reports by System Template

408 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 409: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Schedule - Name of the schedule

l Start Time - Start times for each schedule component

l End Time - End times for each schedule component

l Duration - Durations of each schedule component

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Size DistributionReturns the total amount of data completed over time in a line chart. Uses data from theTotal Size data source. The Backup Size Distribution template is similar to the JobDistribution template but displays the amount of data that has been backed up over timeon the graph.

l Total Size - Total amount of data backed up (in GB)

Reports by System Template

Backup Size Distribution 409

Page 410: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup Size Distribution By Media ServerReturns the total amount of data being backed up, broken down by Media Server overtime in a line chart. Uses data from the Total Size data source.

The Backup Size Distribution by Media Server template is similar to the Backup SizeDistribution template except that it displays information on when data was backed up.This information is calculated by media server. This report is not available in NetWorkerenvironments because it is not possible to determine to which media server a job waswritten after a backup completes.

l Total Size - Total amount of data backed up (in GB)

l Server - Name of the backup server on which the Job took place

l Media Server - Name of the Media Server on which the backup or archive occurred

Maintenance Job ScheduleReturns maintenance job schedule details in a timeline chart. Uses data from the BackupJob Details, Clone Operations, and Maintenance Job Details data sources.

l Server - Name of the backup server on which the Job took place

l Status - Status of the maintenance job: Success, Failed

l Start Time - Time the job started

l End Time - Time the job completed

l Operation -

l Job Type - Category of maintenance jobs under which this job is grouped

TSM Server Side Process SchedulingReturns TSM server side process scheduling details in a timeline chart. Uses data fromthe Backup Job Details, TSM Migration, TSM Reclamation, TSM Database Backup, TSMDelete Volume, TSM Expiration, TSM Move, and TSM Storage Pool Copy data sources.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Status - Completion status of the migration process: Success, Failed

l Start Time - Time the process started

l End Time - Time the process completed

l Operation -

TSM Storage Pool Migration ScheduleReturns all of the migration jobs that have occurred grouped by storage pool in a timelinechart. Uses data from the TSM Backup and TSM Migration data sources.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool from which data has been migrated

l Start Time - Time the process started

l End Time - Time the process completed

Reports by System Template

410 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 411: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

TSM Storage Pool Reclamation ScheduleReturns all of the reclamation jobs that have occurred grouped by storage pool in atimeline chart. Uses data from the TSM Reclamation data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool from which data has been reclaimed

l Start Time - Time the process started

l End Time - Time the process completed

Service Level Management system templatesIn a backup environment, they provide reports on the backup environment performanceagainst a Service Level Agreement (SLA).

Backup Daily Success RateReturns the success rate of jobs that completed on the backup servers or clients in acolumn chart. Uses data from the Num Jobs data source.

l Success Rate - Success rate of backups over the reporting period (as a percentage)

Backup Jobs with Last ResolutionReturns a list of all jobs on a backup server with resolution information in a table report.Uses data from the Backup Job with Last Resolution and Backup Job Details data sources.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of backup server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Domain Name - Name of the domain associated with the group

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Orig Status - Original status of the backup job

l Error Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr,Differential Incr, 1-9

Reports by System Template

TSM Storage Pool Reclamation Schedule 411

Page 412: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Size - Amount of data backed up (in MB)

l Storage Unit - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not availablefrom all backup applications

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Expires - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Transferred - Size transferred to server (in MB)

l Backup Application - Name of the backup application that backed up the Job. Forexample, NetWorker, NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Duration - Time the backup application took to complete the job

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Error Code Summary - Error code summary associated with the error message

l Status Code Summary - Status code summary from the job

l Plugin Name - Plug-in name

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies combines (including primary copy)

l Bytes Modified Not Sent - (in bytes)

l Bytes Modified Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - backup job ID of the parent job

l Storage Job Id - Holds the job ID used for storage device identification (hidden field)

l Duration - Duration that data should be backed up

l Throughput - Throughput of size to duration (MB/sec)

Reports by System Template

412 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 413: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Average File Size - Average size of each file

l Retention - Retention days

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (in seconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Trailing Space In Window - Amount of time before the end of the backup window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Leading Space In Window - Amount of time after the start of the backup window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Customer Contact - Name of the customer related to this remediation

l Management Contact - Name of the manager related to this remediation

l Current Status - Resolution status of the remediated backup

l Reason - Reason specified in auto reconciliation resolution

l Details - Additional details entered by the user when resolving the job

l User - Name of the user who entered the resolution

l Include in Any Calculations - If this backup is to be included in any calculations

l Include in SLA Calculations - If this backup is to be included in SLA calculations

l Entered - Date and time at which the resolution was added to a backup job

l Custom1 - User-customizable field

l Custom2 - User-customizable field

l Custom3 - User-customizable field

l Custom4 - User-customizable field

l Custom5 - User-customizable field

Clone SLA StatusReturns details of backup jobs that have run within or outside permitted SLAs, and if abackup job was cloned within 24 hours of the backup job ending in a table. Uses datafrom the Clone Job Details, Backup Job Details, and Report Times data sources.

l Job Id - Identifier for the clone job

Reports by System Template

Clone SLA Status 413

Page 414: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l App Job Id - Identifier that uniquely identifies the cloned Job on the backup server onwhich the Job ran

l Server - Name of the backup server on which the clone took place

l Sub Name - Name of backup server instance

l Group - Name of the group or policy in which the cloned Job took place

l Schedule - Name of the schedule under which the clone ran

l Client - Name of the client on which the Jobs were cloned

l Job - Name of the cloned Job

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions simultaneously accessing the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed

l Size - Size of the job (in MB)

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Clone Job - Name of the cloned Job

l Clone Size - Size of the backup job associated with the clone job (in MB)

l Clone Size Scanned - The size of the backup job associated with the clone job

l Clone Start Time - Time that the clone operation started

l Clone End Time - Time that the clone operation ended

l Clone Id - Identifier for the cloned backup Job

l Duration - Time the backup application took to complete the job

l Success Flag - Internal field used to determine report row colours

Backup SLA SummaryReturns the success rate of jobs that completed on the backup servers or clients selectedin a table report. Uses data from the Backup Job Details and Backup Job Resolution datasources.

l Jobs - Number of jobs that were completed

l Successful - Number of jobs that were successful

l Within SLA - Number of jobs that completed successfully within their backup window

l % Successful - Percentage of jobs that were successful

l % Within SLA - Percentage of jobs that were successful within their backup window

Reports by System Template

414 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 415: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Backup SLA Summary By ClientThis report is similar to the SLA Summary report, except that it returns a breakdown of thesuccess rate on a per-client basis in a table report. Uses data from the Backup Job Detailsand Backup Job Resolution data sources.

l Client - Name of the client backed up

l Jobs - Number of jobs that were completed

l Successful - Number of jobs that were successful

l Within SLA - Number of jobs that completed successfully within their backup window

l % Successful - Percentage of jobs that were successful

l % Within SLA - Percentage of jobs that were successful within their backup window

Restore Jobs with Last ResolutionReturns a list of all jobs on a backup server with resolution information in a table report.Uses data from the Backup Job with Last Resolution and Backup Job Details data sources.

l Id - Identifier that uniquely identifies this restore

l App Job Id - Identifier that uniquely identifies this restore job on the backup server onwhich the restore job ran

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of backup server instance

l Media Server - Name of the Media Server on which the Job was backed up

l Backup Time - Time at which the data being restored was originally restored

l Domain Name - Name of the domain associated with the group

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Orig Status - Original status of the restore job

l Err Code - Error code associated with the restore

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to viewthe total number of bytes that have been restored

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that must be added to the Size Scanned fieldto be able to view the total number of bytes that have been scanned

l Backup Application - Name of the backup application on which the restore occurred

l Owner - Owner of the restore job

l Num Files - Number of files restored

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieveoperation and not a restore operation (TSM only)

l Backup Number - Number of the backup that is being restored

l Number of Files - Number of files restored

Reports by System Template

Backup SLA Summary By Client 415

Page 416: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Scanned - Size of the scanned and compressed file (in MB)

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - restore job ID of the parent job

l Duration - Duration that data should be restored

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Ran In Window - Indicates if the entire backup was in the restore window

l Started In Window - Indicates if the backup started in the restore window

l Finished In Window - Indicates if the backup finished in the restore window

l Time In Window - Amount of time that the backup spent in the restore window (inseconds)

l Time Out Of Window - Amount of time that the backup spent out of the restorewindow (in seconds)

l Out Of Window Reason - Text string explaining why the restore Job was out of window.Only valid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its restore window

n Job finished out of window - Job finished outside of its restore window

l Trailing Space In Window - Amount of time before the end of the restore window theJob finished (in seconds). Only valid when Started In Window is TRUE

l Leading Space In Window - Amount of time after the start of the restore window theJob started (in seconds). Only valid when Finished In Window is TRUE

l Valid Level - Indicates if the level of restore is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the restore job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this restore job

l Group - Name of the group or policy under which the Job is running

l Customer Contact - Name of the customer related to this remediation

l Management Contact - Name of the manager related to this remediation

l Current Status - Resolution status of the remediated restore

l Reason - Reason specified in auto reconciliation resolution

l Details - Additional details entered by the user when resolving the job

l User - Name of the user who entered the resolution

l Include in Any Calculations - If this restore is to be included in any calculations

l Include in SLA Calculations - If this restore is to be included in SLA calculations

l Entered - Date and time at which the resolution was added to a restore job

l Custom1 - User-customizable field

l Custom2 - User-customizable field

l Custom3 - User-customizable field

l Custom4 - User-customizable field

Reports by System Template

416 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 417: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Custom5 - User-customizable field

Status system templatesStatus reports allow users to query the current status of devices managed by the backupserver and any pending mount requests that the devices have outstanding.

ACSLS ACS StatusReturns the status of ACS on an ACSLS Server in a table report. Uses data from the ACSLSACS Status data source.

l Server - Name of the host on which ACSLS is running

l Name - Name of the ACS

l State - Current state of the ACSLS Software: Diagnostic, Offline, Offline Pending,Online, Recovery

l Current Audit Requests - Number of audit requests that are in progress on the server

l Pending Audit Requests - Number of audit requests that are pending on the server

l Current Mount Requests - Number of mount requests that are in progress on theserver

l Pending Mount Requests - Number of mount requests that are pending on the server

l Current Dismount Requests - Number of dismount requests that are in progress onthe server

l Pending Dismount Requests - Number of dismount requests are pending on theserver

l Current Eject Requests - Number of eject requests that are in progress on the server

l Pending Eject Requests - Number of eject requests are pending on the server

ACSLS Lock StatusReturns information on locks for ACSLS drives and volumes in a table report. Uses datafrom the ACSLS Lock Status data source.

l Server - Hostname or IP address of the ACSLS server

l Lock ID - Identifier for the lock

l Type - Lock target type: Drive, Volume

l Identifier - Identifier for the locked target

l Duration - Duration of the lock (in seconds)

l Pending - Number of locks pending on the target

l Status - Current status of the target. For example, in use

l User ID - Identifier for the lock owner

ACSLS Port StatusReturns information on the current status of ACSLS Ports in a table report. Uses data fromthe ACSLS Port Status data source.

l Server - Name of host on which ACSLS is running

l Port - Address of the ACSLS Port, which is a combination of the ACS and Port fields.For example, 0,0

Reports by System Template

Status system templates 417

Page 418: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Name - Name of the ACSLS port. For example, /dev/mchanger1

l State - State of the port: Online, Offline

ACSLS Server StatusReturns the current status of an ACSLS Server in a table report. Uses data from the ACSLSServer Status data source.

l Server - Name of the host on which the ACSLS is running

l State - Current state of the ACSLS Software: Idle, Idle pending, Recovery, Run

l Current Audit Request - Number of audit requests that are in progress on the server

l Pending Audit Requests - Number of audit requests that are pending on the server

l Current Mount Requests - Number of mount requests that are in progress on theserver

l Pending Mount Requests - Number of mount requests that are pending on the server

l Current Dismount Requests - Number of dismount requests that are in progress onthe server

l Pending Dismount Requests - Number of dismount requests are pending on theserver

l Current Eject Requests - Number of eject requests that are in progress on the server

l Pending Eject Requests - Number of eject requests are pending on the server

Backup Client Physical OccupancyReturns backup client physical occupancy details in a table report. Uses data from theBackup Client Occupancy By Client - Physical data source.

l Physical - Amount of physical storage used (in MB). Physical space is the total spacetaken up by data for the filespace including space that is no longer active in itself butpart of a set of data that is still active

Backup Client StatusReturns the backup client status details in a table report. Uses data from the BackupClient Status data source.

l Server - Server on which the backup client resides

l Client - Name of the client backed up

l Responding - If selected, indicates that the backup client is responding

l Daemon Running - If selected, indicates that a daemon is running on the backupclient

l No IP Address - Indicates if the IP address of a client can be resolved or not

Backup Device Downed DevicesReturns details of downed backup devices in a table report. Uses data from the BackupDevice Status data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Host - Name of the host to which the device is attached

Reports by System Template

418 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 419: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Device Name - Name of the device in the backup software

l Control - Robot/Drive control information

l Status - Status of the drive: Up, Down, Service

l Errors - Error count on the device as reported by the backup software

l Volume Id - Label of any volume loaded in the drive

l Activity - Activity, if any, which the device is undertaking: Read, Write, Mount,Dismount, Label, Idle

l Session - Number of sessions simultaneously accessing the device

l Throughput - Device throughput (KB/second)

Backup Device ErrorsReturns backup device error details in a table report. Uses data from the Backup DeviceErrors data source.

l Server - Name of the NetBackup Storage Node

l Device Host - Name of the NetBackup Storage Node

l Device Name - Name of the device

l Error Type - Type of error that has occurred. For example, TAPE_ALERT, WRITE_ERROR

l Volume - Volume that was loaded in the drive at the time the error occurred

l Data - Additional information associated with the error

l Timestamp - Time that the error occurred

Backup Device StatusReturns details of all backup devices in a table report. Uses data from the Backup DeviceConfig and Backup Device Status data sources.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device in the backup software

l Device Path - Operating system path to the device

l Device Class - Class of device: Disk, Tape

l Jukebox - Name of the jukebox in which the device is located

l Device Type - Type of device. For example, DLT, Ultrium-2

l Read Only - Indicates if the drive is configured as read-only: Yes, No

l Hardware Id - Identifier such as the device serial number that uniquely maps it to aphysical device

l Firmware - Firmware version of the device

l Media Manager Path - Operating system path to the media manager

l Num Target Sessions - Number of target sessions

l Send/Receive Timeout - Send and receive timeout

l Num Retries - Number of retries

l Network Retry Interval - Network failure retry interval (in seconds)

Reports by System Template

Backup Device Errors 419

Page 420: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

l Max Errors - Maximum number of errors

l Device Access - Device access information

l Control - Robot/Drive control information

l Status - Status of the drive: Up, Down, Service

l Errors - Error count on the device as reported by the backup software

l Volume Id - Label of any volume loaded in the drive

l Sessions - Number of sessions when a volume is present and mounted in the device

l Throughput - Device throughput (KB/second)

l Firmware - Firmware version of the device

l Soft Read Errors -

l Hard Read Errors -

l Hard Write Errors -

l Status - Status of the drive: Up, Down, Service

l Volume - Label of any volume loaded in the drive

l Speed -

l State -

l Loop Id -

l Num Loads -

l Cleaning Required -

Backup Pool StatusReturns the backup pool status details in a table report. Uses data from the Backup PoolStatus data source.

l Server - Name of backup server on which the pool is located

l Sub Name - Name of TSM server instance

l Pool Name - Name of the storage pool

l Pool Type - Type of storage pool: Primary, Copy, Active Data

l Pct Migration - Percentage of data in storage pool that can be migrated

l Migration running - Indicates if at least one migration process is active for the storagepool

l Amount Migrated - Amount of data currently migrated from the storage pool (in MB)

l Elapsed Migration Time - Depending on migration activity, indicates the following (inseconds):

n If migration is active, this indicates the amount of time elapsed since migrationbegan.

n If migration is not active, this indicates the amount of time required to completethe last migration.

n If multiple parallel migration processes are used for the storage pool, thisindicates the total time from the beginning of the first process until thecompletion of the last process.

Reports by System Template

420 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 421: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Reclamation Running - Indicates if a reclamation process is active for the storage pool

l Num Scratch Volumes Used - Number of scratch volumes used in the storage pool

l Space Trigger Utilization - Utilization of the storage pool, as calculated by the storagepool space trigger, if any, for this storage pool (as a percentage)

l Duplicate Data - Amount of data that was removed from the storage pool by thereclamation process. This field also represents the amount of storage space that wassaved in the storage pool as a result of server-side data deduplication.

l Percentage Duplicate Data - (as a percentage)

Backup Server Error SummarySummary count of the most common errors a backup server has encountered in a columnchart. It also provides details on errors and warnings that have occurred on a backupserver. Uses data from the Application Errors data source.

l Error - Error code of the message: message prefix, message number, message type

l Count - Number of errors

Backup Server StatusReturns backup server status details in a table report. Uses data from the Backup ServerStatus data source.

l Server - Name or IP Address of the backup server

l Utilization - Percentage that the server is being utilized

l Used Raw - Identifies how much of the raw capacity is used (in MB)

l Used Capacity - Identifies how much of the capacity is used (in TB)

Backup Unavailable Device Count for rulesetReturns details about unavailability of backup devices in a table report. Report for Manybackup devices unavailable rule. Uses data from the Backup Device Status and UserInput data source.

l Unavailable Count -

l Maximum Number of Downed Devices -

l Alert - Identifier of the alert

Battery StatusReturns battery status details in a table report. Uses data from the Battery Status datasource.

l Node - Name of the object

l Name - Identifier for the battery

l Status - Current status of the battery

l Charge - Charge remaining on the battery

Reports by System Template

Backup Server Error Summary 421

Page 422: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Battery SummarySummary of the battery details in a column chart. Uses data from the Battery Status datasource.

l Count - Number of batteries

BTD CapacityReturns information on BTD capacity in a column chart. Uses data from the VTL Statusand VTL Configuration data sources.

l Hostname - Hostname of the VTL

l Capacity - Disk capacity of the VTL (in MB)

l Used - Amount of disk capacity used by the VTL (in GB)

l Space Eligible for Trunc - Amount of data eligible for truncation (in MB)

BTD Health StatusReturns the health status in a column chart. Uses data from the Fan Status, NetworkInterface Status, Tape Library Status, Tape Drive Status, Disk Status, Thermometer Status,and PSU Status data sources.

l Status - Current status of a drive

l Count - Number of devices

l Type - Type of device

BTD UsageReturns information on the Backup To Disk (BTD) usage in a column chart. Uses data fromthe VTL Status data source.

l Hostname - Hostname of the VTL

l Dedup Reduced - Size of data backed up after deduplication (in MB)

l Waiting for Dedup - VTL is waiting for deduplication to begin (in MB)

l Wont be Deduped - VTL will not be deduplicated (in MB)

l System Metadata - Amount of disk space used by the system (in MB)

l Space Eligible for Trunc - Amount of data eligible for truncation (in MB)

Card StatusReturns card status details in a table report. Uses data from the Card Status data source.

l Node - Name of the object

l Adaptor - Identifier for the adaptor

l Sub Name - Identifier for the storage array

l State - State of the storage processor

l Used Memory Size - Size of the memory being used (in MB)

l Read Cache State - Status of the read cache

l Write Cache State - Status of the write cache

Reports by System Template

422 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 423: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Celerra Replication StatusReturns Celerra replication status details in a table report. Uses data from the CelerraReplication Performance and Celerra Replication Status data sources.

l Server - Hostname or IP address of the EMC Celerra being monitored

l Name - Name of the replication set

l Network Status - Status of the network link being used by the replication set

l Source Status - Status of the source of the replication set

l Destination Status - Status of the target of the replication set

l Last Synch Time - Date and time that the data on either side of the replication linkwas last synchronized

Client OccupancyReturns client occupancy details in a table report. Uses data from the Backup ClientOccupancy data source.

l Server - Name of the server

l Sub Name - Name of the TSM server instance

l Client - Name of the client

l Type - Type of data stored: Backup, Archive, HSM

l Filespace - Name of client filespace

l Pool - Storage pool which contains the client filespace

l Filespace ID - ID of the client filespace

l Files - Number of active files

l Physical - Amount of physical storage used (in MB). Physical space is the total spacetaken up by data for the filespace. Physical space includes space that is no longeractive itself, but is included in a set of data that is still active

l Logical - Amount of logical storage used (in MB). Logical space is space used byactive data

Client Occupancy by Server TrendReturns information on client occupancy value grouped by server over time in a line chart.Uses data from the Backup Client Occupancy by Server data source. This report returnsdata for CommVault Simpana, TSM, NetBackup, NetWorker, PureDisk, and Data Protector.

l Server- Name of the Backup Server

l Occupancy (MB) - Amount of storage used

Cluster Resource StatusReturns cluster resource status details in a table report. Uses data from the ClusterResource Status data source.

l Id - Identifier for the cluster resource

l Server - Name of the backup server

l Sub Name - Name of the disk array

Reports by System Template

Celerra Replication Status 423

Page 424: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Cluster Name - Name of the cluster

l Name - Name of the cluster

l Group - Name of the group

l Type - Type of cluster: Host, IP, Filesystem, Application, Net

l Provider - Resource host

l State - State of the cluster: OK, Warning, Failed, Offline, Unknown

l Version - Version of the software

l Verbose State -

Cluster Status for ClusterReturns cluster status for cluster details in a table report. Uses data from the ClusterStatus data source.

l Server - Name of the backup server

l Sub Name - Name of the disk array

l Name - Name of cluster

l Active Host - Name of the active host

l State - State of the cluster: OK, Warning, Failed, Offline, Unknown

l Log Size - Size of log (in bytes)

l Verbose State -

Collector Status for rulesetReturns details of the alerts for collector errors, log messages, and collectors that havefailed in a table report. Uses data from the DPA Status, Process Log, RegisteredCollectors, and Request History data sources.

l Alert - Identifier of the alert

l Server - Name of the Server running the agent: DPA

l Hostname - Name of the host on which the DPA Data Collection Agent is installed

Data Domain Active StreamsReturns the Data Domain active streams in a line chart. Uses data from the Data DomainActive Streams data source.

l Hostname - Name or IP address of the Data Domain server

l Active Read Streams - Number of active read file streams

l Active Write Streams - Number of active write file streams

l Re Opened Read Streams - Re-opened read file streams in the past 30 seconds

l Re Opened Write Streams - Re-opened write file streams in the past 30 seconds

Data Domain Boost Option StatusReturns the Data Domain boost option status in a table report. Uses data from the DataDomain Boost Option Status data source.

l Hostname - Name of the host

Reports by System Template

424 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 425: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Name - Option name. For example, distributed-segment-processing, virtual-synthetics

l Status - Option value. For example, enabled

Data Domain Filesystem Archive Unit StatusReturns status information on the Data Domain filesystem archive unit in a table report.Uses data from the Data Domain Filesystem Archive Unit Status data source.

l Hostname - Name of the host

l Name - File system archive unit name

l State - State of the archive unit: New, Target, Sealed

l Status - Status of the archive unit: Ready, Disabled

l Unit Size - Size of the archive unit (in MB)

l Disk Group - Disk groups

l Start Time - Archive unit start time

l End Time - Archive unit end time

Data Domain Filesystem Cleaning StatusReturns information on the status of Data Domain filesystem cleaning in a table report.Uses data from the Data Domain Filesystem Cleaning Status data source.

l Hostname - Name or IP address of Data Domain

l Status- Data Domain Filesystem clean status

l Schedule- Data Domain Filesystem clean schedule

l Throttle- Data Domain Filesystem clean throttle

Data Domain Filesystem OptionsReturns information on the Data Domain filesystem options in a table report. Uses datafrom the Data Domain Filesystem Options data source.

l Hostname - Name of the host

l Name - File system option name. For example, Local compression type, Appoptimized compression, Current global compression type

l Value - Option value. For example: lz, none, 9

Data Domain ModesReturns current Data Domain mode information in a table report. Uses data from the DataDomain Modes data source.

l Hostname - Name or IP address of the Data Domain server

l Backup Mode - Indicates if backup mode is enabled or disabled

l Extended Retention Mode - Indicates if archive mode is enabled or disabled

l VTL Mode - Indicates if VTL mode is enabled or disabled

Reports by System Template

Data Domain Filesystem Archive Unit Status 425

Page 426: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Data Domain System Capacity LicensesReturns information on Data Domain system capacity licenses in a table report. Uses datafrom the Data Domain System Capacity Licenses data source.

l Hostname - Name of the host

l Key - Key name

l Feature - Feature for the license. For example, DDBOOST, REPLICATION, VTL

l Model - Model for the feature of the license

l Capacity - Capacity of the model

Data Domain System LicensesReturns Data Domain system license details in a table. Uses data from the Data DomainSystem Licenses data source.

l Hostname - Name of the host

l Key - Key name

l Feature - Feature for the license. For example, DDBOOST, REPLICATION, VTL

Data Domain System User StatusReturns the Data Domain system user status details in a table. Uses data from the DataDomain System User Status data source.

l Hostname - Name of the host

l User - User name

l UID - User identifier

l Role - User role

l Status - User status

DataProtector Database StatusReturns Data Protector database status details in a table report. Uses data from theDatabase Usage data source.

l Server - Name of the Data Protector Server

l Database Name - Name of the internal database

l Table Name - Name of the database table

l Size - Size of the table (in MB)

l Used Records - Number of records used in the table

l Total Records - Number of total records allocated in the table

l Utilization - Percentage of total records used

DataProtector Datafile UsageReturns Data Protector datafile usage details in a table report. Uses data from the DatafileUsage data source.

l Server - Name of the Data Protector Server

Reports by System Template

426 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 427: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Type - Type of data contained in the datafile

l Directory - Location in file system of the datafile

l Size - Size of the datafile (in MB)

l Files - Number of files

DataProtector Purge PreviewReturns Data Protector purge preview details in a table report. Uses data from the PurgeStatus data source.

l Server - Name of the Data Protector Server

l Client - Name of the Data Protector client

l Num Filenames - Total number of filenames in the internal database

l Num Estimated Obsolete - Estimated number of obsolete filenames in the internaldatabase

l Estimated Duration - Estimated duration of a database purge (in seconds)

DataProtector Record File UsageReturns Data Protector record file usage details in a table report. Uses data from theRecord File Usage data source.

l Server - Name of the Data Protector server

l Type - Type of records the file contains

l Directory - Location of the record file in the file system

l Size - Used size of the record file (in MB)

l Max Size - Maximum allocated size of the record file (in MB)

l Utilization - Percentage used of the allocated size

DataProtector Service StatusReturns Data Protector service status details in a table report. Uses data from the ServiceStatus data source.

l Server - Name of the Data Protector server

l Service Name - Name of the service

l Status - Status of the service

l Process ID - Process identifier

Device Availability for rulesetReturns details of device availability in a table report. Report for Less than x% backupdevices available rule. Uses data from the Backup Device Config, Backup Device Status,and User Input data sources.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Availability - Availability of the device

l Alert - Identifier of the alert

l Max Availability -

Reports by System Template

DataProtector Purge Preview 427

Page 428: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Disk Array StatusReturns disk array status details in a table report. Uses data from the Disk Array Statusdata source.

l Hostname - Hostname or IP address of the array

l Sub Name - Name of the storage array

l Disk Array Name - Name of the disk array

l Status - Current status of disk array

l State - Indicates whether the disk array is enabled or not

l Used - Indicates whether the disk array is in use (in GB)

Disk Failed for rulesetReturns details on disk failures in a table report. Report for Disk failed for a number ofhours rule. Uses data from the Disk Status data source.

l Node - Name of the object to which the disk is attached

l Alert - Identifier of the alert

Disk StatusReturns disk status details in a table report. Uses data from the Disk Configuration andDisk Status data sources.

l Hostname - Name of the host to which the disk is attached

l Sub Name - Identifier for the Storage Array

l Device - Name of the disk

l Size - Size of the disk (in GB)

l State - Current operational state of the disk: Online, Offline, Failed

l Use - Use of the disk, if any: Data, Parity, Spare. Only valid if State is Online

l Errors - Error count for disk

l Allocated - Space allocated on disk for use (in GB)

l Name - Identifier for the disk

l Temperature - Current disk temperature (in Celsius)

l Group Name - RAID group of disk

l Status - Status of disk: Okay, Reconstruct, Resync, Unknown

l Recon Percentage - Percentage of the disk reconstructed

l Resynch Percentage - Percentage of the disk resynched

l Remapped Blocks - Number of blocks remapped

EDL Failover StatusReturns EMC Disk Library failover status details in a table report. Uses data from the EDLFailover Status data source.

l Hostname - Name or address of the EMC Disk Library host

l Secondary - Name or address of the failover partner

Reports by System Template

428 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 429: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Type - Failover configuration type

l Self Check Interval - Interval between primary DL checks for software or hardwarefailure on itself (in seconds)

l Heartbeat Interval - Interval between primary DL checks for software or hardwarefailure on itself (in seconds)

l Recovery Setting - Time until automatic recovery attempted

l State - Current failover state of the EMC Disk Library

Fan StatusReturns fan status details in a table report. Uses data from the Fan Status data source.

l Node - Name of the object

l Name - Name of the fan

l Active - Indicates if the fan is currently active

l Speed - Speed that the fan is rotating (revolutions/minute)

l Normal Speed - Expected fan speed (revolutions/minute)

l Level - Current activity level of the fan

l Status - Status of the fan

Fan SummarySummary of fan details in a column chart. Uses data from the Fan Status data source.

l Count - Number of fans

Fibre Channel Port StatusReturns the Fibre Channel port status details in a table report. Uses data from the FibreChannel Port Config and Fibre Channel Port Status data sources.

l Hostname - Name of the switch

l Port - Name of the Fibre Channel port

l Sub Name - If returning data for RecoverPoint, the name of site in which RecoverPointAppliance is located. Otherwise, the identifier for the Celerra Data Mover

l Sub Name 2 - Name of RecoverPoint Appliance

l Controller - Number of the controller

l WWPN - World Wide Port Name for the Fibre Channel interface

l Mode - Indicates if the port is a Target or Initiator

l OS Device - Device name from which Fibre Channel port is visible on the operatingsystem

l Internal - Indicates if the Fibre Channel port is internal, that is, if the port is connectedto internal hardware, and not a SAN

l Type - Type of Fibre Channel port on the switch or HBA

l Virtual - Indicates if the Fibre Channel port is virtual or physical

l WWNN - World Wide Node Name of the Fibre Channel port

l Auto Neg - Indicates if autonegotiation is enabled on this interface

l Link Active - Indicates if the switch is connected to anything

Reports by System Template

Fan Status 429

Page 430: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Speed - Speed of the port (Mb/second)

l Minimum Bandwidth - Minimum bandwidth of the interface (MB/second)

l Administrative Link Up - Indicates if the port has been disabled by an administrator

Fibre Channel Port Summary By NodeReturns Fibre Channel port summary by object details in a table report. Uses data fromthe Fibre Channel Port Count By Node and Fibre Channel Port Status data sources.

l Switch Name - Name of the switch

l Total -

l Used -

l Free -

l Utilization - (as a percentage)

Fileserver StatusReturns file server status details in a health status report. Uses data from the File serverStatus data source.

l Node - Name of the file server

l CIFS Status - Status of CIFS server

l NFS Status - Status of NFS server

Filesystem Disk StatusReturns the file system disk status in a table report. Uses data from the Filesystem DiskStatus data source.

l Filesystem node - Name of the object to which the file system is attached

l Filesystem - Name of the file system

l Filesystem Sub Name - Name of the storage array on which the file system resides

l Disk node - Name of the object to which the disk is attached

l Disk - Name of the disk

l Disk Sub Name - Name of the storage array on which the disk resides

l State - Current operational state of the disk: Online, Offline, Failed

l Use - Use of the disk, if any: Data, Parity, Spare. Only valid is State is Online.

l Errors - Number of read and write errors on the disk

Filesystem Quota StatusReturns file system quota status details in a table report. Uses data from the QuotaConfiguration and Quota Status data sources.

l Server - Name or IP address of the EMC File Storage (Celerra) server

l Filesystem - Description of the file system

l Tree ID - Identifier for the tree

l Path - Path of the tree

l Type - One of: Tree, User, Group

Reports by System Template

430 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 431: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Comment - User comments for the quota

l User ID - Identifier for the user

l Windows Sids - Windows Security Identifier

l Files Soft Limit - Soft file usage quota for the file system. If exceeded, a warning issent to Windows clients

l Files Hard Limit - Hard file usage quota for the file system. If exceeded, user requestsfor additional files (for example, creating a new file) are denied

l Space Soft Limit - Soft space usage quota for the file system. If exceeded, a warningis sent to Windows clients (in MB)

l Space Hard Limit - Hard space usage quota for the file system. If exceeded, userrequests for additional space (for example, saving a file) are denied (in MB)

l Files Used - Number of files used on the tree

l Space Used - Amount of space used on the tree (in MB)

l Files Time Left - Amount of grace period remaining after a File Softlimit breach beforethe File Hardlimit condition is triggered (in seconds)

l Space Time Left - Amount of grace period remaining after a Space Softlimit breachbefore the Space Hardlimit condition is triggered (in seconds)

l File Utilization - (as a percentage)

l Space Utilization - (as a percentage)

Filesystem Snapshot StatusReturns file system snapshot status details in a table report. Uses data from theCheckpoint Status data source.

l Server - Hostname or IP address of the server containing the file system

l Checkpoint ID - Unique identifier for the checkpoint

l Checkpoint Name - Name of the checkpoint

l Checkpoint Time - Time at which the checkpoint was taken

l State - State of the checkpoint: active, inactive, pending, restoring, other

l Filesystem - Source file system for the checkpoint

l Filesystem Size - Size of file system at the time checkpoint was taken (in MB)

Filesystem StatusReturns file system status details in a table report. Uses data from the FilesystemConfiguration and Filesystem Status data sources.

l Hostname - Name of the host on which the file system is mounted

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Capacity - Total space on the file system available for standard usage (in MB)

l Snapshot Capacity - Amount of space reserved for the use of snapshots (in MB). If thetotal amount of data stored for snapshots is higher than the amount of spacereserved for snapshots, additional space is claimed from the volume itself

l Used Space - Amount of space used on the file system (in MB)

l Used Snapshot Space - Amount of space used for snapshots on the file system (inMB)

Reports by System Template

Filesystem Snapshot Status 431

Page 432: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Utilization - (as a percentage)

l Snapshot Utilization - (as a percentage)

l Cleanable Space - Amount of space that can be cleaned (in MB)

Filesystem Status SummarySummary of the file system status in a table report. Uses data from the FilesystemConfiguration and Filesystem Status data sources.

l Hostname - Name of the host on which the file system is mounted

l Capacity - Total space on the file system available for standard usage (in MB)

l Snapshot Capacity - Amount of space reserved for the use of snapshots (in MB). If thetotal amount of data stored for snapshots is higher than the amount of spacereserved for snapshots, additional space is claimed from the volume itself

l Used Space - Amount of space used on the file system (in MB)

l Used Snapshot Space - Amount of space used for snapshots on the file system (inMB)

l Utilization - (as a percentage)

l Snapshot Utilization - (as a percentage)

l Cleanable Space - Amount of space that can be cleaned (in MB)

Host StatusReturns host status details in a table report. Uses data from the Host Status data source.

l Hostname - Name of the host

l Sub Name - Identifier for the storage array

l Startup Time - Time the host last rebooted

l CPU Used - Amount of CPU used (as a percentage)

l Memory Used - Amount of memory used (in MB)

l Status - Status of the EMC File Storage (Celerra) device

IP Duplex Mismatch for rulesetReturns details when IP duplex mismatch in a table report. Report for IP duplex mismatchrule. Uses data from the Network Link Pair Duplex data source.

l Hostname - Name of the host on which the network interface is located

l Alert - Identifier of the alert

iSCSI StatusReturns information on a the status of iSCSI adapters on a object in a table report. Usesdata from the iSCSI Status data source. An Error field appears if the iSCSI adapter is notonline.

l Node - Name of the object on which the iSCSI adapter exists

l Name - Name of the iSCSI adapter

l Online - Indicates if the iSCSI adapter is online

l Error - iSCSI adapter errors

Reports by System Template

432 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 433: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

LUN StatusReturns LUN status details in a table report. Uses data from the LUN Status data source.

l Node - Name of the array on which the LUN exists

l Sub Name - Identifier for the storage array on which the LUN resides

l Name - Name of the LUN

l Online - Indicates if this LUN is online

l Mapped - Indicates if this LUN is mapped to any endpoints

l Used Capacity - Space used on the LUN (in GB)

l Allocated Capacity - Space allocated on the LUN (in GB)

l Is Thin - Indicates whether the LUN is thin

l Num Copies - Number of copies existing of the LUN

l State - LUN online status

l Access - Indicates whether the LUN is read/write or read only

l No Single Point of Failure - Indicates if there is no single point of failure for the LUN

l Auto Assignment - Indicates auto assignment is enabled

l Auto Trespass - Indicates whether auto trespass is enabled

l Private - Indicates whether the LUN is private

l Read Cache - Indicates whether a read cache on the LUN is enabled

l Variable Length Prefetch - Indicates whether variable length prefetch is enabled

l Write Cache - Indicates whether a write cache on the LUN is enabled

MTree Retention Lock StatusReturns MTree retention lock status details in a table report. Uses data from the MTreeRetention Lock Status data source.

l Hostname - Name or IP address of the Data Domain server

l Name - Mtree name

l Minimum Period - Minimum retention period

l Maximum Period - Maximum retention period

l Status - Mtree retention lock status

Mirror StatusReturns mirror status details in a table report. Uses data from the Mirror Status datasource.

l Node - Name of the object on which the mirror resides

l Path - Path to the mirror

l Mirror Status - Status of the mirror:

n Active - the mirror is synchronized with its source

n Updating - the mirror is currently updating from its source

n Quiesced - the mirror is temporarily not updating from its source

Reports by System Template

LUN Status 433

Page 434: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

n Broken - the mirror is able to be used, and as such is not updating from its source

n Unsynchronized - the mirror is not synchronized with its source

l Last Update - Last time this mirror was set to update from the source

l Update Size - Total size of the last update of this mirror (in KB)

l Exposure - Current data exposure (in seconds)

NetBackup Device Cleaning StatusReturns NetBackup device cleaning status details in a table report. Uses data from theNetBackup Device Cleaning data source.

l Server - Name of the NetBackup master server

l Device Host - Name of the NetBackup Media Server to which the device is attached

l Device Name - Name of the NetBackup device

l Device Type - Type of device. For example, DLT, Ultrium-2

l Mount Time - Duration that the device has had volumes mounted in it (in seconds)

l Frequency - Cleaning frequency of the drive in seconds; that is, how often it should becleaned

l Last Cleaned - Date and time that the device was last cleaned

l Comment - Any comments associated with this device

l Cleaning Required - Indicates if cleaning is required on this device

NetBackup Disk Pool StatusReturns NetBackup disk pool status details in a table report. Uses data from theNetBackup Disk Pool Status data source.

l Server - Name of the NetBackup Server

l Sub Name - Not applicable

l Pool - Name of the disk pool

l Status - Status of the disk pool

l Administrative State - Administrative State: Up, Down

l Internal State - Internal pool state: Up, Down

NetBackup Disk Volume StatusReturns NetBackup disk volume status details in a table report. Uses data from theNetBackup Disk Volume Status data source.

l Server - Name of the NetBackup Server

l Sub Name - Not applicable

l Volume ID - Identifier for the volume

l Used Space - Space used in the volume (in GB)

l Num Read Mounts - Number of read mounts configured on the volume

l Num Write Mounts - Number of write mounts configured on the volume

l Read Streams - Number of read streams configured on the volume

l Write Streams - Number of writer streams configured on the volume

Reports by System Template

434 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 435: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Status - Active status of the volume

l Administrative State - Administrative state of the volume

l Internal State - Internal state of the volume: up, down

NetBackup Storage Server StatusReturns NetBackup storage server status details in a table report. Uses data from theNetBackup Storage Server Status data source.

l Server - Name of the NetBackup Storage Server

l Sub Name - Not applicable

l Name - Name of the storage unit

l Type - Type of storage server: master, client

l Status - Status of the storage server

l Administrative State - Administrative status: Up, Down

l Internal State - Internal storage server status: Up, Down

Network Interface Link PairReturns information about connectivity between the interface on a switch and the host towhich it is connected in a table report. Uses data from the Network Link Pair Duplex datasource. For each interface on the switch, the report displays the host to which it isconnected. For this report to perform correctly, data must be gathered from the host andfrom the switch.

l Host name - Name of the host on which the network interface is located

l Host port - Name of the port

l Host duplex - Duplex setting of the host

l Switch name - Name of the switch

l Switch port - Name of the switch port

l Switch duplex - Duplex setting of the switch

Network Interface Link Pair Autonegotiation StatusReturns information about the autonegotiation status for both the switch and the networkinterface on the host machine to which it is connected in a table report. Uses data fromthe Network Link Pair Autonegotiation data source. This report allows users to identifywhen clients may be configured with different settings to the switch that can result inperformance problems.

l Local Node - Name of the host on which the network interface is located

l Local Port - Name of the port

l Local Autonegotiation - If selected, indicates that the interface on the host isconfigured to autonegotiate speed and duplex settings with the switch

l Remote Node - Name of the switch to which the host network interface is connected

l Remote Port - Name of the interface on the switch to which the host is connected

l Remote Autonegotiation - If selected, indicates that the interface on the switch isconfigured to autonegotiate speed and duplex settings with the host

Reports by System Template

NetBackup Storage Server Status 435

Page 436: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Network Interface Link Pair Duplex StatusReturns information about the duplex settings for both interfaces on a switch and thenetwork interface on the host machine to which it is connected in a table report. Usesdata from the Network Link Pair Duplex data source. This report allows users to identifywhen clients may be configured with different settings to the switch that can result inperformance problems.

l Host name - Name of the host on which the network interface is located

l Host port - Name of the port

l Host duplex - Duplex setting of the host

l Switch name - Name of the switch

l Switch port - Name of the switch port

l Switch duplex - Duplex setting of the switch

Network Interface StatusReturns network interface status details in a table report. Uses data from the NetworkInterface Config and Network Interface Status data sources.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Identifier for the Storage Array

l Interface - Name of the interface

l Description - Optional description for the interface

l MAC Address - MAC address of the interface

l Auto Neg - Indicates if the interface is set to auto negotiate

l MTU - Maximum Unit of Transmission for the interface (largest packet size) (in bytes)

l Failover - Standby interface if the primary interface goes down

l Multicast - If enabled, the interface can send data to more than one address at thesame time

l Promiscuous - If enabled, all traffic is passed to the interface rather than just packetsaddressed to it

l Simplex - If enabled, the interface messages are filtered and not displayed

l Receive Buffer - Amount of data that can be received before sending a reply (in bytes).If size is not specified on the interface, then the system-wide settings are used

l Send Buffer - Amount of data that can be sent before receiving a reply (in bytes). Ifsize is not specified on the interface, then the system-wide settings are used

l Virtual - Indicates if the network interface is virtual or physical

l Link Up - Indicate if the interface has a link with the switch

l Speed - Speed at which the interface is running (Mb/second)

l Full Duplex - Indicates if the interface is running at full duplex

l Administrative Link Up - Indicates if the port has been disabled by an administrator

l Jumbo Packets Enabled - Indicates that Jumbo Packets are enabled by default.

Reports by System Template

436 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 437: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Network IP ConfigurationReturns the configuration of the interfaces on a network in a table report. Uses data fromthe Network Interface IP Config data source.

l Hostname - Name of the host on which the network interface is located

l Interface - Interface name. For HP-UX, the interface name consists of the PPA path,module name plus instance number, and driver name in brackets

l Sub Name - If returning data for RecoverPoint Appliance, the name of the site in whichRecoverPoint Appliance is located. If returning data for EMC File Storage (Celerra), thename of the Data Mover

l Sub Name 2 - Name of RecoverPoint Appliance

l IP Address - IP address of the interface. There may be multiple IP addresses for eachinterface

l Netmask - Network mask of the interface

l Gateway - Gateway used by the interface

l Broadcast - If selected, indicates that messages can be sent with no address and issent to everyone listening

l Boot Protocol - Boot protocol of the interface. For example, static, DHCP

Network IP Configuration for IPReturns the configuration of the interfaces for IP on a network in a table report. Uses datafrom the Cluster Resource Mapping and Network Interface IP Config data sources.

l Hostname - Name of the host on which the network interface is located

l Interface - Interface name. For HP-UX, the interface name consists of the PPA path,module name plus instance number, and driver name in brackets

l IP Address - IP address of the interface. There may be multiple IP addresses for eachinterface

l Sub Name - If returning data for RecoverPoint Appliance, the name of the site in whichRecoverPoint Appliance is located. If returning data for EMC File Storage (Celerra), thename of the Data Mover

l Sub Name 2 - Name of RecoverPoint Appliance

l IP Address - IP address of the interface. There may be multiple IP addresses for eachinterface

l Netmask - Network mask of the interface

l Gateway - Gateway used by the interface

l Broadcast - If selected, indicates that messages can be sent with no address and issent to everyone listening

l Boot Protocol - Boot protocol of the interface. For example, static, DHCP

Orphaned LUNsReturns orphaned LUNs in a table report. Uses data from the LUN Configuration and LUNMapping data sources.

l Node - Name of the array on which the LUN exists

l Sub Name - Identifier for the storage array on which the LUN resides

Reports by System Template

Network IP Configuration 437

Page 438: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Name - Name of the LUN

Process CountReturns process count details in a line chart. Uses data from the Process Count datasource.

l Processes - Number of processes running on the host

l Hostname - Name of the host on which the process is running

l PID - Process identifier

l Process Name - Name of the process

l Process cmd - Full command line of the process

l CPU - Percentage CPU that is being used by the process

l Memory - Amount of memory that is being used by the process (in MB)

Process Count By HostReturns process count by host details in a line chart. Uses data from the Process CountBy Host data source.

l Processes - Number of processes running on the host

l Hostname - Name of the host on which the process is running

l PID - Process identifier

l Process Name - Name of the process

l Process cmd - Full command line of the process

l CPU - Percentage CPU that is being used by the process

l Memory - Amount of memory that is being used by the process (in MB)

Process Count CurrentReturns current process count details in a column chart. Uses data from the ProcessCount data source.

l Process Count - Number of processes running on the host

Process StatusReturns the process status details in a table report. Uses data from the Process Statusdata source.

When running the Process Status report from an object in the configuration tree, thereport displays the status of any DPA processes that run on the selected objects. Thereport does not show the status of any agents that may be monitoring those objectsremotely. Run the Process Status report from the DPA Server objects to view the status ofall DPA processes across all machines. This allows you to identify any processes that arenot running.

l Hostname - Name of the host on which the process is running

l PID - Process identifier

l Process Name - Name of the process

l Process Command - Full command line of the process

l CPU - Percentage CPU that is being used by the process

Reports by System Template

438 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 439: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Memory - Amount of memory that is being used by the process (in MB)

Processor StatusReturns processor status in a column chart. Uses data from the Processor Status datasource.

l Count - Processor count

Processor Status DetailsReturns processor status details in a table report. Uses data from the Processor Statusdata source.

l Node - Object in which the processors are situated

l ID - Processor number of the object

l Sub Name - If returning data for RecoverPoint Appliance, the name of the site in whichRecoverPoint Appliance is located. If returning data for EMC File Storage (Celerra), thename of the Data Mover

l Sub Name 2 - Name of RecoverPoint Appliance

l Online - Indicates if the processor is currently online

PSU StatusReturns power supply unit (PSU) status in a table report. Uses data from the PSU Statusdata source.

l Node - Name of the object

l Name - Name of the PSU

l Active - Indicates if the PSU is currently active

l Status - Status of the PSU

PSU SummarySummary of power supply unit (PSU) details in a column chart. Uses data from the PSUStatus data source.

l Count - PSU count

RecoverPoint Consistency Group Copy StatusReturns RecoverPoint consistency group copy status in a table report. Uses data from theConsistency Group Copy Status data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the consistency group

l Enabled - Indicates if the consistency group is active

l Active RPA - Name of the RecoverPoint Appliance that is currently active for this Copy

l Data Transfer - Status of Data Transfer for this Copy. For example, ACTIVE

l Journal State - Current state of journal. For example, DISTRIBUTING IMAGES TOSTORAGE

Reports by System Template

Processor Status 439

Page 440: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Storage Access - Current status of access to the storage for this copy. For example,DIRECT ACCESS, NO ACCESS

l Current Protection Window - Time duration of the current protection window

l Current Protection Window Status - Status of the current protection window

l Predicted Protection Window - Predicted protection window value

l Predicted Protection Window Status - Predicted protection window status

l Average Compression - Average compression achieved

l Link Mode - Link mode for CDP and CRR operations. For example, CONTINUOUS,CONTINUOUS ASYNC

l Journal Mode - Journal Mode. For example, NORMAL

l Journal Usage - Current usage of the journal (in MB)

l Journal Capacity - (in MB)

l Latest Journal Image - Timestamp of the most recent image

l Journal Lag - Size of the journal lag (in MB)

RecoverPoint Consistency Group Copy Status for Active RPAsReturns RecoverPoint consistency group copy status for active RPAs in a table report.Uses data from the Consistency Group Copy Status data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the consistency group

l Enabled - Indicates if the consistency group is active

l Active RPA - Name of the RecoverPoint Appliance that is currently active for this Copy

l Data Transfer - Status of Data Transfer for this Copy. For example, ACTIVE

l Journal State - Current state of journal. For example, DISTRIBUTING IMAGES TOSTORAGE

l Storage Access - Current status of access to the storage for this copy. For example,DIRECT ACCESS, NO ACCESS

l Current Protection Window - Time duration of the current protection window

l Current Protection Window Status - Status of the current protection window

l Predicted Protection Window - Predicted protection window value

l Predicted Protection Window Status - Predicted protection window status

l Average Compression - Average compression achieved

l Link Mode - Link mode for CDP and CRR operations. For example, CONTINUOUS,CONTINUOUS ASYNC

l Journal Mode - Journal Mode. For example, NORMAL

l Journal Usage - Current usage of the journal (in MB)

l Journal Capacity - Capacity of the journal (in MB)

l Latest Journal Image - Timestamp of the most recent image

l Journal Lag - Size of the journal lag (in MB)

Reports by System Template

440 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 441: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

RecoverPoint Event DetailsReturns RecoverPoint event details in a table report. Uses data from the RecoverPointEvents data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Time - Time the event occurred

l Site - Site at which event occurred

l RPA - Hostname or IP address of the RecoverPoint Appliance

l Topic - One of: Management, Site, RPA, Group, Splitter

l Scope - One of: Normal, Detailed, Advanced

l Level - One of: Info, Warning, Error

l ID - Identifier for the event

l User - One of: Admin, Root, Webdownload

l Groups - Names of the consistency groups

l Summary - Summary of the log

l Details - Log details

RecoverPoint Event SummarySummary of RecoverPoint events in a column chart. Uses data from the RecoverPointEvents data source.

l Level - One of: Info, Warning, Error

l Level Count - Count of level events

l Type - Type of event

RecoverPoint Last 10 Event DetailsReturns the ten most recent events in the RPA environment in a table report. Uses dataform the RecoverPoint Events data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Time - Time the event occurred

l Site - Site at which event occurred

l RPA - Hostname or IP address of the RecoverPoint Appliance

l Topic - One of: Management, Site, RPA, Group, Splitter

l Scope - One of: Normal, Detailed, Advanced

l Level - One of: Info, Warning, Error

l ID - Identifier for the event

l User - One of: Admin, Root, Webdownload

l Groups - Names of the consistency groups

l Summary - Summary of the log

l Details - Log details

Reports by System Template

RecoverPoint Event Details 441

Page 442: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

RecoverPoint RPA Active Consistency GroupsReturns the consistency groups that are currently active for each RPA in a table report.Uses data from the Consistency Group Copy Status data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Active RPA - Name of the RecoverPoint Appliance that is currently active for this Copy

l Consistency Group - Name of the consistency group

l Name - Name of the Copy

RecoverPoint VolumesReturns RecoverPoint volume details in a table report. Uses data from the RecoverPointVolumes data source.

l Server - Name or IP address of the management interface of the RecoverPoint cluster

l Name - Name of the volume

l ID - Identifier for the volume

l Vendor - Name of the vendor

l Product - Name of the product

l Model - Model of the volume

l Size - Size of the volume (in MB)

l Consistency Group - Name of the consistency group

l Copy - Name of the copy within the consistency group

l Replication Set - Name of the replication set. If the volume is a Journal, this value willbe NULL

l Volume Type - Type of volume: Replication Set, Journal, Repository

RecoverPoint Volumes for Replication SetsReturns RecoverPoint volume for replication set details in a table report. Uses data fromthe RecoverPoint Volumes data source.

l Server - Name or IP address of the management interface of the RecoverPoint cluster

l Name - Name of the volume

l ID - Identifier for the volume

l Vendor - Name of the vendor

l Product - Name of the product

l Model - Model of the volume

l Size - Size of the volume (in MB)

l Consistency Group - Name of the consistency group

l Copy - Name of the copy within the consistency group

l Replication Set - Name of the replication set. If the volume is a Journal, this value willbe NULL

l Volume Type - Type of volume: Replication Set, Journal, RepositoryReplication Set

Reports by System Template

442 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 443: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Remote Mirror StatusReturns remote mirror status details in a table report. Uses data from the Remote MirrorStatus data source.

l Source node - Name of the object on which the source mirror resides

l Source path - Path to the mirror source

l Mirror node - Name of the object on which the remote mirror resides

l Mirror path - Path to the remote mirror

l Mirror status - Current status of the remote mirror: Unsynchronized, Active, Broken,Quiesced, Updating

l Last update - Last time this remote mirror was set to update from the source

l Update size - Total size of the last update of this remote mirror (in KB

l Exposure - (in seconds)

Replication StatusReturns Data Domain replication status details in a table report. Uses data from theReplication Performance and Replication Status data sources.

l Hostname - Hostname of replicating server

l Source - Identifier for replication source

l Destination - Identifier for replication destination

l State - State of replication set

l Status - Status of replication set

l Connection Time - Time connection was established

l Throttle - Amount of data transfer to which replication is throttled

l Destination Host - Unique identifier for the destination of replication

l Synchronized - Indicates whether data is synchronized

Tape Drive Cleaning SummarySummary that displays how many tape drives require cleaning in a column chart. Usesdata from the Tape Drive Status data source.

l Count - Number of tape drives that require cleaning

Tape Drive Count By StateReturns the tape drive count by state in a column chart. Uses data from the Tape DriveStatus data source.

l State - State of a drive

l Count - Number of tape drives in the state

Tape Drive Count By StatusReturns tape drive count by status in a column chart. Uses data from the Tape DriveStatus data source.

l State - State of a drive

Reports by System Template

Remote Mirror Status 443

Page 444: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Count - Number of tape drives in the state

Tape Drive StatusReturns tape drive status in a table report. Uses data from the Tape Drive Status datasource. For virtual tape drives, this report displays its tape library. However, the tapelibrary of which a physical tape drive is a member is not displayed. For all drives, theStatus field shows the health of the drive. For physical tape drives, the State field alsoindicates whether the tape drive is loaded with a volume or not. This information is notavailable for virtual tape drives.

l Hostname - Name of the host to which the drive is attached

l Library Name - If monitoring a device that manages multiple tape libraries such as anEDL Unit, this field contains the name of the library that in which the drive is located.In other situations, this field is not populated

l Device name - Name of device

l Soft Read Errors - Number of corrected read errors

l Hard Read Errors - Number of uncorrected read errors

l Soft Write Errors - Number of corrected write errors

l Hard Write Errors - Number of uncorrected write errors

l Status - Current status of a drive

l Volume - Name of the volume currently loaded in the drive

l Speed - Speed the interface is running at if Fibre attached (Mb/second)

l State - State of a drive

l Loop Id - Loop id of a drive if fibre attached

l Num Loads - Number of times a tape has been mounted on that drive

l Cleaning Required - Indicates if the tape drive currently requires cleaning

l Virtual - Indicates if the tape drive is virtual

Tape Library CAP StatusReturns the status of any cartridge access ports in a table report. Uses data from the TapeLibrary Cap Status data source.

l Hostname - Name of the host to which the device is attached

l Address - Unique identifier of the CAP in the tape library

l Status - Status of the CAP

l Unlocked - Indicates if the CAP is unlocked

l Open - Indicates if the CAP is open or closed

Tape Library CAP Status SummarySummary of any cartridge access ports status in a column chart. Uses data from the TapeLibrary Cap Status data source.

l Status - Status of the CAP

l Count - Number in the state

Reports by System Template

444 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 445: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Tape Library Empty Volume CountReturns tape library empty volume count details in a column chart. Uses data from theTape Library Volume Status data source.

l Hostname - Name of the device that is being monitored. Typically this field containsthe name of the tape library, but it can contain the name of the device managingmultiple libraries such as an EDL

l Library Name - Name of the library. This field is only populated when the device beingmonitored supports multiple tape libraries, such as EDL

l Count - Number of empty volumes

Tape Library Slot StatusReturns the volumes that are loaded into slots in each library on the virtual tape library ina table report. Uses data from the Tape Library Slot Status data source. For physical tapelibraries, this report also contains information on the type of media.

l Hostname - Name of the device that is being monitored. Typically this field containsthe name of the tape library, but this value can be the name of the device managingmultiple libraries such as an EDL

l Library Name - Name of the library. This field is only populated when the device beingmonitored supports multiple tape libraries, such as EDL

l Address - Unique address of the element inside the tape library

l Status - Indicates if the slot is loaded

l Volume - Barcode of the volume in that slot

l Type - Type of virtual tape library

l Virtual - Indicates if the tape library is a virtual tape library

Tape Library Status DetailsReturns the status of individual tape libraries in a table report. Uses data from the TapeLibrary Status data source. For each library on the system, the report displays thehostname, the number of volumes in the library, and the status of the library.

l Hostname - Name of the device being monitored. If monitoring a tape library directly,this field contains the library name. If monitoring a device such as an EDL thatsupports multiple libraries, this field contains the name of the EDL

l Library Name - Name of the tape library. This field is not populated if monitoring adevice directly. Instead its name is populated in the Hostname field. This field ispopulated if monitoring a device that manages multiple libraries such as an EDL

l Status - Status of the library

l Num Volumes - Number of volumes in the library

l Virtual - Indicates if the library is virtual

l State - Current active state of the tape library

Reports by System Template

Tape Library Empty Volume Count 445

Page 446: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Tape Library Status SummarySummary of the tape library status in a column chart. Uses data from the Tape LibraryStatus data source.

l Count - Number of tape library in status

Tape Library Volume StatusReturns tape library volume status details in a table report. Uses data from the TapeLibrary Volume Status data source.

l Hostname - Name of the device that is being monitored. Typically this field containsthe name of the tape library, but it can contain the name of the device managingmultiple libraries such as an EDL

l Library Name - Name of the library. This field is only populated when the device beingmonitored supports multiple tape libraries, such as EDL

l Volume - Identifier for the volume

l Size - Amount of data on the volume (in MB)

l Virtual - Indicates if the volume is virtual or physical

l Location - Location of the volume in the library

l Location Type - Type of location in which the volume is located. For example, slot,drive

l Pool - Pool that this tape is in

l Type - Type of media

l Data Type - Type of tape: data, clean, scratch

l Entry Date - Date that the volume was entered into the library

l Access Date - Last time the volume was accessed

l Access Count - Number of times the volume has been accessed

l Max Use - Maximum number of times a volume can be used

l Status - Status of the volume

l Reorg - Reorganization status of the volume: Queued, Restoring, Save

l Stale - Indicates if volume is stale: RESTORING, NULL

l Migrated - Indicates the volume is no longer in cache and must be read in from thetape before next access: 0, 1, NULL

l Dirty - Indicates the volume is in cache but has not been saved since the last change:0, 1, NULL

l Read Only Mount - Indicates if the last mount was read-only: 0, 1, NULL

l Scratch Mount - Indicates if the last mount was a scratch mount: 0, 1, NULL

l Scratch - Indicates if the volume is a scratch volume

l Drive - Name of the drive, if volume is in use in a drive or was requested

l Device - Device name of the logical drive, if volume is in use in a drive or wasrequested

l Next Block - First block after last used block on a volume

l Number Logical Volumes - Number of logical volumes stored on a physical volume

Reports by System Template

446 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 447: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Number Valid Logical Volumes - Number of valid logical volumes stored on thephysical volume

l Valid Size - Amount of valid data on volume (in MB)

l Valid Portion - Portion of data valid on volume

l Tape Filesystem - Identifier for the tape file system

l Library Device Name - Device name of the logical drive in library notation, if volume isin use in a drive or was requested

l Capacity - Capacity of volume (in MB)

l Compression Ratio - Ratio of data compressed to original size during backup

Thermometer StatusReturns thermometer status details in a table report. Uses data from the ThermometerStatus data source.

l Node - Name of the object

l Name - Name of the thermometer

l Active - Indicates if the thermometer is active: 1 (active)

l Temperature - Temperature currently registered by the thermometer (in Celsius)

l Overheating - Indicates if the temperature is above an internal threshold

Thermometer SummarySummary of information on any temperature sensors that are overheating in a columnchart. Uses data from the Thermometer Status data source.

l Count - Number of thermometer sensors that are overheating

Thermometer TrendReturns the changes in temperature over time in a line chart. Uses data from theThermometer Status data source.

l Node - Name of the object

l Name - Name of the thermometer

l Temperature - Temperature currently registered by the thermometer (in Celsius)

Thermometer Trend for Specific ThermometerReturns the changes in temperature over time for a specific thermometer in a line chart.Uses data from the Thermometer Status data source.

l Node - Name of the object

l Name - Name of the thermometer

l Temperature - Temperature currently registered by the thermometer (in Celsius)

TSM Client FilespacesReturns TSM client filespace details in a table report. Uses data from the TSM ClientFilespaces data source.

l Server - Name of the TSM server

Reports by System Template

Thermometer Status 447

Page 448: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Sub Name - Name of TSM server instance

l Client - Name of the backup client

l Filespace Name - Name of the filespace

l Filespace ID - Identifier for the filespace

l Filespace Type - Type of filespace

l Capacity - Size of the filespace (in MB)

l Percentage Utilization - Percent of space used in the filespace

l Backup Start - Time the last incremental backup of the filespace started

l Backup End - Time the last incremental backup of the filespace ended

l Delete Time - Time the filespace was last deleted

TSM Client OccupancyReturns occupancy details broken down by TSM client in a table report. Uses data fromthe Backup Client Occupancy, TSM Audit Occupancy, and TSM Backup Set data sources.This report shows the total logical occupancy by client for backup sets, along with otherclient occupancy data.

l Server - Name of the TSM server

l Sub Name - Name of TSM server instance

l Client - Name of the client object

l Type - Type of data stored: Backup, Archive, HSM

l Filespace -Name of client filespace

l Filespace ID- ID of the client filespace

l Pool - Storage pool which contains the client filespace

l Files - Number of active files

l Physical - Amount of physical storage used (in MB). Physical space is the total spacetaken up by data for the filespace including space that is no longer active in itself butpart of a set of data that is still active

l Logical - Amount of logical storage used (in MB). Logical space is purely the spacetaken up by active data

l Backup - Total backup storage use for the object (in MB)

l Backup Copy - Total backup copy storage use for the object (in MB)

l Archive - Total archive storage use for the object (in MB)

l Archive Copy - Total archive copy storage use for the object (in MB)

l Total - Total storage use for the object (in MB)

TSM Database StatusReturns TSM database status details in a table report. Uses data from the TSM DatabaseUtilization data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Buffer Pool Hit Ratio - Percentage ratio of buffer pool hits

l Package Cache Hit Ratio - Percentage ratio of package cache hits

Reports by System Template

448 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 449: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Buffer Requests - Number of buffer requests

l Num Sort Overflows - Number of sorts that ran out of heap memory

l Num Lock Escalations - Number of times row locks were escalated to table locks

l Last Reorg Time - Time of the last database reorganization

l Num Incremental Database Backups - Number of incremental database backups thathave occurred since the last full database backup

l Last Full Database Backup Time - Last time the database was fully backed up

TSM Database UsageReturns TSM database usage details in a column chart. Uses data from the TSM DatabaseUtilization data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Object - One of: Database, Recovery Log

l Usage - Amount of used space in the TSM database (in MB)

TSM Database Volume StatusReturns TSM database volume status details in a table report. Uses data from the TSMDatabase Volumes data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Object - One of: Database, Recovery Log

l Copy 1 Name - Name of the first copy

l Copy 1 Status - Status of the first copy

l Copy 2 Name - Name of the second copy

l Copy 2 Status - Status of the second copy

l Copy 3 Name - Name of the third copy

l Copy 3 Status - Status of the third copy

l Available Space - Amount of available space (in MB)

l Allocated Space - Amount of allocated space (in MB)

l Free Space - Amount of free space (in MB)

TSM Defined Server StatusReturns the TSM defined server status in a table report. Uses data from the TSM DefinedServer Status data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Defined Server - Name of the defined server

l Last Access - Date and time of last access

l Last Session Bytes Sent - Number of bytes sent in the last sessions to the clientobject (in bytes)

Reports by System Template

TSM Database Usage 449

Page 450: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Last Session Bytes Received - Bytes received by the server during the last clientobject sessions (in bytes)

l Duration - Length of last client object session (in seconds)

l Nodes - Name of the client object

l Roles - One of: Storage Agent, Replication

l Idle Wait Last Session - (percentage)

l Comm. Wait Last Session - (percentage)

l Media Wait Last Session - (percentage)

TSM Identify Duplicate Process DetailsReturns TSM Identify Duplicate Process details in a table report. Uses data from the TSMIdentify Duplicate Process Details data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process ID - Identify Duplicates process ID

l Storage Pool - Storage pool on which Identify Duplicates process is running

l Volume - Volume of the storage pool on which Identify Duplicates process is running

l State - Current state of the Identify Duplicates process

l Current File Size - Size of current physical file in MB

l Num. Duplicate Extents - Number of duplicate extents found by Identify Duplicatesprocess on the storage pool

l Num. Files Processed - Number of files processed by Identify Duplicates process onthe storage pool

l Total Dedupe Size - Total Duplicate size found by Identify Duplicates process on thestorage pool in MB

l Dedupe State Start Time - Dedupe start date/time

TSM Identify Duplicate Process TrendReturns current and deduplicated size as a trend over time in a line chart. Uses data fromthe TSM Identify Duplicate Process Details data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process ID - Identify Duplicates process ID

l Storage Pool - Storage pool on which Identify Duplicates process is running

l Dedupe Size - Total Duplicate size found by Identify Duplicates process on thestorage pool in MB

TSM Replication Node StatusReturns TSM replication object status details in a table report. Uses data from the TSMReplication Node Status data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

Reports by System Template

450 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 451: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Node Name - Name of the object

l Replication Type - Type of replication

l Filespace Name - Name of the filespace

l FSID - Identifier for the filespace

l Num. Files On Server - Number of files on the server

l Replication Server Name - Name of the replication server

l Num. Files On Replication Server - Number of files on the replication server

TSM Replication Process DetailsReturns TSM replication process details in a table report. Uses data from the TSMReplication Process Details data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Summary ID - Summary identifier

l Data Type - Type of data

l Last Updated - User who last updated

l Target Server - Name of the target server

l Num. Files Needing No Action - Number of files needing no action

l Num. Files Replicated - Number of files replicated

l Num. Files Not Replicated - Number of files not replicated

l Num. Files Deleted - Number of files deleted

l Num. Files Not Deleted - Number of files not deleted

l Num. Files Updated - Number of files updated

l Num. Files Not Updated - Number of files not updated

l Size Replicated - Total size of data replicated (in MB)

l Size Transferred - Total size of the data transferred (in MB)

l Size Not Replicated - Total size of data not replicated (in MB)

TSM Replication Process SummarySummary of the TSM replication process in a table report. Uses data from the TSMReplication Process Summary data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Node Name - Name of the object

l Filespace Name - Name of the filespace

l FSID - Identifier for the filespace

l Process ID - Unique identifier used by TSM to identify the process

l Command -

l Completion State -

Reports by System Template

TSM Replication Process Details 451

Page 452: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Reason For Incompletion -

l Total Files Replicated - Number of files replicated

l Total Files Deleted - Number of files deleted

l Total Files Updated - Number of files updated

l Total Files Not Replicated - Number of files not replicated

l Total Size Replicated - Total size of data replicated (in MB)

l Total Size Transferred - Total size of the data transferred (in MB)

l Total Size Not Replicated - Total size of data not replicated (in MB)

TSM Device Path StatusReturns TSM device path status in a table report. Uses data from the TSM Device Pathdata source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Source - Name of the path source

l Source Type - Type of path source

l Destination - Name of the path destination

l Destination Type - Path destination type

l Destination Library - Name of the destination path library if the type is a drive

l Destination Node Name - Name of the device in the destination path

l Destination Device - Name of the destination path device

l Destination External Manager - Name of the external library manager, if applicable

l LUN - Logical unit name (LUN) through which the disk can be accessed by the source

l Initiator - Path initiator

l Destination Directory - Directory location of a file on the source

l Online - Indicates whether the path is online and available for use or offline

l Last Updated - User who last updated the path

l Last Update Time - Time of the last update

TSM Filespace SummaryReturns TSM filespace summary in a table report. Uses data from the Backup ClientOccupancy and TSM Client Filespaces data sources.

l Client - Name of the backup client

l Occupancy - (in MB)

l Filespace Size - (in MB)

l Occupancy Ratio - (as a percentage)

TSM LAN Free Server StatusReturns the TSM LAN-free server status in a table report. Uses data from the TSM LAN FreeServer Status data source. In DPA 6.0, LAN-Free Server Status is renamed Defined Server

Reports by System Template

452 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 453: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Status. LAN-free Server Status is supported for backwards compatibility; however,Defined Server Status is preferred going forward.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l LAN Free Server - Name of the LAN-free Server

l Last Access - Date and time of last access

l Last Session Bytes Sent - Number of bytes sent in the last sessions to the clientobject

l Last Session Bytes Received - Bytes received by the server during the last clientobject sessions

l Duration - Length of last client object session (in seconds)

l Node -Name of the client object

TSM Recovery Log UsageReturns TSM recovery log usage in a column chart. Uses data from the TSM DatabaseUtilization data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Object - One of: Database, Recovery Log

l Usage - Amount of used space in the TSM recovery log (in MB)

Virtual Host Top 10 Longest Time Since Last Power OnReturns information on the top 10 longest time since last power on in a table report. Usesdata from the Virtual Host Status data source.

l Virtualization Server - Hostname of a Virtualization Server managed by Virtual Centre

l Virtual Host - Name of the Virtual Centre server

l Status - Status of the virtual machine

l CPU Used - CPU utilization of the virtual machine (in MHz)

l Memory Used - Amount of memory used by the virtual machine (in MB)

l Startup Time - Time virtual host was started

VTL StatusReturns VTL status details in a table report. Uses data from the VTL Configuration and VTLStatus data sources.

l Hostname - Hostname of the VTL

l Capacity - Disk capacity of the VTL (in MB)

l Used - Amount of disk capacity used by the VTL (in GB)

l DeDupe Original - Size of data before deduplication (in MB)

l DeDupe Reduced - Size of data backed up after deduplication (in MB)

Reports by System Template

TSM Recovery Log Usage 453

Page 454: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Xsigo Infiniband Port StatusReturns status information on the InfiniBand ports in a table report. Uses data from theInfiniband Port Status and Infiniband Port Configuration data sources.

l Hostname - Name or IP address of the Xsigo appliance

l Linkup - Indicates if the link is active or down

l Speed - Speed of the interface (MB/second)

Troubleshooting system templatesTroubleshooting reports provide information on any errors generated by the tape libraryor its tape drives. There are two sets of reports in the troubleshooting category that assistwith detecting tape library and tape drive errors. These are:

l Tape Library Errors

l Tape Drive Errors

Aggregate Fibre Channel Port ErrorsReturns information on Fibre Channel port errors in a line chart. Uses data from the FibreChannel Performance data source.

l Errors - Number of bad frames received by the port

l Errors Out - Number of bad frames sent by the port

l Discards In - Number of incoming frames discarded

l Discards Out - Number of outgoing frames discarded

l No Credits - Number of times that the port has been unable to transmit data due to alack of buffer-to-buffer credits

Fibre Channel Port Errors By NodeReturns the total number of frame errors and total number of times that the ports haverun out of buffer-to-buffer credits on all ports on a switch over time in a line chart. Usesdata from the Fibre Channel Performance By Node data source.

l Hostname - Name of the object

l Errors - Number of bad frames received by the port

l Errors Out - Number of bad frames sent by the port

l Discards In - Number of incoming frames discarded

l Discards Out - Number of outgoing frames discarded

l No Credits - Number of times that the port has been unable to transmit data due to alack of buffer-to-buffer credits

Fibre Channel Port Errors By PortReturns the total number of frame errors and total number of times that the ports haverun out of buffer-to-buffer credits on all ports on a switch over time in a line chart. Usesdata from the Fibre Channel Performance By Port data source.

l Hostname - Name of the object

Reports by System Template

454 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 455: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

l Sub Name - Name of server instance, if applicable

l Port - Port identifier. For example, Port 1

l Errors - Number of bad frames received by the port

l Errors Out - Number of bad frames sent by the port

l Discards In - Number of incoming frames discarded

l Discards Out - Number of outgoing frames discarded

l No Credits - Number of times that the port has been unable to transmit data due to alack of buffer-to-buffer credits

Network Interface ErrorsReturns network interface errors in a line chart. Uses data from the Network InterfacePerformance data source.

l Errors In - Number of errors coming in to the interface (/second)

l Errors Out - Number of errors leaving the interface (/second)

l Discards In - Number of packets discarded coming in to the interface (/second)

l Discards Out - Number of packets discarded leaving the interface (/second)

Network Interface Errors By InterfaceReturns network interface errors by interface in a line chart. Uses data from the NetworkInterface Performance By Interface data source.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

l Errors In - Number of errors coming in to the interface (/second)

l Errors Out - Number of errors leaving the interface (/second)

l Discards In - Number of packets discarded coming in to the interface (/second)

l Discards Out - Number of packets discarded leaving the interface (/second)

Network Interface Errors By Interface for rulesetReturns details for network interface errors by interface in a table report. Report forNetwork Interface reporting more than x% errors rule. Uses data from the NetworkInterface Performance By Interface, Report Times, and User Input data sources.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

l Errors -

l Maximum Percentage Errors -

l Alert5 -

l Alert6 -

l Alert - Identifier of the alert

Reports by System Template

Network Interface Errors 455

Page 456: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Network Interface Errors By NodeReturns network interface errors by object in a line chart. Uses data from the NetworkInterface Performance By Node data source.

l Hostname - Name of the host on which the network interface is located

l Errors In - Number of errors coming in to the object (/second)

l Errors Out - Number of errors leaving the object (/second)

l Discards In - Number of packets discarded coming in to the object (/second)

l Discards Out - Number of packets discarded leaving the object (/second)

RecoverPoint RPA Packet LossReturns RecoverPoint RPA packet loss in a line chart. Uses data from the RPA Performancedata source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located

l Name - Name of the RecoverPoint Appliance

l Packet Loss - Packet loss on the network (as a percentage)

Tape Drive Error CountReturns tape drive error count in a column chart. Uses data from the Tape Drive Statusdata source.

l Hostname - Name of the host to which the drive is attached. If gathering tape driveinformation by monitoring a tape library directly, this field contains the tape libraryname. If gathering tape drive information from a unit that manages multiple tapelibraries such as an EDL, this field contains the name of that device

l Device Name - Name of device

l Soft Errors - Total of the soft read and write errors

l Hard Errors - Total of the hard read and write errors

Tape Drive Error Count By NodeReturns tape drive error count by object in a column chart. Uses data from the Tape DriveStatus data source.

l Hostname - Name of the host to which the drive is attached. If gathering tape driveinformation by monitoring a tape library directly, this field contains the tape libraryname. If gathering tape drive information from a unit that manages multiple tapelibraries such as an EDL, this field contains the name of that device

l Soft Errors - Total of the soft read and write errors

l Hard Errors - Total of the hard read and write errors

Tape Drive Error TrendReturns tape drive error trend details in a line chart. Uses data from the Tape Drive Statusdata source.

l Hostname - Name of the host to which the drive is attached. If gathering tape driveinformation by monitoring a tape library directly, this field contains the tape library

Reports by System Template

456 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 457: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

name. If gathering tape drive information from a unit that manages multiple tapelibraries such as an EDL, this field contains the name of that device

l Library Name - If monitoring a device that manages multiple tape libraries such as anEDL Unit, this field contains the name of the library that in which the drive is located.In other situations, this field is not populated

l Device Name - Name of device

l Soft Read Errors - Number of corrected read errors

l Hard Read Errors - Number of uncorrected read errors

l Soft Write Errors - Number of corrected write errors

l Hard Write Errors - Number of uncorrected write errors

Tape Library ErrorsReturns tape library errors in a table report. Uses data from the Tape Library Errors datasource.

l Hostname - Name of the host to which the device is attached

l Error Code - Associated error code for the error in the tape library

l Severity - Severity of the error

l Error - Error in the tape library

l Count - Number of errors logged at the time

l Action - Recommended action taken on error

l Timestamp - Date and time of the error

Viewlet system templatesFor more specific details on the various reports, select one of the reports described in thefollowing sections.

Backup KPIsReturns backup KPI details in a table report. Uses data from the Num Jobs, Backup JobDetails, Backup Statistics, Restore Statistics, Total Size (MB), Backup Client Config, andTotal Size Scanned (MB) data sources.

l Successful Backups - Number of successful backups

l Protected Data - Amount of protected data (in MB)

l Total Backups - Total number of backups

l Successful Restores - Number of successful restores

l Total Restores - Total restores

l Unprotected Clients - Number of unprotected clients

Backup Size Distribution for Backup KPIsDrill down report for viewlet that shows the total data backed up over time in a line chart.Uses data from the Total Size and Total Size Scanned data sources.

l Protected Data - Amount of protected data (in GB)

Reports by System Template

Tape Library Errors 457

Page 458: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Data Backed Up Daily for Backup KPIsDrill down report for viewlet that shows the total data backed broken down by dailyinterval in a column chart. Uses data from the Total Size and Total Size Scanned datasources.

l Protected Data - Amount of protected data (in GB)

Data Collection Agent ErrorsReturns data collection agent errors in a table report. Uses data from the AgentConfiguration and Agent Errors data sources.

l Agent Name - Name of the DPA data collection agent

l Message - Error message that is returned

l Start Time - Start time of the last failure

l End Time - End time of the last failure

l Version - Version of the agent

Data Collection Agent HealthReturns data collection agent health details in a table report. Uses data from the AgentConfiguration, Agent Errors, and Agent Status data sources.

l Count - Number of agents

l Property -

Data Collection Agents DownReturns data collection agent down details in a table report. Uses data from the AgentConfiguration and Agent Status data sources.

l Agent Name - Name of the DPA data collection agent

l Version - Version of the agent

Objects Not Meeting RPOsReturns objects not meeting RPOs in a table report. Uses data from the Objects NotMeeting RPO data source.

l Node name - Name of the replicated object

RecoverPoint Protected Capacity by SystemReturns the protected data capacity by the RecoverPoint System in a table. Uses datafrom the Consistency Group Data Protected and Consistency Group Copy Configurationdata sources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Data Protected - Total amount of data protected (in MB)

Reports by System Template

458 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide

Page 459: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

RecoverPoint Protected Capacity by CGReturns the protected data capacity by the RecoverPoint Consistency Group in a table.Uses data from the Consistency Group Data Protected and Consistency Group CopyConfiguration data sources.

l Consistency Group- Name or IP address of the Management Interface of theRecoverPoint cluster

l Data Protected - Total amount of data protected (in MB)

Unprotected Clients for Backup KPIsDrill down report for Backup KPIs viewlet that returns those clients without a successfulbackup in a table report. Uses data from the Backup Client Config, Last Backup Details byClient and Job, and Num Jobs data sources.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of the TSM server instance

l Client - Name of the client on the backup server

l Domain Name - Name of the application domain

l Time Since Last Backup - Time since the last backup

Reports by System Template

RecoverPoint Protected Capacity by CG 459

Page 460: DPA Report Reference Guide - Dell EMC · Asset Management system templates ... Host Summary By Version ... EMC Data Protection Advisor 6.2 SP2 Report Reference Guide 7.

Reports by System Template

460 EMC Data Protection Advisor 6.2 SP2 Report Reference Guide