NetBackup IT Analytics Report Reference Guide
- Introduction to NetBackup IT Analytics
- Alert Reports
- Ransomware reports
- Risk Mitigation Solution Reports
- Risk Mitigation Reports
- Storage Optimization Solution Reports
- System Administration Reports
- Oracle Job Overview
- Capacity Manager Reports
- Application Capacity Reports
- Array Capacity and Utilization Reports
- Array Capacity & Utilization (Generic Data)
- Array Capacity & Utilization (IBM SVC View)
- Array Capacity and Utilization (IBM XIV View)
- Array Capacity and Utilization (NetApp View)
- Array Capacity and Utilization (NetApp Cluster)
- NetApp Storage System Detail
- Array Capacity and Utilization (OpenStack Swift)
- IBM Array Site Summary
- IBM Array Detail
- LUN Utilization Summary
- NetApp Aggregate Detail
- NetApp Cluster-Mode Aggregate Detail
- NetApp Plex Details
- NetApp Volume Details
- NetApp Cluster-Mode Volume Detail
- NetApp StorageGrid Tenant Summary
- Available/Reclaimable Capacity Reports
- Capacity at Risk Reports
- Capacity Chargeback Reports
- Host Capacity Utilization Reports
- SnapMirror Reports
- SnapVault Reports
- Capacity Forecasting Reports
- Storage Performance Reports
- Mission Control for Performance Analysis
- Thin Provisioning Reports
- Hitachi Dynamic Provisioning Pool Utilization
- File Analytics Reports
- Virtualization Manager Reports
- Understanding the Datastore
- VM Server Detail
- VM Snapshot Summary
- VM Detail
- Datastore Utilization Summary
- Datastore Detail
- Fabric Manager Reports
- Host to Storage Dashboard
- Backup Manager Management Reports
- Error Log Summary
- Job Duration Report
- Veeam Backup & Replication Job Summary Report (Homogeneous)
- Veeam and RMAN Job Details Report
- Adding a Note to a Job
- Job Volume Summary Report
- NetBackup deduplication to MSDP savings
- Backup Administration Reports
- Host Details
- IBM Spectrum Protect (TSM) Storage Pools Dashboard
- Job Histogram
- EEBs on Primary server, Media server and Clients reports
- Backup Media Management Reports
- TSM Tape Media Detail Table
- Backup Service Level Agreement (SLA) Reports
- Determining and Improving Backup Start Time Performance
- Determining and Improving Backup Success Performance
- Determining and Improving Backup Duration Performance
- Backup Storage Utilization Reports
- Backup Manager Forecasting Reports
- Backup Billing and Usage Reports
- Determining Media Chargebacks
- Determining Backup Chargebacks
- Backup Policies Reports
- Public Cloud Reports
- AWS Reports
- Microsoft Azure Reports
EMC Isilon SMB Share Summary
Explore your data center using customizable report templates or by using parts of your IT infrastructure as entry points. Use Search to find reports, templates and dashboards across the portal.
Use the Reports tab to examine the catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
Table: EMC Isilon SMB Share Summary
Column name | Description |
---|---|
Cluster |
Name of the Isilon cluster. |
Name |
Display name of the share. |
Path |
Shared path in the ifs file system. |
Usage Without Overhead |
Combined used capacity (in KiB) of all paths in the export (not including OneFS overhead). Values are stored as KiB in the database and rendered according to your user profile preferences. |
Usage With Overhead |
Combined used capacity (in KiB) of all paths in the export (including OneFS overhead). Values are stored as KiB in the database and rendered according to your user profile preferences. |
# Files and Directories |
Combined count of files and directories of all paths in the NFS export. |
Description |
Configurable share description. |
CSC Policy |
Client-side caching policy. |
Zone |
Zone name. Click the link to drill down to the EMC Isilon Zone Summary report. |
Browse |
If yes, it makes the share visible in net view and browse lists. |
Exec |
If yes, allows a user with read-only (RO) access to execute the file. |
Strict |
If yes, the server checks for and enforces file locks. |
Hide |
If yes, it hides files that begin with a dot (Unix config files). |
Imper |
Allow guest access to the share. |
Flush |
If yes, flush requests are always honored. |
Byte Start |
Starting point for automatic invalid byte mangling. |
Create Perm |
Default permissions to apply to sub-directories and files. |
Map |
Mangle map. |
User |
Impersonate user name. |
Notify |
Change notify on the share. |
Locks |
If yes, allow oplock requests. |
RO Del |
If yes, allows read-only files to be deleted. |
NTFS ACL |
If yes, allows ACLs to be stored and edited. |