Useful for testing redundancyDisks and Storage showpd Display physical disks (PDs) in the system. Useful for checking if disks are properly distributed, and whether there are spares available for redundancy. showspare Show information about spare and relocated chunklets. Verifies the presence of spare disks to handle failures. showldch Display chunklet mapping of logical disks (LDs) to physical disks. Helps to confirm that disk chunks are distributed across multiple physical disks for redund
System and General ManagementSystem Information cmd Explanation showai System AI information showdate Date and time on all system nodes showsys System information (system name, serial number, etc. ) showversion Installed software versions showdomain Show domains in the system showdomainset Show sets of domains in the system Licenses and Certificates cmd Explanation showlicense Installed license keys showcert SSL certificates System Co
All TiNa help commands. ListingListe des commandes : # ls /usr/TiNa_Path/Bin/atncheckpid Perl tina_check_network tina_frontend_Ugc tina_odbsave tina_synccloudatnlosetup qcdiag tina_clone_catalog tina_help tina_operator tina_synchvdsavfs read_vmdk tina_cod tina_IndexUpgrade tina_perl tina_syncxdcsbackint runtina tina_collector_job tina_init
La commande dnf history undo <transaction-id> permet d’annuler une transaction (installation, mise à jour, suppression) en utilisant l’ID de la dernière transaction et non pas directement un paquet. Annuler une transactionLa commande dnf history undo revient en arrière et annule les changements d’une transaction identifiée par son ID : # dnf history undo <transaction-id> Les cas possibles sont : Si la transaction avait installé un paquet ⮕ le paquet sera supprimé Si la transaction a
When you try to set up a backup on Arcserve, you need to add a target node, and if you encountered this error : ❌ Invalid SSH key configuration.For more information about configuring the SSH key, see the product documentation. You can follow the procedure below. Configure the Private/Public KeysOn backup server Log into your Backup Server as a root user Generate 2 public/private key files named server.pub and server:# ssh-keygen -t rsa -f server Copy and rename server.pub and server files