488
Dell EMC Data Protection Advisor Version 19.1 Report Reference Guide 302-005-790 Rev 02 October 2019

Dell EMC Data Protection Advisor Report Reference Guide · Dell EMC Data Protection Advisor Version 19.1 Report Reference Guide 302-005-790 Rev 03 February 2020

  • Upload
    others

  • View
    27

  • Download
    0

Embed Size (px)

Citation preview

Dell EMC Data Protection AdvisorVersion 19.1

Report Reference Guide302-005-790

Rev 02

October 2019

Copyright © 2005-2019 Dell Inc. or its subsidiaries. All rights reserved.

Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.

THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND

WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF

MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED

IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.

Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property

of their respective owners. Published in the USA.

Dell EMCHopkinton, Massachusetts 01748-91031-508-435-1000 In North America 1-866-464-7381www.DellEMC.com

2 Dell EMC Data Protection Advisor Report Reference Guide

23

Introduction 27Overview...........................................................................................................28

DPA Reports 29Overview.......................................................................................................... 30Run Reports area menu items........................................................................... 30

Reports by object 61Backup application reporting.............................................................................62Data Domain reporting...................................................................................... 62Virtualization reporting..................................................................................... 63Database reporting........................................................................................... 63HP EVA reporting............................................................................................. 63ACSLS Server reporting................................................................................... 64Recoverability reporting....................................................................................64EMC File Storage reporting.............................................................................. 65EDL reporting................................................................................................... 65RecoverPoint reporting.................................................................................... 65Tape library reporting....................................................................................... 66Fibre Channel switch reporting......................................................................... 66IP switch reporting........................................................................................... 66Xsigo reporting................................................................................................. 67System reporting.............................................................................................. 67Data Protection Advisor reporting.....................................................................67Enterprise Application reporting....................................................................... 68

Reports by System Template 69What are system templates?............................................................................ 70Asset Management system templates...............................................................70

Battery Configuration.......................................................................... 70Card Configuration...............................................................................70Disk / Filesystem Capacity....................................................................71Disk Array Configuration....................................................................... 71Disk Configuration................................................................................72Disk Count By State............................................................................. 72Disk Count By Use................................................................................72Disk Summary...................................................................................... 73Fan Configuration.................................................................................73Fibre Channel Configuration.................................................................73Fibre Channel Port Count.....................................................................74Filesystem Configuration......................................................................74Filesystem Configuration for Filesystem.............................................. 75Filesystem Configuration Summary...................................................... 77Filesystem Details.................................................................................77

Preface

Chapter 1

Chapter 2

Chapter 3

Chapter 4

CONTENTS

Dell EMC Data Protection Advisor Report Reference Guide 3

Filesystem Disk Configuration.............................................................. 77Filesystem Summary............................................................................ 78Filesystem Summary By Client............................................................. 78Host Configuration...............................................................................78Host Count...........................................................................................79Host OS Distribution............................................................................ 79Host Summary By Class....................................................................... 79Host Summary By Platform..................................................................79Host Summary By Vendor.................................................................... 79Host Summary By Version................................................................... 80iSCSI Configuration............................................................................. 80LUN Configuration............................................................................... 80LUNs And Filesystems On Same Volume for ruleset............................. 81Memory Configuration..........................................................................81Memory Configuration Details.............................................................. 81Multiple Tape Drive Firmware Revisions for ruleset.............................. 81Network Interface Configuration.......................................................... 81Network Interface Count..................................................................... 82Processor Configuration...................................................................... 82Processor Configuration Summary.......................................................82PSU Configuration............................................................................... 82Solid State Storage Configuration........................................................83Spare Disk Count by Use for ruleset.................................................... 83Spare Disk Count for ruleset................................................................ 83Tape Drive Configuration..................................................................... 83Tape Drive Firmware Revisions............................................................ 84Tape Drive Firmware Summary............................................................ 84Tape Drive Interface Summary.............................................................84Tape Drive Model Summary................................................................. 84Tape Library Config..............................................................................84Thermometer Configuration.................................................................85Xsigo Infiniband Port Configuration..................................................... 85

Capacity Planning system templates................................................................ 85Application Growth.............................................................................. 86Application Usage................................................................................ 86Avamar Client Usage Statistics............................................................ 86Avamar Garbage Collection Data Recovered........................................ 87Backup Daily Staging By Storage Pool................................................. 87Backup Daily Total Group Duration.......................................................87Backup Data Backed Up Daily.............................................................. 87Backup Data Backed Up Daily By Device..............................................87Backup Data Backed Up Daily By Media Server................................... 88Backup Data Backed Up Daily By Server..............................................88Backup Data Backed Up Weekly.......................................................... 88Backup Data Backed Up Weekly By Media Server................................88Backup Data Backed Up Weekly By Server.......................................... 88Backup Duration of Jobs Backed Up Daily............................................88Backup Duration of Jobs Backed Up Daily By Media Server.................88Backup Duration of Jobs Backed Up Daily By Server........................... 89Backup Duration of Jobs Backed Up Weekly........................................89Backup Duration of Jobs Backed Up Weekly By Media Server............. 89Backup Duration of Jobs Backed Up Weekly By Server....................... 89Backup Files Backed Up Daily.............................................................. 89Backup Files Backed Up Daily By Media Server....................................89Backup Files Backed Up Daily By Server.............................................. 89Backup Files Backed Up Weekly...........................................................90

Contents

4 Dell EMC Data Protection Advisor Report Reference Guide

Backup Files Backed Up Weekly By Media Server................................90Backup Files Backed Up Weekly By Server.......................................... 90Backup Number of Jobs Backed Up Daily............................................ 90Backup Number of Jobs Backed Up Daily By Media Server..................90Backup Number of Jobs Backed Up Daily By Server............................ 90Backup Number of Jobs Backed Up Hourly..........................................90Backup Number of Jobs Backed Up Weekly......................................... 91Backup Number of Jobs Backed Up Weekly By Media Server.............. 91Backup Number of Jobs Backed Up Weekly By Server......................... 91Capacity Overview for Block................................................................ 91Capacity Overview for File....................................................................91Data Domain Total Replicated Capacity................................................91Media Count By Location Trend...........................................................92Media Count By Pool and Location Trend............................................ 92Media Count By Pool and State and Location Trend............................ 92Media Count By Pool And State Trend.................................................92Media Count By Pool Trend................................................................. 93Media Count By State and Location Trend...........................................93Media Count By State Trend................................................................93Media Count Trend.............................................................................. 93Media Usage By Library Trend............................................................. 93Media Usage By Pool and Library Trend...............................................94Media Usage By Pool Trend................................................................. 94Media Usage Trend.............................................................................. 94Networker Individual Job Size for Data Domain....................................94NetWorker Total Job Size and Used Space for Data Domain............... 94Pool Capacity Usage............................................................................ 95Pool Capacity Usage for Pool...............................................................95RecoverPoint Protected Capacity....................................................... 95Save Pool Detailed Usage.................................................................... 95Save Pool Usage.................................................................................. 96Snapshot Utilization.............................................................................96Storage Array Capacity........................................................................96Storage Array Capacity Usage............................................................. 96Storage Array Filling Up for ruleset...................................................... 97Storage Array Raw Capacity................................................................ 97Storage Pool Application Growth......................................................... 97Storage Pool Application Usage........................................................... 98Storage Pool Capacity......................................................................... 98Storage Pool Raw Capacity Periodic....................................................98TSM Daily Migration By Storage Pool.................................................. 99TSM Daily Reclamation By Storage Pool..............................................99

Change Management system templates........................................................... 99Avamar Audit User Changes Details..................................................... 99Backup Application Change Details...................................................... 99Backup Application Change Details for ruleset................................... 100Backup Application Change Summary................................................ 100Backup Application Configuration Changes for Pools......................... 100Backup Application Last 10 Changes...................................................100Backup Client Configuration Change Details....................................... 101Backup Client Configuration Change Summary................................... 101Backup Device Configuration Change Details...................................... 101Backup Device Configuration Change Summary................................. 102Backup Group Configuration Change Details...................................... 102Backup Group Configuration Change Summary.................................. 102Backup Job Configuration Change Details.......................................... 102

Contents

Dell EMC Data Protection Advisor Report Reference Guide 5

Backup Job Configuration Change Summary...................................... 103Backup Pool Configuration Change Details......................................... 103Backup Schedule Configuration Change Details................................. 103Backup Schedule Configuration Change Summary............................. 104Backup Server Configuration Change Details..................................... 104BTD Change Details............................................................................104BTD Change Summary........................................................................104BTD Last 10 Change Details................................................................104Celerra Change Details....................................................................... 105Celerra Change Summary................................................................... 105Celerra Configuration Change Details.................................................105Celerra Last 10 Change Details........................................................... 105Data Domain Change Details...............................................................106Data Mover Configuration Change Details.......................................... 106Disk Array Configuration Change Details............................................ 106Fileserver Export Change Details........................................................ 107Filesystem Configuration Change Details............................................107Media Location Change Details...........................................................107Memory Configuration Change Details............................................... 108NetBackup Storage Unit Configuration Change Details...................... 108Network Interface Configuration Change Details................................109RecoverPoint Change Details............................................................. 109RecoverPoint Change Summary..........................................................110RecoverPoint Last 10 Changes............................................................110Symmetrix Change Details.................................................................. 110Symmetrix Change Summary.............................................................. 110Symmetrix Last 10 Change Details....................................................... 111Tape Drive Configuration Change Details.............................................111Tape Library Configuration Change Details.......................................... 111Virtual Host Change Details.................................................................112Virtual Host Configuration Change Summary...................................... 112Virtual Host Disk Configuration Change Details................................... 112Virtual Host Change Details.................................................................113Virtual Host Last 10 Changes Details................................................... 113Virtual Host Network Interface Configuration Change Details............. 113VNX/CLARiiON Change Details.......................................................... 114VNX/CLARiiON Change Summary...................................................... 114VNX/CLARiiON Last 10 Change Details.............................................. 114

Chargeback system templates......................................................................... 115Chargeback Details............................................................................. 115Chargeback Details By Cost Centre.................................................... 116Chargeback Details for Cost Centre.................................................... 116Chargeback History............................................................................. 117Chargeback Summary......................................................................... 117Chargeback Summary By Cost Centre................................................ 117Chargeback Total Cost Breakdown..................................................... 117RecoverPoint Chargeback Details....................................................... 118RecoverPoint Chargeback Summary................................................... 118Chargeback Total Cost of Data Retained ............................................118

Compliance system templates..........................................................................119Backup and Restore KPIs.................................................................... 119Backup Daily Success Rate Against Target......................................... 119Backup Daily Success Rate And Data.................................................. 119Backup Success Rate Against Target................................................. 120Backup Unprotected/Unconfigured Clients........................................ 120Backup Unsuccessful Clients.............................................................. 120

Contents

6 Dell EMC Data Protection Advisor Report Reference Guide

Client Additions.................................................................................. 120Client Changes.................................................................................... 121Client Changes Summary.................................................................... 121Client Deletions................................................................................... 121Client Modifications............................................................................ 121Clients Without Full Backup................................................................ 122Compliance Overview......................................................................... 122Expired Volumes................................................................................. 122One Strike Failed Clients.....................................................................122One Strike Failed Jobs For Specific Client.......................................... 123Restore Rate Statistics for ruleset..................................................... 125Strike Summary.................................................................................. 125Success Rate Against Target for ruleset.............................................125Three Strike Failed Clients..................................................................126Three Strike Failed Clients for ruleset.................................................126Three Strike Failed Jobs For Specific Client....................................... 126Top 10 Most Exposed Jobs................................................................. 128Top 5 Most Exposed Jobs...................................................................129Two Strike Failed Clients.................................................................... 129Two Strike Failed Jobs For Specific Client..........................................130Unprotected Clients............................................................................132Volumes To Be Destroyed...................................................................132

Configuration system templates...................................................................... 132Array Fan-out Ratio............................................................................ 132Avamar Retention Policy Configuration.............................................. 132Backup Client Configuration............................................................... 133Backup Client Count........................................................................... 136Backup Client Count By OS Type....................................................... 136Backup Client Count By Server...........................................................136Backup Device Config.........................................................................136Backup Device Config in Jukebox....................................................... 137Backup Device Count By Server......................................................... 138Backup Device Count By Type............................................................138Backup Device Writable Count........................................................... 138Backup Group Configuration...............................................................138Backup Group Count.......................................................................... 140Backup Group Count By Server.......................................................... 140Backup Job Configuration...................................................................140Backup Jukebox Config....................................................................... 141Backup Jukebox Contents................................................................... 141Backup Pool Configuration................................................................. 142Backup Schedule Configuration.......................................................... 144Backup Server Client Group Mapping................................................. 146Backup Server Configuration.............................................................. 146Backup Server Group Job Mapping.................................................... 148Backup Server Server Count.............................................................. 148Backup Server Server Count By Application....................................... 148Backup Server Server Count By Version.............................................148Celerra Filesystem to LUN Mapping................................................... 148Celerra Replication Visualization......................................................... 149Celerra Storage Pool Configuration.................................................... 149Celerra Volume Configuration............................................................. 149Cluster Configuration......................................................................... 150Cluster Filesystems Not Backed Up ...................................................150Data Domain Boost Details................................................................. 150Data Domain Boost Files..................................................................... 150

Contents

Dell EMC Data Protection Advisor Report Reference Guide 7

Data Domain Mtree To Tenant Unit Mapping...................................... 151Data Domain Network DNS................................................................. 151Data Domain NTP Configuration......................................................... 151Data Domain Replication Configuration............................................... 151Data Domain Tenant Unit Configuration.............................................. 151Data Domain VTL Access Group Configuration................................... 152Data Mover Configuration.................................................................. 152EDL Configuration Options................................................................. 152Enclosure Configuration..................................................................... 153Exported LUNs................................................................................... 153Fibre Channel Device Configuration....................................................153Fibre Channel Device Mapping........................................................... 153Fileserver Exports...............................................................................154Filesystem Mount Configuration......................................................... 154Imported LUNs................................................................................... 155iSCSI iSNS Configuration................................................................... 155iSCSI Portal Configuration..................................................................155Least LUNs Per Port...........................................................................156LUN Capacity Per Node..................................................................... 156LUN Capacity Per Port....................................................................... 156LUN Mapping..................................................................................... 156LUN Source Ports.............................................................................. 156LUN Source Ports for ruleset............................................................. 157LUNs Per Node...................................................................................157LUNs Per Port.................................................................................... 157Mirror Configuration........................................................................... 157MTree Details..................................................................................... 157MTree Quota Configuration................................................................ 157NetBackup Catalog File Backup Configuration................................... 158NetBackup Catalog Backup Configuration..........................................158NetBackup Disaster Recovery Configuration......................................158NetBackup Disk Pool Configuration.................................................... 159NetBackup Disk Volume Configuration............................................... 160NetBackup Global Configuration.........................................................160NetBackup Lifecycle Policy Configuration...........................................161NetBackup Lifecycle Policy Destination.............................................. 161NetBackup Media Server Configuration Details...................................161NetBackup Server Configuration Details............................................ 162NetBackup Storage Server Configuration...........................................162NetBackup Storage Unit Configuration.............................................. 163NetBackup Storage Unit Group Configuration.................................... 163NetBackup VM Rule Configuration..................................................... 164NetWorker Action Configuration........................................................ 164Networker Client Storage Nodes Configuration..................................165Networker Protection Policy Configuration ....................................... 165NetWorker VBA Configuration............................................................166NetWorker Workflow Configuration................................................... 166RecoverPoint Consistency Group Copy Details.................................. 166RecoverPoint Consistency Group Copy Details for Consistency Group...167RecoverPoint Consistency Group Details........................................... 168RecoverPoint Replication Set Configuration.......................................169RecoverPoint RPA Details.................................................................. 169RecoverPoint Splitter Details..............................................................169Remote Mirror Configuration..............................................................170Save Pool Configuration..................................................................... 170

Contents

8 Dell EMC Data Protection Advisor Report Reference Guide

Shared Memory Configuration............................................................170Symmetrix LUN to Data Domain vDisks............................................... 171Tape Library Drive Count By Library....................................................171Tape Library Firmware Summary......................................................... 171Tape Library Model Summary............................................................. 172Tape Library Slot Count By Library..................................................... 172TSM Copy Group Configuration..........................................................172TSM Defined Server Configuration..................................................... 173TSM LAN Free Server Configuration.................................................. 173TSM Management Class Configuration...............................................174TSM Policy Set Configuration............................................................ 175Virtual Data Mover Configuration....................................................... 175Virtual Host Configuration.................................................................. 175Virtual Host Disk Configuration...........................................................176Virtual Host Network Interface Configuration.....................................176Virtualization Manager Configuration..................................................176VNX/CLARiiON RAID Group Configuration.........................................177VNX/CLARiiON Storage Pool Configuration....................................... 177Webserver Configuration.................................................................... 178Xsigo Virtual To Physical Port Mapping.............................................. 178

Data Protection system templates...................................................................178Active Clone Job Details..................................................................... 178Application Exposure for RPO missed ruleset..................................... 179Application Exposure for RTE high ruleset.......................................... 179Avamar Data Retained by Client......................................................... 179Avamar Domain Footprint................................................................... 179Avamar Garbage Collection Jobs........................................................ 179Avamar Replication Summary ............................................................ 180Backup 2-Day Comparison..................................................................180Backup Active Clients..........................................................................181Backup Active Jobs............................................................................. 181Backup Active Groups........................................................................ 182Backup All Clients............................................................................... 182Backup All Groups.............................................................................. 185Backup All Jobs - No Restarts............................................................ 185Backup All Jobs...................................................................................187Backup All Jobs for RMAN Backup Set...............................................190Backup All Jobs for Specific Client..................................................... 192Backup All Large Jobs.........................................................................195Backup All Long Running Jobs............................................................ 197Backup All Slow Jobs......................................................................... 200Backup Average Details For Specific Job........................................... 202Backup Average Full Details By Client................................................ 203Backup Client Configuration for Pool................................................. 203Backup Client De-Dupe Rate Distribution...........................................205Backup Client De-Dupe Ratios........................................................... 205Backup Client Size Monthly Comparison............................................205Backup Client Summary.....................................................................206Backup Clients Not Backed Up.......................................................... 206Backup Cumulative Number Of Completed Jobs................................206Backup Cumulative Size Of Completed Jobs......................................206Backup Data Domain Clone Details.....................................................207Backup Device Configuration for Pool................................................207Backup Failed Clients......................................................................... 208Backup Failed Groups......................................................................... 210Backup Failed Jobs............................................................................. 210

Contents

Dell EMC Data Protection Advisor Report Reference Guide 9

Backup Failed Jobs For Client.............................................................213Backup Failed Jobs for Client for ruleset............................................ 215Backup Failed Jobs for ruleset............................................................215Backup Full History of Specific Job.................................................... 215Backup Group Configuration for Pool................................................. 217Backup Group Job Status Details .......................................................219Backup Group Status......................................................................... 220Backup Group Summary.................................................................... 220Backup Hourly Job Status..................................................................220Backup Job Attempts.........................................................................220Backup Job Attempts for Specific Job............................................... 222Backup Job Change Ratio Aggregate................................................. 223Backup Job Change Ratios.................................................................224Backup Job Change Ratios By Client................................................. 224Backup Job Change Ratios for Client.................................................225Backup Job Configuration for Pool.....................................................225Backup Job Deduplication Ratio for Client......................................... 226Backup Job Details for Specific Volume............................................. 226Backup Job Device Mapping.............................................................. 228Backup Job Error Details....................................................................228Backup Job Error Details for Specific Job.......................................... 229Backup Job Error Distribution............................................................ 229Backup Job Error Summary............................................................... 229Backup Job Media Details.................................................................. 229Backup Job Status By Server.............................................................230Backup Job Summary........................................................................ 230Backup Successful Job Summary for Group Run............................... 230Backup Last 5 Runs of Job................................................................. 231Backup Last n Runs of Client............................................................. 233Backup Last n Successful Runs of Client........................................... 235Backup Last Successful Full Run of Client..........................................237Backup Last Successful Run of Client................................................240Backup Last Successful Run of Job................................................... 242Backup Missed Clients....................................................................... 244Backup Missed Jobs...........................................................................245Backup Open Files..............................................................................247Backup Open Files for Specific Job....................................................248Backup Partial Clients........................................................................ 248Backup Partial Groups....................................................................... 250Backup Problem Clients..................................................................... 250Backup Protected versus Avg Incremental......................................... 251Backup Protected versus Backed Up..................................................251Backup Report Card........................................................................... 251Backup Replication Sync Times by Client........................................... 251Backup Restore Details...................................................................... 252Backup Running Jobs.........................................................................253Backup Server Error Details............................................................... 253Backup Server Group Client Mapping................................................ 254Backup Successful Clients................................................................. 254Backup Successful Groups.................................................................256Backup Successful Jobs.....................................................................257Backup Successful Jobs with failed SLA for ruleset........................... 259Backup to Data Domain - Clients with Low Dedup Ratio.................... 259Backup Top 10 Largest Clients........................................................... 260Backup Top 10 Least Successful Clients............................................ 260Backup Top 10 Longest Running Clients............................................ 260

Contents

10 Dell EMC Data Protection Advisor Report Reference Guide

Backup Top 10 Most Unreliable Clients.............................................. 260Backup Top 10 Smallest Clients......................................................... 260Backup VMs Not Backed Up...............................................................261Clients with Low Dedup Ratio.............................................................261Clone Attempts...................................................................................261Clone Attempts for Specific Clone Operation.................................... 262Clone Job Media Details.....................................................................263Clone Job Media Details for Clone Operation..................................... 263Clone Operations............................................................................... 263Clone Summary..................................................................................264Successful Clone Operations............................................................. 264Cloned Job Details............................................................................. 265Cloned Job Details For Clone Operation.............................................266Exposure Details.................................................................................267Exposure Time Exceeds RPO for ruleset............................................ 267Failed Clone Operations..................................................................... 267Failed Maintenance Job Details..........................................................268Failed Restore Jobs............................................................................269Failed Staging Operations.................................................................. 270Filesystems Not Backed Up................................................................270Historical Successful Jobs..................................................................270Hosts Not Backed Up.........................................................................273Last 10 Failed Backups....................................................................... 273Legato Networker Bootstrap Report..................................................275Maintenance Job Attempts................................................................ 275Maintenance Job Attempts for Specific Job...................................... 276Maintenance Job Details.................................................................... 276Maintenance Job Errors..................................................................... 277Maintenance Job Summary................................................................ 277Missed Restore Jobs.......................................................................... 278NetBackup Backup Job Disk Media Details.........................................279NetBackup Clone Job Disk Media Details........................................... 279NetBackup Failed Restarted Clone Operations...................................279NetBackup Last Restarted Job for Specific Backup Job.................... 280NetBackup Last Restarted Job for Specific Clone Operation.............282NetBackup Last Restarted Job For Specific Job................................282NetBackup Last Restarted Job for Specific Maintenance Job........... 284NetBackup Last Restarted Job for Specific Restore Job................... 285NetBackup Last Restarted Job for Specific Vault Job........................286NetBackup Restore Job Disk Media Details........................................286NetBackup Vault Attempts.................................................................287NetBackup Vault Attempts for Specific Job.......................................288NetBackup Vault Ejects..................................................................... 288NetBackup Vault Job Disk Media Details............................................289NetBackup Vault Jobs........................................................................289NetBackup Vault Preview.................................................................. 290Networker Data Domain Details for Job............................................. 290Networker Data Domain Details for Server......................................... 291Networker Job Size by Client for Data Domain...................................291NetWorker Workflow Job Status....................................................... 292RecoverPoint Protected Capacity......................................................292Restore Job Attempts........................................................................292Restore Job Attempts for Specific Job.............................................. 293Restore Job Error Details................................................................... 294Restore Job Error Details For Specific Job........................................ 294Restore Job Media Details................................................................. 294

Contents

Dell EMC Data Protection Advisor Report Reference Guide 11

Restore Job Summary........................................................................295Restore Top 10 Largest Clients.......................................................... 295Restore Top 10 Least Successful Clients............................................295RMAN Backup Pieces in Set.............................................................. 295RMAN Backup Sets........................................................................... 296Snap Job Details.................................................................................297Snap Job Summary............................................................................ 299Staging Media Details........................................................................ 299Staging Operations............................................................................ 300Staging Summary...............................................................................300Successful Maintenance Job Details.................................................. 300Successful Restore Jobs.................................................................... 301Successful Staging Operations.......................................................... 302Top 10 Backup Clients By Avg Daily Change...................................... 302Top 10 Backup Clients with Best De-Dupe Rate................................. 303Top 10 Backup Clients with Worst De-Dupe Rate...............................303TSM Backup Set Details.................................................................... 303TSM Command Event Details............................................................ 304TSM Database Backup Errors............................................................ 304TSM Database Backups..................................................................... 304TSM Delete Volumes..........................................................................305TSM Expiration Errors....................................................................... 305TSM Expirations................................................................................ 305TSM Failed Migration Jobs................................................................ 306TSM Failed Reclamation Jobs............................................................ 306TSM Migrated Item Count by Storage Pool....................................... 307TSM Migrated Size by Storage Pool.................................................. 307TSM Migration Errors For Specific Job.............................................. 307TSM Migration Jobs...........................................................................307TSM Migration Summary................................................................... 308TSM Move Errors.............................................................................. 308TSM Moves....................................................................................... 308TSM Reclaimed Item Count by Storage Pool..................................... 309TSM Reclaimed Size by Storage Pool................................................ 309TSM Reclamation Errors For Specific Job......................................... 309TSM Reclamation Jobs...................................................................... 309TSM Reclamation Summary............................................................... 310TSM Storage Pool Copies...................................................................310TSM Storage Pool Copy Errors........................................................... 311TSM Successful Migration Jobs.......................................................... 311TSM Successful Reclamation Jobs......................................................311TSM Top 10 Backups with Worst Idle Wait Times............................... 312TSM Top 10 Backups with Worst Media Wait Times........................... 312TSM Top 10 Clients with Worst Idle Wait Times................................. 313TSM Top 10 Clients with Worst Media Wait Times............................. 313Uncloned Backups.............................................................................. 313Vault Job Media Details...................................................................... 315Virtual Hosts Not Backed Up.............................................................. 315VM Protection ................................................................................... 315

Database system templates.............................................................................316All Database Changes......................................................................... 316Connection Status..............................................................................316Control File Details..............................................................................317Database Change Summary................................................................ 317Database Config Changes for ruleset..................................................317Database Details................................................................................. 317

Contents

12 Dell EMC Data Protection Advisor Report Reference Guide

Database Details For Server............................................................... 318Database Last 10 Changes.................................................................. 318Database Parameter Change Details...................................................319Database Parameters......................................................................... 319Database Schema Details For Server..................................................319Database Server Details......................................................................319Database Server Parameter Change Details.......................................320Database Server Parameters............................................................. 320Datafile Configuration Change Details................................................320Datafile Details....................................................................................321Datafile Details for Database...............................................................321Datafile Details for Tablespace...........................................................322Datafile Utilization..............................................................................322Datafile Utilization Trend Chart..........................................................322Datafile Utilization for Tablespace......................................................323Index Configuration Change Details................................................... 323Index Details For Database.................................................................324Index Details For Schema...................................................................324Index Details For Tablespace..............................................................324Index Details for Table........................................................................325Logfile Configuration Change Details................................................. 325Logfile Details.................................................................................... 325Partition Details for Database............................................................ 326Partition Details for Index...................................................................326Partition Details for Table.................................................................. 326Table Configuration Change Details................................................... 327Table Details for Database..................................................................327Table Details for Schema....................................................................327Table Details for Tablespace.............................................................. 328Tablespace Configuration Change Details.......................................... 328Tablespace Details............................................................................. 329Tablespace Details for Database........................................................ 329Tablespace Utilization........................................................................ 329Top 10 Growing Tables by Rows.........................................................330Top 10 Largest Database Tables By Row Count................................. 330Top 10 Largest Database Tables By Size............................................ 330

DPA system templates.................................................................................... 331Agent Errors....................................................................................... 331Agent Reports Processing Rate..........................................................331DPA Client License Details for ruleset.................................................331DPA Collector Log.............................................................................. 331DPA Database Export History............................................................ 332DPA Listener Queues......................................................................... 332DPA Server Logs................................................................................332HTTP Request Performance Statistics.............................................. 333Listener Performance.........................................................................333Node List............................................................................................333Node Topology...................................................................................333Objects with Replication Exposures................................................... 334Processed Agent Report.................................................................... 334Publisher Performance.......................................................................334Received Agent Report...................................................................... 334Replication Alerts by Age by Group.................................................... 334Replication Alerts by Group................................................................335Report History................................................................................... 335Request History................................................................................. 335

Contents

Dell EMC Data Protection Advisor Report Reference Guide 13

Scheduled Report History.................................................................. 336Unsupported Agents.......................................................................... 336

Licensing system templates............................................................................ 336Expired Licenses for ruleset............................................................... 336License Conformance........................................................................ 336License Details................................................................................... 337License Details - Expired.................................................................... 337License Summary............................................................................... 337License Usage.................................................................................... 338Nearly Expired Licenses for ruleset.................................................... 338

Media management system templates............................................................ 338Backup Device Number Of Volumes Mounted By Device................... 338Backup Device Number Of Volumes Mounted By Node......................338Backup Device Number Of Volumes Mounted Daily By Device...........338Backup Jukebox Number Of Volumes Mounted Daily.........................339Empty Media By Jukebox...................................................................339Empty Media By Jukebox RAG...........................................................339Empty Media by Pool and Jukebox.....................................................339Media Age Distribution.......................................................................339Media Contents................................................................................. 340Media Count...................................................................................... 340Media Count Available Volumes By Jukebox...................................... 340Media Count By Jukebox and State.................................................... 341Media Count By Pool.......................................................................... 341Media Count By Pool and State.......................................................... 341Media Count By Pool and State for ruleset.........................................341Media Count By Server.......................................................................341Media Count By State........................................................................342Media Count of Offline Expired Volumes............................................342Media Count of Online/Offline Volumes.............................................342Media Count Volumes Used By Jukebox............................................ 342Media Details..................................................................................... 342Media Details For Cleaning Tapes...................................................... 344Media Details For Empty Volumes......................................................345Media Details For Frozen Volumes..................................................... 346Media Details For Full Volumes...........................................................347Media Details For Offline Expired Volumes.........................................348Media Details for Offline Volumes...................................................... 349Media Details For Online Volumes...................................................... 350Media Details For Partial Volumes...................................................... 351Media Details For Used Volumes........................................................ 352Media Details of Available Volumes.................................................... 354Media Details Top 10 Oldest Volumes.................................................355Media Details With Retention Over 8 Years....................................... 356Media Retention Distribution..............................................................357Media Size Distribution...................................................................... 357Media Summary................................................................................. 357Media Usage...................................................................................... 357Media Usage By Pool......................................................................... 358Media Usage By Server......................................................................358Media Reclamation Distribution......................................................... 358RPO Violation Details......................................................................... 358Root Cause........................................................................................ 358Root Cause for CG Details................................................................. 359Root Cause for Job Details.................................................................359TSM DR Media...................................................................................359

Contents

14 Dell EMC Data Protection Advisor Report Reference Guide

Volume Expiration Report.................................................................. 360Operations system templates......................................................................... 360

Backup Device Availability..................................................................360Backup Device Availability By Server................................................. 360Backup Device Availability RAG..........................................................360Backup Mount Requests.................................................................... 360Empty Media plus Device Availability.................................................. 361

Performance system templates....................................................................... 361Aggregate Disk Activity...................................................................... 361Aggregate Disk Operations................................................................. 361Aggregate Disk Performance............................................................. 362Aggregate Fibre Channel Device Performance...................................362Aggregate Fibre Channel Port Performance...................................... 362Aggregate LUN Performance.............................................................362Aggregate Processor Utilization.........................................................362Aggregate Tape Drive Performance................................................... 362Aggregate Tape Library Drive Performance....................................... 363Aggregate Virtual Fibre Channel Port Performance........................... 363Backup Client Performance Distribution............................................ 363Backup Client Slowest/Fastest Jobs for Client.................................. 363Backup Device Avg/Max Throughput by Device................................ 365Backup Device Performance Summary.............................................. 365Backup Device Performance Summary By Device..............................366Backup Device Throughput Aggregate...............................................366Backup Device Throughput by Device................................................366Backup Device Throughput for Device............................................... 366Backup Top 10 Fastest Clients........................................................... 367Backup Top 10 Slowest Clients...........................................................367Celerra Replication Performance........................................................367Celerra Replication Performance Summary........................................368Data Domain Average Replicated Capacity........................................ 368Data Domain Data Transfer Rate........................................................368Data Domain Replication Time Lag .................................................... 368Disk Activity By Disk.......................................................................... 369Disk Activity By Host......................................................................... 369Disk Operations by Disk..................................................................... 369Disk Operations by Host.....................................................................369Disk Performance By Disk..................................................................369Disk Performance By Host................................................................. 370DPA Reporter Median Report Run Time.............................................370Fibre Channel Device Performance.................................................... 370Fibre Channel Device Performance By Node......................................370Fibre Channel Device Performance Summary.................................... 370Fibre Channel Port Performance.........................................................371Fibre Channel Port Performance By Node.......................................... 371Fibre Channel Port Performance By Port............................................371Fileserver Average Response Times....................................................371Fileserver Cache Hit Rates................................................................. 372Fileserver Cache Hit Rates By Node...................................................372Fileserver Client Performance............................................................ 372Fileserver Data Throughput................................................................372Fileserver Data Throughput By Protocol............................................ 372Fileserver Filesystem Performance.................................................... 373Fileserver Operations......................................................................... 373Fileserver Operations By Protocol......................................................373Fileserver Operations with Direction.................................................. 373

Contents

Dell EMC Data Protection Advisor Report Reference Guide 15

Fileserver Performance Summary...................................................... 374Filesystem Disk Performance............................................................. 374Filesystem Operations By Partition.................................................... 374Filesystem Operations by Direction....................................................375Filesystem Performance Summary.....................................................375Filesystem Throughput by Partition................................................... 375Filesystem Throughput with Direction................................................375Host Performance..............................................................................376Host Performance During Backup...................................................... 376Host Performance For Client..............................................................376LUN Operations..................................................................................377LUN Operations By LUN.....................................................................377LUN Performance.............................................................................. 377LUN Performance By Node................................................................ 377LUN Throughput................................................................................ 378LUN Throughput By LUN................................................................... 378Mirror Performance........................................................................... 378Process Memory Usage For Specific Process.................................... 378Processor Utilization By CPU.............................................................378Processor Utilization By Node............................................................379RecoverPoint Consistency Group Data Lag........................................379RecoverPoint Consistency Group High Load Ratio.............................379RecoverPoint Consistency Group Incoming Write Rates....................379RecoverPoint Consistency Group Incoming Write Rates for Last Day380RecoverPoint Consistency Group Journal Lag................................... 380RecoverPoint Consistency Group Throughput................................... 380RecoverPoint Consistency Group Time Lag....................................... 380RecoverPoint Consistency Group Transaction Lag............................. 381RecoverPoint RPA Compression.........................................................381RecoverPoint RPA Latency................................................................ 381RecoverPoint RPA Throughput.......................................................... 382RecoverPoint RPA Writes.................................................................. 382RecoverPoint RPA Site Compression.................................................382RecoverPoint RPA Site Latency.........................................................382RecoverPoint RPA Site Packet Loss.................................................. 382RecoverPoint RPA Site Throughput...................................................383RecoverPoint RPA WAN Throughput.................................................383RecoverPoint RPA WAN Throughput for Last Day.............................383Remote Mirror Performance.............................................................. 383Server Performance During Backup................................................... 384Solid State Storage Performance.......................................................384Tape Drive Performance By Drive...................................................... 384Tape Drive Performance By Node...................................................... 384Tape Drive Performance Summary.................................................... 385Tape Drive Throughput on Server During Backup.............................. 385Tape Library Drive Performance........................................................ 385Tape Library Drive Performance By Node.......................................... 385Tape Library Drive Performance Summary.........................................386Total Throughput............................................................................... 386Virtual Fibre Channel Port Performance By Node.............................. 386Virtual Fibre Channel Port Performance By Port................................386Virtual Host Disk Performance........................................................... 387Virtual Host Network Interface Performance..................................... 387Virtual Host Processor Utilization.......................................................387Webserver Response Time................................................................. 387Xsigo Aggregate Infiniband Port Performance................................... 388

Contents

16 Dell EMC Data Protection Advisor Report Reference Guide

Xsigo Infiniband Port Performance by Node...................................... 388Xsigo Infiniband Port Performance by Port........................................388Xsigo Virtual Port Queue Depth Summary..........................................388

Provisioning system templates........................................................................389Fileserver Top 10 Most Available Aggregates..................................... 389

Recoverability system templates.................................................................... 389All Nodes Of Type Symmatrix CG...................................................... 389Masking Configuration for Storage Array...........................................389Masking Configuration for Initiator.................................................... 390MirrorView Configuration...................................................................390MirrorView/A Performance................................................................ 391MirrorView/A Performance for CG.....................................................391RDF Configuration............................................................................. 392RDF Configuration for CG..................................................................392RDF Configuration for DG.................................................................. 393RDFG Configuration...........................................................................393RDFG Performance............................................................................393Recoverability Detailed Exposures..................................................... 394Recoverability Detailed Exposures for ruleset.................................... 394Recoverability Replicated Object Process View................................. 395Recoverability Replicated Object Storage Mapping........................... 395Recoverability Excludes..................................................................... 396Recoverability Exposures Summary................................................... 396Recoverability Gaps........................................................................... 397Recoverability Host Analysis Status................................................... 397Recoverability Obsolete Recovery Points.......................................... 398Recoverability Replication Configuration........................................... 398Server to Storage Configuration........................................................ 398Recoverability Server To Storage Mappings Topology.......................399Recoverability Status.........................................................................399Recoverability Status By Object........................................................ 399Recoverability Status Monitor By Client............................................ 399Recoverability Storage To Server Mappings Topology.......................399Recoverability Tasks ......................................................................... 400Recoverability Unprotected Nodes.................................................... 400Recoverability Visualization................................................................400Recoverability Visualization Details.................................................... 400Remote Replication RPO for MV/A.................................................... 401Remote Replication RPO for SRDF/A.................................................401Remote Replication RPO forecast for MV/A...................................... 401Remote Replication RPO forecast for SRDF/A...................................401Replication RPO Compliance..............................................................402Storage Replication Status................................................................ 402

Resource Utilization system templates........................................................... 402Aggregate Network Interface Performance....................................... 403Aggregate Virtual Network Interface Performance............................ 403BTD Storage Utilization By Node....................................................... 403Backup Client Occupancy.................................................................. 403Backup Client Occupancy by Pool......................................................403Backup Device Utilization by Device.................................................. 403Backup Server Utilization...................................................................404CG Utilization.....................................................................................404Client Occupancy Summary............................................................... 404Client Occupancy Trend.....................................................................404Current Memory Usage By Node....................................................... 405Data Domain Average Hourly Data Ingested.......................................405

Contents

Dell EMC Data Protection Advisor Report Reference Guide 17

Data Domain Boost Statistics.............................................................405Data Domain Boost Storage Unit Statistics........................................405Data Domain Client Deduplication Ratio.............................................405Data Domain Compression Factor......................................................406Data Domain Compression Overview................................................. 406Data Domain Compression Ratio Count............................................. 406Data Domain Daily Compression Statistics......................................... 407Data Domain Data Ingested................................................................ 407Data Domain Data Written To.............................................................407Data Domain DeDuplication Ratio.......................................................407Data Domain File Distribution By Count .............................................407Data Domain File Distribution By Count per MTree............................ 408Data Domain File Distribution By Size ............................................... 408Data Domain File Distribution By Size per MTree .............................. 409Data Domain Filesystem Utilization ................................................... 409Data Domain Filesystem Utilization for Warning/Critical Systems..... 409Data Domain Filesystem Utilization Status Count............................... 410Data Domain Group Deduplication Ratio ............................................ 410Data Domain Low System Compression Ratio Trend.......................... 410Data Domain Reduction Ratios........................................................... 410Data Domain System Utilization.......................................................... 411Data Domain Utilization....................................................................... 411Data Domain Tier Utilization................................................................ 411DataProtector Database Usage........................................................... 411DataProtector System Dynamics........................................................412EDL 3D Compression Ratio.................................................................412EDL 3D DeDupe Queue....................................................................... 412EDL 3D Total Reduction Ratio............................................................ 412Fabric Utilization.................................................................................412Fibre Channel Port Utilization............................................................. 413Filesystem Aggregate Utilization.........................................................413Filesystem Average Disk Activity........................................................ 413Filesystem Average Disk Activity for ruleset....................................... 413Filesystem Disk Activity...................................................................... 413Filesystem Peak Snapshot Utilization................................................. 414Filesystem Snapshot Utilization.......................................................... 414Filesystem Utilization..........................................................................414Filesystem Utilization By Node........................................................... 414Filesystem Utilization By Partition...................................................... 415Filesystem Utilization Current.............................................................415Filesystem Utilization for ruleset.........................................................415HP VLS Capacity Utilization Trend..................................................... 415HP VLS Throughput............................................................................415MTree Daily Compression Statistics................................................... 416MTree Quota Utilization..................................................................... 416MTree Physical Capacity Statistics ................................................... 416MTree Physical Capacity Statistics Trend.......................................... 416Memory Utilization............................................................................. 416Memory Utilization By Node............................................................... 417Memory Utilization Current.................................................................417Network Interface Performance By Interface..................................... 417Network Interface Performance By Node........................................... 417Network Interface Performance Summary..........................................417Network Interface Utilization By Interface and Direction....................418NetWorker VBA Utilization................................................................. 418Process CPU Utilization......................................................................418

Contents

18 Dell EMC Data Protection Advisor Report Reference Guide

Process CPU Utilization For Specific Process.................................... 418Process Memory Usage......................................................................419RecoverPoint Journal Utilization.........................................................419System Statistics RAG....................................................................... 419TSM Client Occupancy Summary....................................................... 419TSM Database Utilization...................................................................420TSM Storage Pool Utilization.............................................................420Tape Library Aggregate Utilization.....................................................420Tape Library Aggregate Utilization Trend...........................................420Tape Library Capacity Utilization....................................................... 420Tape Library Compression Ratio......................................................... 421Tape Library Deduplication Ratio........................................................ 421Tape Library Slot Utilization Trend..................................................... 421Tape Library Throughput.................................................................... 421Tape Library Usage By Library........................................................... 422Tape Library Utilization...................................................................... 422Tape Library Utilization Trend............................................................ 422Tape Library Volume Utilization Trend................................................422Top 10 Offending Clients....................................................................423Top 10 Offending Jobs....................................................................... 423Top 5 Busiest Servers........................................................................ 423VTL Aggregate Storage Utilization.....................................................423Virtual Fibre Channel Port Utilization................................................. 423Virtual Host Memory Utilization......................................................... 424Virtual Network Interface Performance By Interface......................... 424Virtual Network Interface Performance By Node............................... 424Virtual Network Interface Performance Summary..............................424Xsigo Infiniband Port Utilization......................................................... 425

ROI system templates.....................................................................................425Deduplication Cost Savings................................................................425Deduplication ROI Trend.................................................................... 425

Scheduling system templates..........................................................................426Active Clone Job Distribution............................................................. 426Backup Active Job Distribution.......................................................... 426Backup Client Schedule..................................................................... 426Backup Device Scheduling................................................................. 428Backup Device Shared Usage.............................................................428Backup Device Usage.........................................................................429Backup Group Forecast......................................................................429Backup Job Distribution..................................................................... 429Backup Job Distribution By Media Server.......................................... 429Backup Job Forecast..........................................................................429Backup Job Forecast versus Actual....................................................430Backup Job Forecast versus Actual Summary....................................430Backup Job Schedule.........................................................................430Backup Job Schedule For Specific Client........................................... 433Backup Size Distribution.................................................................... 435Backup Size Distribution By Media Server......................................... 435Maintenance Job Schedule................................................................ 435TSM Server Side Process Scheduling................................................ 436TSM Storage Pool Migration Schedule.............................................. 436TSM Storage Pool Reclamation Schedule.......................................... 436

Service Level Management system templates................................................ 436Backup Daily Success Rate................................................................ 436Backup Jobs with Last Resolution...................................................... 437Clone SLA Status............................................................................... 439

Contents

Dell EMC Data Protection Advisor Report Reference Guide 19

Backup SLA Summary........................................................................440Backup SLA Summary By Client.........................................................440Restore Jobs with Last Resolution......................................................441

Status system templates.................................................................................442ACSLS ACS Status............................................................................ 443ACSLS Lock Status............................................................................443ACSLS Port Status............................................................................ 443ACSLS Server Status.........................................................................444Backup Client Physical Occupancy.................................................... 444Backup Client Status..........................................................................444Backup Device Downed Devices.........................................................444Backup Device Errors.........................................................................445Backup Device Status........................................................................ 445Backup Pool Status............................................................................446Backup Server Error Summary........................................................... 447Backup Server Status.........................................................................447Backup Unavailable Device Count for ruleset..................................... 447Battery Status....................................................................................447Battery Summary............................................................................... 447BTD Capacity..................................................................................... 448BTD Health Status............................................................................. 448BTD Usage......................................................................................... 448Card Status........................................................................................448Celerra Replication Status..................................................................449Client Occupancy...............................................................................449Client Occupancy by Server Trend.....................................................449Cluster Status ................................................................................... 449Collector Status for ruleset................................................................450Data Domain Active Streams............................................................. 450Data Domain Boost Option Status......................................................450Data Domain Filesystem Archive Unit Status..................................... 450Data Domain Filesystem Cleaning Status............................................451Data Domain Filesystem Options........................................................ 451Data Domain Modes............................................................................451Data Domain System Capacity Licenses............................................. 451Data Domain System Licenses............................................................451Data Domain System User Status...................................................... 452DataProtector Database Status......................................................... 452DataProtector Datafile Usage............................................................ 452DataProtector Purge Preview............................................................ 452DataProtector Record File Usage.......................................................453DataProtector Service Status............................................................ 453Device Availability for ruleset............................................................. 453Disk Array Status............................................................................... 453Disk Failed for ruleset.........................................................................454Disk Status.........................................................................................454EDL Failover Status........................................................................... 454Estimated Protected Backup Capacity...............................................454Estimated Protected Backup Capacity Details................................... 455Fan Status......................................................................................... 455Fan Summary.....................................................................................456Fibre Channel Port Status..................................................................456Fibre Channel Port Summary By Node...............................................456Fileserver Status................................................................................ 457Filesystem Disk Status....................................................................... 457Filesystem Quota Status.................................................................... 457

Contents

20 Dell EMC Data Protection Advisor Report Reference Guide

Filesystem Snapshot Status...............................................................458Filesystem Status...............................................................................458Filesystem Status Summary...............................................................458Host Status........................................................................................459IP Autonegotiation Mismatch for ruleset............................................459IP Duplex Mismatch for ruleset.......................................................... 459iSCSI Status...................................................................................... 460LUN Status........................................................................................ 460MTree Retention Lock Status............................................................ 460Mirror Status...................................................................................... 461NetBackup Device Cleaning Status.....................................................461NetBackup Disk Pool Status............................................................... 461NetBackup Disk Volume Status..........................................................462NetBackup SLP Backlog by Image..................................................... 462NetBackup SLP Images Status ..........................................................462NetBackup SLP Jobs Status ............................................................. 463NetBackup SLP Status by Image ...................................................... 463NetBackup Storage Server Status..................................................... 464Network Interface Link Pair............................................................... 464Network Interface Link Pair Autonegotiation Status.......................... 464Network Interface Link Pair Duplex Status........................................ 465Network Interface Status.................................................................. 465Orphaned LUNs................................................................................. 466Process Count................................................................................... 466Process Count By Host......................................................................466Process Count Current...................................................................... 466Process Status...................................................................................466Processor Status................................................................................467Processor Status Details.................................................................... 467PSU Status........................................................................................ 467PSU Summary....................................................................................467RecoverPoint Consistency Group Copy Status.................................. 467RecoverPoint Consistency Group Copy Status for Active RPAs........ 468RecoverPoint Event Details............................................................... 469RecoverPoint Event Summary........................................................... 469RecoverPoint Last 10 Event Details................................................... 469RecoverPoint RPA Active Consistency Groups.................................. 470RecoverPoint Volumes....................................................................... 470RecoverPoint Volumes for Replication Sets....................................... 470Remote Mirror Status......................................................................... 471Replication Status...............................................................................471Tape Drive Cleaning Summary............................................................ 471Tape Drive Count By State................................................................. 471Tape Drive Count By Status............................................................... 472Tape Drive Status...............................................................................472Tape Library CAP Status....................................................................472Tape Library CAP Status Summary.................................................... 473Tape Library Empty Volume Count.....................................................473Tape Library Slot Status.....................................................................473Tape Library Status Details................................................................ 473Tape Library Status Summary............................................................ 474Tape Library Volume Status............................................................... 474Thermometer Status.......................................................................... 475Thermometer Summary..................................................................... 475Thermometer Trend........................................................................... 475Thermometer Trend for Specific Thermometer..................................475

Contents

Dell EMC Data Protection Advisor Report Reference Guide 21

TSM Client Filespaces........................................................................476TSM Client Occupancy...................................................................... 476TSM Database Status.........................................................................477TSM Database Usage......................................................................... 477TSM Database Volume Status............................................................ 477TSM Defined Server Status............................................................... 478TSM Identify Duplicate Process Details..............................................478TSM Identify Duplicate Process Trend............................................... 478TSM Replication Node Status............................................................ 479TSM Replication Process Details........................................................479TSM Replication Process Summary................................................... 480TSM Device Path Status....................................................................480TSM Filespace Summary.................................................................... 481TSM LAN Free Server Status............................................................. 481TSM Recovery Log Usage.................................................................. 481Virtual Host Top 10 Longest Time Since Last Power On..................... 481VTL Status......................................................................................... 482Xsigo Infiniband Port Status...............................................................482

Troubleshooting system templates................................................................. 482Aggregate Fibre Channel Port Errors................................................. 482Fibre Channel Port Errors By Node.................................................... 482Fibre Channel Port Errors By Port......................................................483Network Interface Errors................................................................... 483Network Interface Errors By Interface............................................... 483Network Interface Errors By Interface for ruleset..............................484Network Interface Errors By Node.....................................................484RecoverPoint RPA Packet Loss......................................................... 484Tape Drive Error Count...................................................................... 484Tape Drive Error Count By Node........................................................485Tape Drive Error Trend...................................................................... 485Tape Library Errors............................................................................ 485

Viewlet system templates............................................................................... 485Backup KPIs.......................................................................................486Backup Size Distribution for Backup KPIs.......................................... 486Data Backed Up Daily for Backup KPIs...............................................486Data Collection Agent Errors..............................................................486Data Collection Agent Health............................................................. 486Data Collection Agents Down.............................................................486Objects Not Meeting RPOs................................................................ 487RecoverPoint Protected Capacity by System.................................... 487RecoverPoint Protected Capacity by CG........................................... 487Unprotected Clients for Backup KPIs................................................. 487

Contents

22 Dell EMC Data Protection Advisor Report Reference Guide

Preface

As part of an effort to improve its product lines, EMC periodically releases revisions of its softwareand hardware. Therefore, some functions described in this document might not be supported by allversions of the software or hardware currently in use. The product release notes provide the mostup-to-date information on product features.

Contact your EMC technical support professional if a product does not function properly or doesnot function as described in this document.

Note: This document was accurate at publication time. Go to EMC Online Support (https://support.emc.com) to ensure that you are using the latest version of this document.

Purpose

This document provides a reference of all the predefined system reports that are installed withDPA.

ISO 9001 certification

The management system governing the design and development of this product is ISO 9001:2015certified.

Audience

This document is intended for system administrators. Readers of this document must be familiarwith the following tasks:

l Identifying the different hardware and software components that make up the backup andreplication environment.

l Following procedures to configure backup and replication operations.

l Following guidelines to locate problems and implement solutions.

Revision history

The following table presents the revision history of this document.

Table 1 Revision history

Revision Date Description

01 May 20, 2019 First release of this document for DPA 19.1.

02 October 16, 2019 Updates to the following section:Chargeback Summary on page 117

Related documentation

The DPA documentation set includes the following publications:

l Data Protection Advisor Custom Reporting Guide

l Data Protection Advisor Data Collection Reference Guide

l Data Protection Advisor Installation and Administration Guide

l Data Protection Advisor Migrator Technical Notes

l Data Protection Advisor online help system

Dell EMC Data Protection Advisor Report Reference Guide 23

l Data Protection Advisor Product Guide

l Data Protection Advisor Release Notes

l Data Protection Advisor Report Reference Guide

l Programmers' Guide to Using Data Protection Advisor REST API

l Data Protection Advisor Security Configuration Guide

l Data Protection Advisor Software Compatibility Guide

l Other Technical Notes/White Papers

Special notice conventions that are used in this document

EMC uses the following conventions for special notices:

NOTICE Identifies content that warns of potential business or data loss.

Note: Contains information that is incidental, but not essential, to the topic.

Typographical conventions

EMC uses the following type style conventions in this document:

Table 2 Style conventions

Bold Used for names of interface elements, such as names of buttons,fields, tab names, and menu paths (what the user specifically selectsor clicks)

Italic Used for full titles of publications that are referenced in text

Monospace Used for:

l System code

l System output, such as an error message or script

l Pathnames, file names, prompts, and syntax

l Commands and options

Monospace italic Used for variables

Monospace bold Used for user input

[ ] Square brackets enclose optional values

| Vertical bar indicates alternate selections - the bar means “or”

{ } Braces enclose content that the user must specify, such as x or y orz

... Ellipses indicate non-essential information that is omitted from theexample

Where to get help

EMC support, product, and licensing information can be obtained as follows:

Product information

For documentation, release notes, software updates, or information about EMC products, go toEMC Online Support at https://support.emc.com.

Technical support

Go to EMC Online Support at https://support.emc.com, and click Service Center. Several optionsfor contacting EMC Technical Support appear on the site. Note that to open a service request, you

Preface

24 Dell EMC Data Protection Advisor Report Reference Guide

must have a valid support agreement. Contact your EMC sales representative for details aboutobtaining a valid support agreement or with questions about your account.

Online communities

Go to the EMC Community Network at https://community.emc.com for peer contacts,conversations, and content on product support and solutions. Interactively engage online withcustomers, partners, and certified professionals for all EMC products.

Your comments

Your suggestions help to improve the accuracy, organization, and overall quality of the userpublications. Send your opinions of this document to [email protected].

Preface

Dell EMC Data Protection Advisor Report Reference Guide 25

Preface

26 Dell EMC Data Protection Advisor Report Reference Guide

CHAPTER 1

Introduction

This chapter contains the following topic:

l Overview............................................................................................................................... 28

Dell EMC Data Protection Advisor Report Reference Guide 27

OverviewDPA includes several hundred predefined system templates and control panels, which you can useto run reports on selected users in your backup and replication environment. Use these systemtemplates to quickly and easily retrieve information and monitor your environment.

This document provides reference information on the predefined system templates organized asfollows:

l The reports that are available by object supported by DPA.

l The system templates that are available in DPA and the reports within each system template.

l The reports that are available through the Run Reports area and the system template that isused to generate the report.

Introduction

28 Dell EMC Data Protection Advisor Report Reference Guide

CHAPTER 2

DPA Reports

This chapter contains the following topics:

l Overview............................................................................................................................... 30l Run Reports area menu items............................................................................................... 30

Dell EMC Data Protection Advisor Report Reference Guide 29

OverviewThis appendix lists the reports that are available through the Run Reports area and shows thesystem template that is used to generate the report. Reports by System Template on page 69provides detailed information on the system templates available in DPA.

Reports provide detailed information derived from the various objects in the DPA object inventory.When a report menu item is selected, the appropriate objects are passed to a system templatewhich defines how the report is generated. The report results are then displayed. You can runreports on group objects or on single objects. When generating a report from a group object, allobjects within the group are passed to the system template and the report results include data forall of the hosts within that group.

The contents of the Run Reports area that displays varies depending on the object that isselected.

Run Reports area menu itemsThe following table lists the available Run Reports area menu items.

Table 3 Run Reports area menu items

Run Reports area menu Item System Template used to generate thereport

Access Group Configuration Data Domain VTL Access Group Configurationon page 152

ACSLS ACS Status ACSLS ACS Status on page 443

ACSLS Lock Status ACSLS Lock Status on page 443

ACSLS Port Status ACSLS Port Status on page 443

ACSLS Server Status ACSLS Server Status on page 444

Action Configuration NetWorker Action Configuration on page 164

Active Clients Backup Active Clients on page 181

Active Clone Job Distribution Active Clone Job Distribution on page 426

Active Clones Active Clone Job Details on page 178

Active Job Distribution Backup Active Job Distribution on page 426

Active Jobs Backup Active Jobs on page 181

Active Streams Data Domain Active Streams on page 450

Aggregate Data Change Ratio Backup Job Change Ratio Aggregate on page223

Aggregate Device Throughput Backup Device Throughput Aggregate onpage 366

Aggregate Disk Activity Aggregate Disk Activity on page 361

Aggregate Disk Performance Aggregate Disk Performance on page 362

DPA Reports

30 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Aggregate Fibre Channel Device Performance Aggregate Fibre Channel Device Performanceon page 362

Aggregate Fibre Channel Port Errors Aggregate Fibre Channel Port Errors on page482

Aggregate Fibre Channel Port Performance Aggregate Fibre Channel Port Performanceon page 362

Aggregate Infiniband Port Performance Xsigo Aggregate Infiniband Port Performanceon page 388

Aggregate Network Interface Errors Network Interface Errors on page 483

Aggregate Network Interface Performance Aggregate Network Interface Performance onpage 403

Aggregate Processor Utilization Aggregate Processor Utilization on page 362

Aggregate Status NetBackup Device Cleaning Status on page461

Aggregate Tape Drive Performance Aggregate Tape Drive Performance on page362

Aggregate Utilization Filesystem Aggregate Utilization on page 413

Aggregate Utilization By Aggregate Network Interface Performance By Interfaceon page 417

Aggregate Virtual Fibre Channel PortPerformance

Aggregate Virtual Fibre Channel PortPerformance on page 363

Aggregate Virtual Network InterfacePerformance

Aggregate Virtual Network InterfacePerformance on page 403

Agent Reports Processing Rate Agent Reports Processing Rate on page 331

Alerts During Backup Analysis Events During Backup

All Media Details on page 342

All Clients Backup All Clients on page 182

All Groups Backup All Groups on page 185

All Jobs Backup All Jobs on page 187

All Jobs - No Restarts Backup All Jobs - No Restarts on page 185

All Maintenance Jobs Maintenance Job Details on page 276

Application Configuration Changes for Pools Backup Application Configuration Changes forPools on page 100

Application Error Details Backup Server Error Details on page 253

Application Growth Application Growth on page 86

Application Usage Application Usage on page 86

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 31

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Application Usage Storage Pool Application Usage on page 98

Array Fan-out Ratio Array Fan-out Ratio on page 132

Attempts Clone Attempts for Specific Clone Operationon page 262

Attempts Restore Job Attempts for Specific Job onpage 293

Audit User Changes Avamar Audit User Changes Details on page99

Available Media Details of Available Volumes on page354

Available Volumes Media Details of Available Volumes on page354

Average Hourly Data Ingested Data Domain Average Hourly Data Ingested onpage 405

Average Job Run Backup Average Details For Specific Job onpage 202

Backup and Restore KPIs Backup and Restore KPIs on page 119

Backup Client Deduplication Ratio Details Backup Client De-Dupe Ratios on page 205

Backup Client Occupancy Backup Client Occupancy on page 403

Backup Device Status Backup Device Status on page 445

Backup Job Details for Volume Backup Job Details for Specific Volume onpage 226

Backup Job Devices Backup Job Device Mapping on page 228

Backup Job Error Details Backup Job Error Details on page 228

Backup Job Error Distribution Backup Job Error Distribution on page 229

Backup Job Error Summary Backup Job Error Summary on page 229

Backup Server Details Backup Server Configuration on page 146

Backup Jobs with Last Resolution Backup Jobs with Last Resolution on page437

Battery Configuration Battery Configuration on page 70

Battery Status Battery Status on page 447

Boost Files Data Domain Boost Files on page 150

Boost File Replication Statistics Data Domain Boost Statistics on page 405

Boost File Unit Statistics Data Domain Boost Storage Unit Statistics onpage 405

DPA Reports

32 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Boost Option Status Data Domain Boost Option Status on page450

Capacity Overview Network Interface Configuration on page 81

Capacity Overview for Block Capacity Overview for Block on page 91

Capacity Overview for File Capacity Overview for File on page 91

Capacity Utilization HP VLS Capacity Utilization Trend on page415

Card Configuration Card Configuration on page 70

Card Status Card Status on page 448

Catalog Backup Configuration NetBackup Catalog Backup Configuration onpage 158

Catalog File Backup Configuration NetBackup Catalog File Backup Configurationon page 158

CG Utilization CG Utilization on page 404

Change Details BTD Change Details on page 104

Change Ratios By Client Backup Job Change Ratios By Client on page224

Change Ratios By Job Backup Job Change Ratios for Client on page225

Change Ratios By Job Backup Job Change Ratios on page 224

Chargeback Details By Cost Centre Chargeback Details By Cost Centre on page116

Chargeback Details RecoverPoint Chargeback Details on page118

Chargeback Details By Client Chargeback Details on page 115

Chargeback Total Cost of Data Retained Chargeback Total Cost of Data Retained onpage 118

Chargeback Summary Chargeback Summary on page 117

Chargeback Summary RecoverPoint Chargeback Summary on page118

Chargeback Summary By Cost Centre Chargeback Details By Cost Centre on page116

Cleaning Tapes Media Details For Cleaning Tapes on page 344

Client Configuration Backup Client Configuration for Pool on page203

Client Configuration Change Details Backup Client Configuration Change Detailson page 101

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 33

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Client Configuration Changes Client Changes on page 121

Client Count Backup Client Count on page 136

Client Count By OS Type Backup Client Count By OS Type on page 136

Client Count By Server Backup Client Count By Server on page 136

Client Details Backup Client Configuration on page 133

Client Details Backup Server Group Client Mapping on page254

Client Details Chargeback Details for Cost Centre on page116

Client Occupancy by Pool Backup Client Occupancy by Pool on page403

Client Occupancy by Server Trend Client Occupancy by Server Trend on page449

Client Occupancy Details Client Occupancy on page 449

Client Occupancy Summary Client Occupancy Summary on page 404

Client Occupancy Trend Client Occupancy Trend on page 404

Client Schedule Backup Client Schedule on page 426

Client Status Backup Client Status on page 444

Client Storage Nodes Configuration Networker Client Storage NodesConfiguration on page 165

Client Summary Backup Client Summary on page 206

Client Usage Statistics Avamar Client Usage Statistics on page 86

Clients Not Backed Up Backup Clients Not Backed Up on page 206

Clients with Low Dedup Ratio Clients with Low Dedup Ratio on page 261

Clients Without Full Backup Clients Without Full Backup on page 122

Replication Sync Times by Client Backup Replication Sync Times by Client onpage 251

Clone Operations Clone Operations on page 263

Clone Summary Clone Summary on page 264

Clone SLA Status Clone SLA Status on page 439

Cloned Backups Cloned Job Details on page 265

Cloned Backups Cloned Job Details For Clone Operation onpage 266

Cluster Configuration Cluster Configuration on page 150

Cluster Filesystems Not Backed Up Cluster Filesystems Not Backed Up

DPA Reports

34 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Cluster Status Cluster Status on page 449

Collector Errors DPA Client License Details for ruleset on page331

Collector Logs DPA Collector Log on page 331

Compression Factor Data Domain Boost Storage Unit Statistics onpage 405

Compression Ratio EDL 3D Compression Ratio on page 412

Configuration Webserver Configuration on page 178

Configuration Options EDL Configuration Options on page 152

Connection Status Connection Status on page 316

Consistency Group Copy Details RecoverPoint Consistency Group CopyDetails on page 166

Consistency Group Copy Details RecoverPoint Consistency Group CopyDetails for Consistency Group on page 167

Consistency Group Copy Status RecoverPoint Consistency Group Copy Statuson page 467

Consistency Group Copy Status Details RecoverPoint Consistency Group Copy Statusfor Active RPAs on page 468

Consistency Group Data Lag RecoverPoint Consistency Group Data Lag onpage 379

Consistency Group Details RecoverPoint Consistency Group Details onpage 168

Consistency Group High Load Ratio RecoverPoint Consistency Group High LoadRatio on page 379

Consistency Group Journal Lag RecoverPoint Consistency Group Journal Lagon page 380

Consistency Group Incoming Write Rates RecoverPoint Consistency Group IncomingWrite Rates on page 379

Consistency Group Incoming Write Rates forLast Day

RecoverPoint Consistency Group IncomingWrite Rates for Last Day on page 380

Consistency Group Throughput RecoverPoint Consistency Group Throughputon page 380

Consistency Group Time Lag RecoverPoint Consistency Group Time Lag onpage 380

Consistency Group Transaction Lag RecoverPoint Consistency Group TransactionLag on page 381

Control File Configuration Control File Details on page 317

CPU Utilization Process CPU Utilization on page 418

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 35

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

CRR Consistency Group Details RecoverPoint Consistency Group Details onpage 168

Daily Compression Statistics Data Domain Daily Compression Statistics onpage 407

Daily Migration By Storage Pool TSM Daily Migration By Storage Pool on page99

Daily Reclamation By Storage Pool TSM Daily Reclamation By Storage Pool onpage 99

Daily Staging By Storage Pool Backup Daily Staging By Storage Pool onpage 87

Daily Success Rate Backup Daily Success Rate on page 436

Daily Success Rate Against Target Backup Daily Success Rate Against Target onpage 119

Data Backed Up Daily Backup Data Backed Up Daily on page 87

Data Backed Up Daily By Device Backup Data Backed Up Daily By Device onpage 87

Data Backed Up Daily By Media Server Backup Data Backed Up Daily By MediaServer on page 88

Data Backed Up Daily By Server Backup Data Backed Up Daily By Server onpage 88

Data Backed Up Weekly Backup Data Backed Up Weekly on page 88

Data Backed Up Weekly By Media Server Backup Data Backed Up Weekly By MediaServer on page 88

Data Backed Up Weekly By Server Backup Data Backed Up Weekly By Server onpage 88

Data Change Ratio By Client Backup Job Change Ratios By Client on page224

Data Change Ratio By Job Backup Job Change Ratios on page 224

Data Domain Boost Statistics Data Domain Boost Statistics on page 405

Data Domain Clone Details Backup Data Domain Clone Details on page207

Data Domain Compression Ratio Count Data Domain Compression Ratio Count onpage 406

Data Domain Data Ingested Data Domain Data Ingested on page 407

Data Domain Data Written To Data Domain Data Written To on page 407

Data Domain DeDuplication Ratio Data Domain DeDuplication Ratio on page 407

Data Domain File Distribution by Count Data Domain File Distribution By Count onpage 407

DPA Reports

36 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Data Domain File Distribution by Count perMTree

Data Domain File Distribution By Count perMTree

Data Domain File Distribution by Size Data Domain File Distribution By Size on page408

Data Domain File Distribution by Size perMTree

Data Domain File Distribution By Size perMTree

Data Domain Filesystem Utilization Data Domain Filesystem Utilization on page409

Data Domain Filesystem Utilization forWarning Critical Systems

Data Domain Filesystem Utilization forWarning/Critical Systems on page 409

Data Domain Filesystem Utilization StatusCount

Data Domain Filesystem Utilization StatusCount on page 410

Data Domain Low System Compression RatioTrend

Data Domain Low System Compression RatioTrend on page 410

Data Domain System Utilization Data Domain System Utilization on page 411

Data Domain Reduction Ratios Data Domain Reduction Ratios on page 410

Data Domain Replication Configuration Data Domain Replication Configuration onpage 151

Data Domain Tier Utilization Data Domain Tier Utilization on page 411

Data Domain Utilization Data Domain Utilization on page 411

Data Mover Change Details Data Mover Configuration Change Details onpage 106

Data Mover Configuration Data Mover Configuration on page 152

Data Recovered Avamar Garbage Collection Data Recoveredon page 87

Database Change Details All Database Changes on page 316

Database Configuration Database Details on page 317

Database Configuration Database Details For Server on page 318

Database Export History DPA Database Export History

Database Parameter Change Details Database Parameter Change Details on page319

Database Parameters Database Parameters on page 319

Database Server Parameters Database Server Parameters on page 320

Database Status DataProtector Database Status on page 452

Database Usage DataProtector Database Usage on page 411

Database Utilization TSM Database Utilization on page 420

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 37

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Datafile Change Details Datafile Configuration Change Details on page320

Datafile Configuration Datafile Details on page 321

Datafile Details Datafile Details for Database on page 321

Datafile Details Datafile Details for Tablespace on page 322

Datafile Usage DataProtector Datafile Usage on page 452

Datafile Utilization Datafile Utilization on page 322

Datafile Utilization Datafile Utilization Trend Chart on page 322

Datafile Utilization Trend Datafile Utilization for Tablespace on page323

DB Backups TSM Database Backups on page 304

De-Dupe Details By Client Backup Client De-Dupe Ratios on page 205

De-Dupe Details By Group Data Domain Group Deduplication Ratio

De-Dupe Details By Job Backup Job Deduplication Ratio for Client onpage 226

DeDupe Queue EDL 3D DeDupe Queue on page 412

Deduplication Cost Savings Deduplication Cost Savings on page 425

Deduplication ROI Trend Deduplication ROI Trend on page 425

Detailed Battery Status Battery Status on page 447

Detailed CAP Status Tape Library CAP Status on page 472

Detailed Fan Status Fan Status on page 455

Detailed PSU Status PSU Status on page 467

Detailed Thermometer Status Thermometer Status on page 475

Device Cleaning Status NetBackup Device Cleaning Status on page461

Device Configuration Backup Device Config on page 136

Device Configuration Backup Device Configuration for Pool on page207

Device Configuration Change Details Backup Device Configuration Change Detailson page 101

Device Errors Backup Device Errors on page 445

Device Performance Summary Backup Device Performance Summary onpage 365

Device Performance Summary By Device Backup Device Performance Summary ByDevice on page 366

DPA Reports

38 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Device Schedule (mounts) Backup Device Usage on page 429

Device Schedule (performance) Backup Device Scheduling on page 428

Device Status Backup Device Status on page 445

Device Summary By Device Backup Device Performance Summary ByDevice on page 366

Device Throughput By Device Backup Device Throughput by Device on page366

Device Utilization Backup Device Utilization by Device on page403

Disk Activity By Disk Disk Activity By Disk on page 369

Disk Activity By Host Disk Activity By Host on page 369

Disk Array Configuration Disk Array Configuration on page 71

Disk Array Status Disk Array Status on page 453

Disk Configuration Disk Configuration on page 72

Disk Media Details NetBackup Backup Job Disk Media Details onpage 279

Disk Performance By Disk Disk Performance By Disk on page 369

Disk Performance By Host Disk Performance By Host on page 370

Disk Pool Configuration NetBackup Disk Pool Configuration on page159

Disk Pool Status NetBackup Disk Pool Status on page 461

Disk Status Disk Status on page 454

Disk Summary Disk Summary on page 73

Disk Volume Configuration NetBackup Disk Volume Configuration onpage 160

Disk Volume Status NetBackup Disk Volume Status on page 462

DPA Listener Queues DPA Listener Queues on page 332

Domain Footprint Avamar Domain Footprint on page 179

Duration of Backups Daily Backup Duration of Jobs Backed Up Daily onpage 88

Duration of Backups Daily By Media Server Backup Duration of Jobs Backed Up Daily ByMedia Server on page 88

Duration of Backups Daily By Server Backup Duration of Jobs Backed Up Daily ByServer on page 89

Duration of Backups Weekly Backup Duration of Jobs Backed Up Weeklyon page 89

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 39

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Duration of Backups Weekly By Media Server Backup Duration of Jobs Backed Up WeeklyBy Media Server on page 89

Duration of Backups Weekly By Server Backup Duration of Jobs Backed Up WeeklyBy Server on page 89

EMC File Storage Change Details Celerra Change Details on page 105

Empty Media Details For Empty Volumes on page345

Error Details TSM Migration Errors For Specific Job onpage 307

Error Details TSM Reclamation Errors For Specific Job onpage 309

Error Trend Tape Drive Error Trend on page 485

Errors Backup Job Error Details for Specific Job onpage 229

Errors Restore Job Error Details For Specific Job onpage 294

Errors Tape Drive Error Trend on page 485

Errors By Node Tape Drive Error Count By Node on page 485

Estimated Protected Backup Capacity Estimated Protected Backup Capacity onpage 454

Estimated Protected Backup Capacity Details Estimated Protected Backup Capacity Detailson page 455

Events Array Fan-out Ratio on page 132

Events Backup Daily Success Rate on page 436

Events BTD Storage Utilization By Node on page 403

Exclusion Details Recoverability Excludes on page 396

Expirations TSM Expirations on page 305

Expired Licenses License Details - Expired on page 337

Exported LUNs Exported LUNs on page 153

Exposure Details Exposure Details on page 267

Exposure Details Recoverability Detailed Exposures on page394

Exposure Summary Recoverability Exposures Summary on page396

Failed Clients Backup Failed Clients on page 208

Failed Jobs Backup Failed Jobs on page 210

DPA Reports

40 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Failover Status EDL Failover Status on page 454

Failure Details One Strike Failed Jobs For Specific Client onpage 123

Failure Details Three Strike Failed Jobs For Specific Client onpage 126

Failure Details Two Strike Failed Jobs For Specific Client onpage 130

Fan Configuration Fan Configuration on page 73

Fan Status Fan Status on page 455

Fibre Channel Device Configuration Fibre Channel Device Configuration on page153

Fibre Channel Device Mapping Fibre Channel Device Mapping on page 153

Fibre Channel Device Performance Fibre Channel Device Performance on page370

Fibre Channel Device Performance By Node Fibre Channel Device Performance By Nodeon page 370

Fibre Channel Device Performance Summary Fibre Channel Device Performance Summaryon page 370

Fibre Channel Port Configuration Fibre Channel Configuration on page 73

Fibre Channel Port Errors By Node Fibre Channel Port Errors By Node on page482

Fibre Channel Port Errors By Port Fibre Channel Port Errors By Port on page483

Fibre Channel Port Performance By Node Fibre Channel Port Performance By Node onpage 371

Fibre Channel Port Performance By Port Fibre Channel Port Performance By Port onpage 371

Fibre Channel Port Status Fibre Channel Port Status on page 456

Fibre Channel Port Utilization Fibre Channel Port Utilization on page 413

Fileserver Average Response Times Fileserver Average Response Times on page371

Fileserver Cache Hit Rates Fileserver Cache Hit Rates on page 372

Fileserver Cache Hit Rates By Node Fileserver Cache Hit Rates By Node on page372

Fileserver Client Performance Fileserver Client Performance on page 372

Fileserver Exports Fileserver Exports on page 154

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 41

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Fileserver Filesystem Performance Fileserver Filesystem Performance on page373

Fileserver Operations Fileserver Operations on page 373

Fileserver Operations By Protocol Fileserver Operations By Protocol on page373

Fileserver Operations with Direction Fileserver Operations with Direction on page373

Fileserver Performance Summary Fileserver Performance Summary on page374

Fileserver Status Fileserver Status on page 457

Filesystem Archive Unit Status Data Domain Filesystem Archive Unit Statuson page 450

Filesystem Configuration Filesystem Configuration on page 74

Filesystem Configuration Filesystem Configuration for Filesystem onpage 75

Filesystem Configuration Summary Filesystem Configuration Summary on page77

Filesystem Details Filesystem Details on page 77

Filesystem Details Filesystem Status on page 458

Filesystem Mount Configuration Filesystem Mount Configuration on page 154

Filesystem Performance Summary Filesystem Performance Summary on page375

Filesystem Summary Filesystem Status Summary on page 458

Filesystem Options Data Domain Filesystem Options on page 451

Filesystem to LUN Mapping Celerra Filesystem to LUN Mapping on page148

Filesystems Not Backed Up Filesystems Not Backed Up on page 270

Frozen Media Details For Frozen Volumes on page346

Full Media Details For Full Volumes on page 347

Full Job History Backup Full History of Specific Job on page215

Gaps Recoverability Gaps on page 397

Garbage Collection Jobs Avamar Garbage Collection Jobs on page 179

Grid Utilization BTD Storage Utilization By Node on page 403

Group Configuration Backup Group Configuration for Pool on page217

DPA Reports

42 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Group Configuration Change Details Backup Group Configuration Change Detailson page 102

Group Configuration Changes Backup Group Configuration Change Detailson page 102

Group Count Backup Group Count on page 140

Group Count By Server Backup Group Count By Server on page 140

Group Details Backup Group Configuration on page 138

Group Forecast Backup Group Forecast on page 429

Group Job Status Backup Group Job Status Details on page 219

Group Membership Backup Server Client Group Mapping on page146

Group Status Backup Group Status on page 220

Group Summary Backup Group Summary on page 220

Host Configuration Host Configuration for Host

Host Status Host Status on page 459

Host Utilization Host Performance For Client on page 376

Host Utilization During Backup Host Performance During Backup on page376

Imported LUNs Imported LUNs on page 155

Index Change Details Index Configuration Change Details on page323

Index Configuration Details Index Details for Table on page 325

Index Details Index Details for Table on page 325

Index Details Index Details For Schema on page 324

Index Details Index Details For Tablespace on page 324

Infiniband Port Configuration Xsigo Infiniband Port Configuration on page85

Infiniband Port Performance by Node Xsigo Infiniband Port Performance by Nodeon page 388

Infiniband Port Performance by Port Xsigo Infiniband Port Performance by Port onpage 388

Infiniband Port Status Xsigo Infiniband Port Status on page 482

Infiniband Port Utilization Xsigo Infiniband Port Utilization on page 425

IP Autonegotation Mismatch for Ruleset IP Autonegotation Mismatch for Ruleset

iSCSI Adapter Configuration iSCSI Configuration on page 80

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 43

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

iSCSI Adapter Status iSCSI Status on page 460

iSNS Servers iSCSI iSNS Configuration on page 155

Job Attempts Backup Job Attempts for Specific Job onpage 222

Job Configuration Backup Job Configuration for Pool on page225

Job Configuration Change Details Backup Job Configuration Change Details onpage 102

Job Configuration Changes Backup Job Configuration Change Details onpage 102

Job Details Backup All Jobs for Specific Client on page192

Job Details Backup Client Slowest/Fastest Jobs for Clienton page 363

Job Details Backup Failed Jobs For Client on page 213

Job Details Backup Job Configuration on page 140

Job Details Backup Server Group Job Mapping on page148

Job Distribution Backup Job Distribution on page 429

Job Distribution By Media Server Backup Job Distribution By Media Server onpage 429

Job Forecast Backup Job Forecast on page 429

Job Forecast versus Actual Backup Job Forecast versus Actual on page430

Job Forecast versus Actual Summary Backup Job Forecast versus Actual Summaryon page 430

Job Schedule Backup Job Schedule on page 430

Job Schedule Backup Job Schedule For Specific Client onpage 433

Job Summary Backup Job Summary on page 230

Job Summary Backup Successful Job Summary for GroupRun on page 230

Journal Utilization RecoverPoint Journal Utilization on page 419

Jukebox Configuration Backup Jukebox Config on page 141

Last 5 Runs Backup Last 5 Runs of Job on page 231

Last Successful Backup Backup Last Successful Run of Job on page242

DPA Reports

44 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

License Details License Details on page 337

License Conformance License Conformance on page 336

License Details License Details on page 337

License Summary License Summary on page 337

License Usage License Usage on page 338

Lifecycle Policy Configuration NetBackup Lifecycle Policy Configuration onpage 161

Lifecycle Policy Destinations NetBackup Lifecycle Policy Destination onpage 161

Listener Performance Listener Performance on page 333

Logfile Change Details Logfile Configuration Change Details on page325

Logfile Configuration Logfile Details on page 325

Long Running Jobs Backup All Long Running Jobs on page 197

LUN Configuration LUN Configuration on page 80

LUN Mappings LUN Mapping on page 156

LUN Status LUN Status on page 460

Maintenance Job Maintenance Job Details on page 276

Maintenance Job Attempts Maintenance Job Attempts for Specific Jobon page 276

Maintenance Job Errors Maintenance Job Errors on page 277

Maintenance Job Schedule Maintenance Job Schedule on page 435

Maintenance Job Summary Maintenance Job Summary on page 277

Masking Configuration Masking Configuration for Storage Array onpage 389

Masking Configuration Masking Configuration for Initiator on page390

Media Age Distribution Media Age Distribution on page 339

Media Contents Media Contents on page 340

Media Count Media Count Trend on page 93

Media Count By Location Media Count By Location Trend on page 92

Media Count By Pool Media Count By Pool Trend on page 93

Media Count By Pool and Location Media Count By Pool and Location Trend onpage 92

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 45

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Media Count By Pool and State Media Count By Pool And State Trend onpage 92

Media Count By Pool and State and Location Media Count By Pool and State and LocationTrend on page 92

Media Count By State Media Count By State Trend on page 93

Media Count By State and Location Media Count By State and Location Trend onpage 93

Media Details Backup Job Media Details on page 229

Media Details Clone Job Media Details on page 263

Media Details Clone Job Media Details for Clone Operationon page 263

Media Details Staging Media Details on page 299

Media Details With Retention Over 8 Years Media Details With Retention Over 8 Years onpage 356

Media Location Changes Media Location Change Details on page 107

Media Retention Distribution Media Retention Distribution on page 357

Media Size Distribution Media Size Distribution on page 357

Media To Be Destroyed Volumes To Be Destroyed on page 132

Media To Be Recycled Expired Volumes on page 122

Media Usage Media Usage Trend on page 94

Media Usage By Library Media Usage By Library Trend on page 93

Media Usage By Pool Media Usage By Pool Trend on page 94

Media Usage By Pool and Library Media Usage By Pool and Library Trend onpage 94

Memory Configuration Memory Configuration Details on page 81

Memory Configuration Shared Memory Configuration on page 170

Memory Configuration Change Details Memory Configuration Change Details onpage 108

Memory Status Current Memory Usage By Node on page 405

Memory Usage Process Memory Usage on page 419

Memory Utilization Memory Utilization By Node on page 417

Migration Jobs TSM Migration Jobs on page 307

Migration Summary TSM Migration Summary on page 308

Mirror Configuration Mirror Configuration on page 157

Mirror Performance Mirror Performance on page 378

DPA Reports

46 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Mirror Status Mirror Status on page 461

MirrorView Configuration MirrorView Configuration on page 390

MirrorView/A Performance MirrorView/A Performance on page 391

MirrorView/A Performance for CG MirrorView/A Performance for CG on page391

Missed Clients Backup Missed Clients on page 244

Missed Jobs Backup Missed Jobs on page 245

Modes Data Domain Modes on page 451

Most Exposed Jobs Top 10 Most Exposed Jobs on page 128

Mount Requests Backup Mount Requests on page 360

Moves TSM Moves on page 308

MTree Daily Compression Statistics MTree Daily Compression Statistics on page416

MTree Physical Capacity Statistics MTree Physical Capacity Statistics on page416

MTree Physical Capacity Statistics Trend MTree Physical Capacity Statistics Trend onpage 416

MTree Quota Utlization MTree Quota Utilization on page 416

MTree Retention Lock Status MTree Retention Lock Status on page 460

NetBackup Disk Media Details NetBackup Clone Job Disk Media Details onpage 279

NetBackup Disaster Recovery Configuration NetBackup Disaster Recovery Configurationon page 158

NetBackup Global Configuration NetBackup Global Configuration on page 160

NetBackup Master Server ConfigurationSettings

NetBackup Server Configuration Details onpage 162

NetBackup Media Server ConfigurationDetails

NetBackup Media Server ConfigurationDetails on page 161

NetBackup Storage Server ConfigurationDetails

NetBackup Storage Server Configuration onpage 162

NetBackup VM Rule Configuration NetBackup VM Rule Configuration on page164

Network Interface Configuration Network Interface Configuration on page 81

Network Interface Configuration ChangeDetails

Network Interface Configuration ChangeDetails on page 109

Network Interface Errors By Interface Network Interface Errors By Interface onpage 483

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 47

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Network Interface Errors By Node Network Interface Errors By Node on page484

Network Interface IP Network IP Configuration

Network Interface Link Pair Network Interface Link Pair on page 464

Network Interface Link Pair AutonegotiationStatus

Network Interface Link Pair AutonegotiationStatus on page 464

Network Interface Link Pair Duplex Status Network Interface Link Pair Duplex Status onpage 465

Network Interface Performance By Interface Network Interface Performance By Interfaceon page 417

Network Interface Performance By Node Network Interface Performance By Node onpage 417

Network Interface Status Network Interface Status on page 465

NetWorker Bootstraps Legato Networker Bootstrap Report on page275

NetWorker SLP Backlog by Image NetBackup SLP Backlog by Image on page462

NetWorker SLP Images Status NetBackup SLP Images Status on page 462

NetWorker SLP Jobs Status NetBackup SLP Jobs Status on page 463

NetWorker SLP Status by Image NetBackup SLP Status by Image on page 463

Node Topology Node Topology on page 333

Node Utilization Filesystem Utilization By Node on page 414

Number of Files Backed Up Daily Backup Files Backed Up Daily on page 89

Number of Files Backed Up Daily By MediaServer

Backup Files Backed Up Daily By MediaServer on page 89

Number of Files Backed Up Daily By Server Backup Files Backed Up Daily By Server onpage 89

Number of Files Backed Up Weekly Backup Files Backed Up Weekly on page 90

Number of Files Backed Up Weekly By MediaServer

Backup Files Backed Up Weekly By MediaServer on page 90

Number of Files Backed Up Weekly By Server Backup Files Backed Up Weekly By Server onpage 90

Number of Jobs Backed Up Daily Backup Number of Jobs Backed Up Daily onpage 90

Number of Jobs Backed Up Daily By MediaServer

Backup Number of Jobs Backed Up Daily ByMedia Server on page 90

DPA Reports

48 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Number of Jobs Backed Up Daily By Server Backup Number of Jobs Backed Up Daily ByServer on page 90

Number of Jobs Backed Up Weekly Backup Number of Jobs Backed Up Weekly onpage 91

Number of Jobs Backed Up Weekly By MediaServer

Backup Number of Jobs Backed Up WeeklyBy Media Server on page 91

Number of Jobs Backed Up Weekly By Server Backup Number of Jobs Backed Up WeeklyBy Server on page 91

Objects with Replication Exposures Objects with Replication Exposures on page334

Obsolete Recovery Points Recoverability Obsolete Recovery Points onpage 398

Offline Media Details for Offline Volumes on page349

Offline Expired Volumes Media Details For Offline Expired Volumes onpage 348

Online Media Details For Online Volumes on page350

Open Files Backup Open Files on page 247

Open Files Backup Open Files for Specific Job on page248

Orphaned LUNs Orphaned LUNs on page 466

Partial Media Details For Partial Volumes on page351

Partially Successful Clients Backup Partial Clients on page 248

Partition Details Partition Details for Database on page 326

Partition Details Partition Details for Index on page 326

Partition Details Partition Details for Table on page 326

Performance Summary Celerra Replication Performance Summary onpage 368

Performance Trend Celerra Replication Performance on page 367

Policy Configuration Changes Backup Group Configuration Change Detailson page 102

Pool Capacity Usage Graph Pool Capacity Usage on page 95

Pool Capacity Usage Graph Pool Capacity Usage for Pool on page 95

Pool Configuration Backup Pool Configuration on page 142

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 49

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Pool Configuration Changes Backup Pool Configuration Change Details onpage 103

Pool Status Backup Pool Status on page 446

Portal Configuration iSCSI Portal Configuration on page 155

Problem Clients Backup Problem Clients on page 250

Process Status Process Status on page 466

Processed Agent Reports Processed Agent Report on page 334

Processor Configuration Processor Configuration on page 82

Processor Status Processor Status on page 467

Processor Utilization By CPU Processor Utilization By CPU on page 378

Processor Utilization By Node Processor Utilization By Node on page 379

Protected Capacity RecoverPoint Protected Capacity on page95

Protection Policy Configuration Networker Protection Policy Configuration onpage 165

PSU Configuration PSU Configuration on page 82

PSU Status PSU Status on page 467

Publisher Performance Publisher Performance on page 334

Purge Preview DataProtector Purge Preview on page 452

Quota Status Filesystem Quota Status on page 457

RPA Site Compression RecoverPoint RPA Site Compression on page382

RPA Site Latency RecoverPoint RPA Site Latency on page 382

RPA Site Packet Loss RecoverPoint RPA Site Packet Loss on page382

RPA Site Throughput RecoverPoint RPA Site Throughput on page383

RPA WAN Throughput RecoverPoint RPA WAN Throughput on page383

RPA WAN Throughput for Last Day RecoverPoint RPA WAN Throughput for LastDay on page 383

RDF Configuration for CG RDF Configuration for CG on page 392

RDF Configuration for DG RDF Configuration for DG on page 393

RDF Configuration for Symmetrix RDF Configuration on page 392

RDFG Performance RDFG Performance on page 393

DPA Reports

50 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Recall List Media Details For Offline Expired Volumes onpage 348

Received Agent Reports Received Agent Report on page 334

Reclamation Jobs TSM Reclamation Jobs on page 309

Reclamation Summary TSM Reclamation Summary on page 310

Record File Usage DataProtector Record File Usage on page 453

Recoverability Status Monitor by Client Recoverability Status Monitor By Client onpage 399

Recoverability Solutions Enabler ManagedStorage Arrays

Recoverability Solutions Enabler ManagedStorage Arrays

Recoverability Visualization Recoverability Visualization on page 400

Recoverability Visualization Details Recoverability Visualization Details on page400

RecoverPoint Change Details RecoverPoint Change Details on page 109

Recycle List Media Details Top 10 Oldest Volumes on page355

Remote Mirror Configuration Remote Mirror Configuration on page 170

Remote Mirror Performance Remote Mirror Performance on page 383

Remote Mirror Status Remote Mirror Status on page 471

Remote Replication RPO forecast for MV/A Remote Replication RPO forecast for MV/Aon page 401

Remote Replication RPO forecast for SRDF/A Remote Replication RPO forecast for SRDF/Aon page 401

Replication alerts by group Replication Alerts by Group on page 335

Replication Configuration Celerra Configuration Change Details on page105

Replication Configuration Recoverability Replication Configuration onpage 398

Replication Performance Summary Celerra Replication Performance Summary onpage 368

Replication Performance Trend Celerra Replication Performance on page 367

Replication Process View Recoverability Replicated Object ProcessView on page 395

Replication RPO Compliance Replication RPO Compliance on page 402

Replication Set Configuration RecoverPoint Replication Set Configurationon page 169

Replication Status Replication Status on page 471

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 51

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Replication Summary Avamar Replication Summary on page 180

Replication Time Lag Data Domain Replication Time Lag on page368

Report Card Backup Report Card on page 251

Report History Report History on page 335

Reporter Median Report Run Time DPA Reporter Median Report Run Time onpage 370

Request History Request History on page 335

Request Summary Request Summary

Restore Details Backup Restore Details on page 252

Restore Disk Media NetBackup Restore Job Disk Media Details onpage 286

Restore Job Error Details Restore Job Error Details on page 294

Restore Jobs with Last Resolution Restore Jobs with Last Resolution on page441

Restore Media Restore Job Media Details on page 294

Restore Summary Restore Job Summary on page 295

Retention Policy Configuration Avamar Retention Policy Configuration onpage 132

RPA Active Consistency Groups RecoverPoint RPA Active Consistency Groupson page 470

RPA Compression RecoverPoint RPA Compression on page 381

RPA Details RecoverPoint RPA Details on page 169

RPA Latency RecoverPoint RPA Latency on page 381

RPA Packet Loss RecoverPoint RPA Packet Loss on page 484

RPA Throughput RecoverPoint RPA Throughput on page 382

RPA Writes RecoverPoint RPA Writes on page 382

Schedule Configuration Changes Backup Schedule Configuration ChangeDetails on page 103

Schedule Details Backup Schedule Configuration on page 144

Scheduled Report History Scheduled Report History on page 336

Schema Configuration Database Schema Details For Server on page319

Server Configuration Database Server Details on page 319

Server Configuration Changes Backup Server Configuration Change Detailson page 104

DPA Reports

52 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Server Logs DPA Server Logs on page 332

Server Parameter Change Details Database Server Parameter Change Details onpage 320

Server to Storage Configuration Server to Storage Configuration on page 398

Server to Storage Topology Recoverability Server To Storage MappingsTopology on page 399

Server Utilization Backup Server Utilization on page 404

Service Status DataProtector Service Status on page 453

Share Change Details Fileserver Export Change Details on page 107

Shared Device Schedule (mounts) Backup Device Shared Usage on page 428

Size Distribution Backup Size Distribution on page 435

Size Distribution By Media Server Backup Size Distribution By Media Server onpage 435

SLA Summary Backup SLA Summary on page 440

SLA Summary By Client Backup SLA Summary By Client on page 440

Snap Job Details Snap Job Details on page 297

Snap Job Summary Snap Job Summary on page 299

Snapshot Status Filesystem Snapshot Status on page 458

Snapshot Utilization Filesystem Snapshot Utilization on page 414

Solid State Storage Configuration Solid State Storage Configuration on page83

Solid State Storage Performance Solid State Storage Performance on page 384

Splitter Details RecoverPoint Splitter Details on page 169

Staging Details Staging Operations on page 300

Staging Summary Staging Summary on page 300

Status Celerra Replication Status on page 449

Storage Array Capacity Usage Graph Storage Array Capacity Usage on page 96

Storage Array Raw Capacity Storage Array Raw Capacity on page 97

Storage Mapping Recoverability Replicated Object StorageMapping on page 395

Storage Pool Application Growth Storage Pool Application Growth on page 97

Storage Pool Capacity Storage Pool Capacity on page 98

Storage Pool Configuration Celerra Storage Pool Configuration on page149

Storage Pool Copies TSM Storage Pool Copies on page 310

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 53

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Storage Pool Migration Schedule TSM Storage Pool Migration Schedule onpage 436

Storage Pool Reclamation Schedule TSM Storage Pool Reclamation Schedule onpage 436

Storage Pool Utilization TSM Storage Pool Utilization on page 420

Storage Server Status NetBackup Storage Server Status on page464

Storage to Server Topology Recoverability Storage To Server MappingsTopology on page 399

Storage Unit Configuration NetBackup Storage Unit Configuration onpage 163

Storage Unit Configuration Changes NetBackup Storage Unit ConfigurationChange Details on page 108

Storage Unit Group Configuration NetBackup Storage Unit Group Configurationon page 163

Strike Summary Strike Summary on page 125

Successful Clients Backup Successful Clients on page 254

Successful Jobs Backup Successful Jobs on page 257

Symmetrix Change Details Symmetrix Change Details on page 110

Symmetrix LUN to Data Domain vDisks Symmetrix LUN to Data Domain vDisks onpage 171

System Capacity License Details Data Domain System Capacity Licenses onpage 451

System Dynamics DataProtector System Dynamics on page 412

System License Details Data Domain System Licenses on page 451

System User Status Data Domain System User Status on page 452

Table Change Details Table Configuration Change Details on page327

Table Details Table Details for Database on page 327

Table Details Table Details for Schema on page 327

Table Details Table Details for Tablespace on page 328

Tablespace Change Details Tablespace Configuration Change Details onpage 328

Tablespace Configuration Tablespace Details on page 329

Tablespace Details Tablespace Details for Database on page 329

Tablespace Utilization Tablespace Utilization on page 329

DPA Reports

54 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Tape Library Volume Utilization Trend Tape Library Volume Utilization Trend on page422

Tape Drive Change Details Tape Drive Configuration Change Details onpage 111

Tape Drive Configuration Tape Drive Configuration on page 83

Tape Drive Performance By Drive Tape Drive Performance By Drive on page384

Tape Drive Performance By Node Tape Drive Performance By Node on page384

Tape Drive Performance Summary Tape Drive Performance Summary on page385

Tape Drive Status Tape Drive Status on page 472

Tape Drive Status Details Tape Drive Status on page 472

Tape Library Aggregate Utilization Tape Library Aggregate Utilization on page420

Tape Library Aggregate Utilization Trend Tape Library Aggregate Utilization Trend onpage 420

Tape Library CAP Status Tape Library CAP Status on page 472

Tape Library Capacity Utilization Tape Library Capacity Utilization on page 420

Tape Library Change Details Tape Library Configuration Change Details onpage 111

Tape Library Compression Ratio Tape Library Compression Ratio on page 421

Tape Library Configuration Tape Library Config on page 84

Tape Library DeDupe Ratio Tape Library Deduplication Ratio on page 421

Tape Library Empty Volume Count Tape Library Empty Volume Count on page473

Tape Library Errors Tape Library Errors on page 485

Tape Library Slot Status Tape Library Slot Status on page 473

Tape Library Status Details Tape Library Status Details on page 473

Tape Library Throughput Tape Library Throughput on page 421

Tape Library Utilization Tape Library Utilization on page 422

Tape Library Utilization Trend Tape Library Utilization Trend on page 422

Tape Library Volume Status Tape Library Volume Status on page 474

Thermometer Configuration Thermometer Configuration on page 85

Thermometer Status Thermometer Status on page 475

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 55

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Throughput Backup Device Throughput for Device onpage 366

Throughput HP VLS Throughput on page 415

Throughput by Protocol Fileserver Data Throughput By Protocol onpage 372

Top 10 Clients By Avg Daily Change Top 10 Backup Clients By Avg Daily Changeon page 302

Top 10 Clients with Best De-Dupe Rate Top 10 Backup Clients with Best De-DupeRate on page 303

Top 10 Clients with Worst De-Dupe Rate Top 10 Backup Clients with Worst De-DupeRate on page 303

Top 10 Fastest Clients Backup Top 10 Fastest Clients on page 367

Top 10 Growing Tables Top 10 Growing Tables by Rows on page 330

Top 10 Largest Clients Backup Top 10 Largest Clients on page 260

Top 10 Largest Tables By Row Count Top 10 Largest Database Tables By RowCount on page 330

Top 10 Largest Tables By Size Top 10 Largest Database Tables By Size onpage 330

Top 10 Longest Time Since Last Power On Virtual Host Top 10 Longest Time Since LastPower On on page 481

Top 10 Offending Clients Top 10 Offending Clients on page 423

Top 10 Offending Jobs Top 10 Offending Jobs on page 423

Top 10 Slowest Clients Backup Top 10 Smallest Clients on page 260

Top 10 Unreliable Clients Backup Top 10 Most Unreliable Clients onpage 260

Total Daily Duration by Group Backup Daily Total Group Duration on page87

Total Job Size and Used Space for DataDomain

NetWorker Total Job Size and Used Space forData Domain on page 94

Total Reduction Ratio EDL 3D Total Reduction Ratio on page 412

Total Replicated Capacity Data Domain Total Replicated Capacity onpage 91

Trend CPU Utilization Process CPU Utilization For Specific Processon page 418

Trend Media Usage Media Usage on page 357

Trend Thermometer Temperature Thermometer Trend for SpecificThermometer on page 475

DPA Reports

56 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

TSM Backup Set Details TSM Backup Set Details on page 303

TSM Client Occupancy Details TSM Client Occupancy on page 476

TSM Client Occupancy Summary TSM Client Occupancy Summary on page 419

TSM Command Event Details TSM Command Event Details on page 304

TSM Copy Group Configuration TSM Copy Group Configuration on page 172

TSM Database Status TSM Database Status on page 477

TSM Database Usage TSM Database Usage on page 477

TSM Database Volume Status TSM Database Volume Status on page 477

TSM DB Backup Errors TSM Database Backup Errors on page 304

TSM Defined Server Configuration TSM Defined Server Configuration on page173

TSM Defined Server Status TSM Defined Server Status on page 478

TSM Delete Volumes TSM Delete Volumes on page 305

TSM Device Path Status TSM Device Path Status on page 480

TSM DR Media Media Reclamation Distribution on page 358

TSM Expiration Errors TSM Expiration Errors on page 305

TSM Filespace Details TSM Client Filespaces on page 476

TSM Filespace Summary TSM Filespace Summary on page 481

TSM Identify Duplicate Process Details TSM Identify Duplicate Process Details onpage 478

TSM Identify Duplicate Process Trend TSM Identify Duplicate Process Trend onpage 478

TSM LAN Free Server Configuration TSM LAN Free Server Configuration on page173

TSM LAN Free Server Status TSM LAN Free Server Status on page 481

TSM Management Class Configuration TSM Management Class Configuration onpage 174

TSM Move Errors TSM Move Errors on page 308

TSM Policy Set Configuration TSM Policy Set Configuration on page 175

TSM Recovery Log Usage TSM Recovery Log Usage on page 481

TSM Replication Node Status TSM Replication Node Status on page 479

TSM Replication Process Details TSM Replication Process Details on page 479

TSM Replication Process Summary TSM Replication Process Summary on page480

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 57

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

TSM Server Side Processes TSM Server Side Process Scheduling on page436

TSM Storage Pool Copy Errors TSM Storage Pool Copy Errors on page 311

TSM Top 10 Backups With Worst Idle WaitTimes

TSM Top 10 Backups with Worst Idle WaitTimes on page 312

TSM Top 10 Backups With Worst Media WaitTimes

TSM Top 10 Backups with Worst Media WaitTimes on page 312

TSM Top 10 Clients With Worst Idle WaitTimes

TSM Top 10 Clients with Worst Idle WaitTimes on page 313

TSM Top 10 Clients with Worst Media WaitTimes

TSM Top 10 Clients with Worst Media WaitTimes on page 313

Uncloned Backups Uncloned Backups on page 313

Underlying Disk Activity Filesystem Disk Activity on page 413

Unconfigured Clients Backup Unprotected/Unconfigured Clients onpage 120

Underlying Disk Details Filesystem Disk Configuration on page 77

Underlying Disk Performance Filesystem Disk Performance on page 374

Underlying Disk Status Filesystem Disk Status on page 457

Unprotected Clients Unprotected Clients on page 132

Unprotected Nodes Recoverability Unprotected Nodes on page400

Unsuccessful Clients Backup Unsuccessful Clients on page 120

Used Media Details For Used Volumes on page 352

Used Volumes Media Details For Used Volumes on page 352

Utilization Filesystem Utilization By Partition on page415

Vault Attempts NetBackup Vault Attempts for Specific Job onpage 288

Vault Disk Media Details NetBackup Vault Job Disk Media Details onpage 289

Vault Ejects NetBackup Vault Ejects on page 288

Vault Jobs NetBackup Vault Jobs on page 289

Vault Media Details Vault Job Media Details on page 315

Vault Preview NetBackup Vault Preview on page 290

VBA Configuration NetWorker VBA Configuration on page 166

VBA Utilization NetWorker VBA Utilization on page 418

DPA Reports

58 Dell EMC Data Protection Advisor Report Reference Guide

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Virtual Host Disk Configuration ChangeDetails

Virtual Host Disk Configuration ChangeDetails on page 112

Virtual Data Mover Configuration Virtual Data Mover Configuration on page 175

Virtual Fibre Channel Port Performance ByNode

Virtual Fibre Channel Port Performance ByNode on page 386

Virtual Fibre Channel Port Performance ByPort

Virtual Fibre Channel Port Performance ByPort on page 386

Virtual Fibre Channel Port Utilization Virtual Fibre Channel Port Utilization on page423

Virtual Host Change Details Virtual Host Change Details on page 112

Virtual Host Change Details Virtual Host Change Details on page 113

Virtual Host Configuration Virtual Host Configuration on page 175

Virtual Host Disk Configuration Virtual Host Disk Configuration on page 176

Virtual Host Disk Performance Virtual Host Disk Performance on page 387

Virtual Host Memory Utilization Virtual Host Memory Utilization on page 424

Virtual Host Network Interface Configuration Virtual Host Network Interface Configurationon page 176

Virtual Host Network Interface ConfigurationChange Details

Virtual Host Network Interface ConfigurationChange Details on page 113

Virtual Host Network Performance Virtual Host Network Interface Performanceon page 387

Virtual Host Processor Utilization Virtual Host Processor Utilization on page 387

Virtual Network Interface Performance ByInterface

Virtual Network Interface Performance ByInterface on page 424

Virtual Network Interface Performance ByNode

Virtual Network Interface Performance ByNode on page 424

Virtual Port Queue Depth Summary Xsigo Virtual Port Queue Depth Summary onpage 388

Virtual To Physical Port Mapping Xsigo Virtual To Physical Port Mapping onpage 178

Virtualization Manager Configuration Virtualization Manager Configuration on page176

VMs Not Backed Up Backup VMs Not Backed Up on page 261

VM Protection VM Protection

VNX/CLARiiON Change Details VNX/CLARiiON Change Summary on page114

Volume Configuration Celerra Volume Configuration on page 149

DPA Reports

Dell EMC Data Protection Advisor Report Reference Guide 59

Table 3 Run Reports area menu items (continued)

Run Reports area menu Item System Template used to generate thereport

Volume Configuration RecoverPoint Volumes for Replication Sets onpage 470

Volume Details RecoverPoint Volumes on page 470

Volume Expiration Report Volume Expiration Report on page 360

Volume Priority Configuration

Web Server Response Time Webserver Response Time on page 387

Workflow Configuration NetWorker Workflow Configuration on page166

Workflow Job Status NetWorker Workflow Job Status on page 292

DPA Reports

60 Dell EMC Data Protection Advisor Report Reference Guide

CHAPTER 3

Reports by object

This chapter describes the reports by object supported by DPA. You can choose the monitoredobject that you want to report on, then select the report type to be applied.

l Backup application reporting................................................................................................. 62l Data Domain reporting.......................................................................................................... 62l Virtualization reporting..........................................................................................................63l Database reporting................................................................................................................63l HP EVA reporting..................................................................................................................63l ACSLS Server reporting........................................................................................................64l Recoverability reporting........................................................................................................ 64l EMC File Storage reporting...................................................................................................65l EDL reporting........................................................................................................................65l RecoverPoint reporting.........................................................................................................65l Tape library reporting............................................................................................................66l Fibre Channel switch reporting..............................................................................................66l IP switch reporting................................................................................................................66l Xsigo reporting......................................................................................................................67l System reporting...................................................................................................................67l Data Protection Advisor reporting......................................................................................... 67l Enterprise Application reporting............................................................................................68

Dell EMC Data Protection Advisor Report Reference Guide 61

Backup application reportingBackup application reports are based on data gathered from the backup server and include reportsfrom the following system templates:

l Capacity planning reports in Capacity Planning system templates on page 85

l Change management reports in Change Management system templates on page 99

l Chargeback reports in Chargeback system templates on page 115

l Compliance and risk mitigation reports in Compliance system templates on page 119

l Configuration reports in Configuration system templates on page 132

l DPA reports in DPA system templates on page 331

l Data protection reports in Data Protection system templates on page 178

l Performance reports in Performance system templates on page 361

l Resource utilization reports in Resource Utilization system templates on page 402

l Return on investment reports in ROI system templates on page 425

l Scheduling reports in Scheduling system templates on page 426

l Service level management reports in Service Level Management system templates on page436

l Status reports in Status system templates on page 442

Reports are also included in the Control Panels section of the DPA web console.

Data Domain reportingData Domain reports are based on data gathered from Data Domain® storage appliances andinclude reports from the following system templates:

l Asset management reports in Asset Management system templates on page 70

l Capacity planning reports in Capacity Planning system templates on page 85

l Change management reports in Change Management system templates on page 99

l Chargeback reports in Chargeback system templates on page 115

l Configuration reports in Configuration system templates on page 132

l DPA reports in DPA system templates on page 331

l Licensing reports in Licensing system templates on page 336

l Performance reports in Performance system templates on page 361

l Recoverability reports in Recoverability system templates on page 389

l Resource utilization reports in Resource Utilization system templates on page 402

l Status reports in Status system templates on page 442

l Troubleshooting reports in Troubleshooting system templates on page 482

Reports are also included in the Control Panels section of the DPA web console.

Reports by object

62 Dell EMC Data Protection Advisor Report Reference Guide

Virtualization reportingVirtualization reports are based on data gathered from virtual machines and host servers andinclude reports from the following system templates:

l Capacity planning reports in Capacity Planning system templates on page 85

l Change management reports in Change Management system templates on page 99

l Chargeback reports in Chargeback system templates on page 115

l Compliance and risk mitigation reports in Compliance system templates on page 119

l Configuration reports in Configuration system templates on page 132

l DPA reports in DPA system templates on page 331

l Data protection reports in Data Protection system templates on page 178

l Performance reports in Performance system templates on page 361

l Scheduling reports in Scheduling system templates on page 426

l Service level management reports in Service Level Management system templates on page436

l Status reports in Status system templates on page 442

Reports are also included in the Control Panels section of the DPA web console.

Database reportingDatabase reports are based on data gathered from databases and include reports from thefollowing system templates:

l Capacity planning reports in Capacity Planning system templates on page 85

l Change management reports in Change Management system templates on page 99

l Chargeback reports in Chargeback system templates on page 115

l Compliance and risk mitigation reports in Compliance system templates on page 119

l Configuration reports in Compliance system templates on page 119

l Data protection reports in DPA system templates on page 331

l Performance reports in Performance system templates on page 361

l Scheduling reports in Scheduling system templates on page 426

l Service level management reports in Service Level Management system templates on page436

l Status reports in Status system templates on page 442

Reports are also included in the Control Panels section of the DPA web console.

HP EVA reportingHP EVA reports are based on data gathered from HP Enterprise Virtual Array (EVA) disk arraysand include reports from the following system templates:

l Asset management reports in Asset Management system templates on page 70

l Capacity Planning reports in Capacity Planning system templates on page 85

Reports by object

Dell EMC Data Protection Advisor Report Reference Guide 63

l Change management reports Change Management system templates on page 99

l Chargeback reports in Chargeback system templates on page 115

l Compliance and risk mitigation reports in Compliance system templates on page 119

l Configuration reports in Configuration system templates on page 132

l DPA reports in DPA system templates on page 331

l Data protection reports in Data Protection system templates on page 178

l Performance reports in Performance system templates on page 361

l Recoverability reports in Recoverability system templates on page 389

l Resource utilization reports in Resource Utilization system templates on page 402

l Scheduling reports in Scheduling system templates on page 426

l Service level management reports in Service Level Management system templates on page436

l Status reports in Status system templates on page 442

l Troubleshooting reports in Troubleshooting system templates on page 482

Reports are also included in the Control Panels section of the DPA web console.

ACSLS Server reportingACSLS Server reports are based on data gathered from Automated Cartridge System LibrarySoftware (ACSLS) module and include reports from the following system templates:

l Capacity Planning reports in Capacity Planning system templates on page 85

l Change management reports in Change Management system templates on page 99

l Chargeback reports in Chargeback system templates on page 115

l Compliance and risk mitigation reports in Compliance system templates on page 119

l DPA reports in DPA system templates on page 331

l Data protection reports in Data Protection system templates on page 178

l Licensing reports in Licensing system templates on page 336

l Performance reports in Performance system templates on page 361

l Recoverability reports in Recoverability system templates on page 389

l Scheduling reports in Scheduling system templates on page 426

l Service level management reports in Service Level Management system templates on page436

l Status reports in Status system templates on page 442

Reports are also included in the Control Panels section of the DPA web console.

Recoverability reportingRecoverability reports are specific to VNX/CLARiiON and Symmetrix storage arrays and includereports from the following system templates:

l Asset management reports in Asset Management system templates on page 70

l Capacity Planning reports in Capacity Planning system templates on page 85

Reports by object

64 Dell EMC Data Protection Advisor Report Reference Guide

l Configuration reports in Configuration system templates on page 132

l DPA reports in DPA system templates on page 331

l Recoverability reports in Recoverability system templates on page 389

EMC File Storage reportingEMC File Storage reports are based on data gathered from EMC File Storage Appliances andinclude reports from the following system templates:

l Asset Management reports in Asset Management system templates on page 70

l Capacity planning reports in Capacity Planning system templates on page 85

l Change management reports in Change Management system templates on page 99

l Configuration reports in Configuration system templates on page 132

l DPA reports in DPA system templates on page 331

l Performance reports in Performance system templates on page 361

l Status reports in Status system templates on page 442

l Troubleshooting reports in Troubleshooting system templates on page 482

Reports are also included in the Control Panels section of the DPA web console.

EDL reportingEDL reports are based on data gathered from EDL and EDL 3D and include reports from thefollowing system templates:

l Asset management reports in Asset Management system templates on page 70

l Configuration reports in Configuration system templates on page 132

l Change management reports in Change Management system templates on page 99

l Performance reports in Performance system templates on page 361

l Resource utilization reports in Resource Utilization system templates on page 402

l Status reports in Status system templates on page 442

l Licensing reports in Licensing system templates on page 336

l Troubleshooting reports in Troubleshooting system templates on page 482

RecoverPoint reportingRecoverPoint reports are based on data gathered from RecoverPoint system and include reportsfrom the following system templates:

l Asset management reports in Asset Management system templates on page 70

l Capacity planning reports in Capacity Planning system templates on page 85

l Change management reports in Change Management system templates on page 99

l Chargeback reports in Chargeback system templates on page 115

l Configuration reports in Configuration system templates on page 132

l DPA reports in DPA system templates on page 331

Reports by object

Dell EMC Data Protection Advisor Report Reference Guide 65

l Performance reports in Performance system templates on page 361

l Recoverability reports in Recoverability system templates on page 389

l Resource utilization reports in Resource Utilization system templates on page 402

l Status reports in Status system templates on page 442

l Troubleshooting reports in Troubleshooting system templates on page 482

Tape library reportingTape library reports are based on data gathered from tape libraries and include reports from thefollowing system templates:

l Asset management reports in Asset Management system templates on page 70

l Change management reports in Change Management system templates on page 99

l DPA reports in DPA system templates on page 331

l Licensing reports in Licensing system templates on page 336

l Resource utilization reports in Resource Utilization system templates on page 402

l Status reports in Status system templates on page 442

l Troubleshooting reports in Troubleshooting system templates on page 482

Fibre Channel switch reportingFibre Channel switch reports are based on data gathered from Fibre Channel switches and includereports from the following system templates:

l Asset management in Asset Management system templates on page 70

l DPA reports in DPA system templates on page 331

l Performance reports in Performance system templates on page 361

l Status reports in Status system templates on page 442

l Troubleshooting reports in Troubleshooting system templates on page 482

IP switch reportingIP switch reports are based on data gathered from IP switches and include reports from thefollowing system templates:

l Asset management reports in Asset Management system templates on page 70

l DPA reports in DPA system templates on page 331

l Performance reports in Performance system templates on page 361

l Status reports in Status system templates on page 442

l Troubleshooting reports in Troubleshooting system templates on page 482

Reports by object

66 Dell EMC Data Protection Advisor Report Reference Guide

Xsigo reportingXsigo reports are based on data gathered from Xsigo I/O Director and include reports from thefollowing system templates:

l Asset management in Asset Management system templates on page 70

l DPA in DPA system templates on page 331

l Performance in Performance system templates on page 361

l Status reports in Status system templates on page 442

l Troubleshooting reports in Troubleshooting system templates on page 482

System reportingSystem reports are based on data gathered from host operating systems, configuration, status,and performance of backup servers, media servers, and backup clients; and include reports fromthe following system templates:

l Asset management reports in Asset Management system templates on page 70

l Capacity planning reports in Capacity Planning system templates on page 85

l Change management reports in Change Management system templates on page 99

l Chargeback reports in Chargeback system templates on page 115

l Compliance and risk mitigation reports in Compliance system templates on page 119

l Configuration reports in Configuration system templates on page 132

l DPA in DPA system templates on page 331

l Data Protection reports in Data Protection system templates on page 178

l Performance reports in Performance system templates on page 361

l Recoverability reports in Recoverability system templates on page 389

l Resource utilization reports in Resource Utilization system templates on page 402

l Scheduling reports in Scheduling system templates on page 426

l Service level management reports in Service Level Management system templates on page436

l Status reports in Status system templates on page 442

l Troubleshooting in Troubleshooting system templates on page 482

Reports are also included in the Control Panels section of the DPA web console.

Data Protection Advisor reportingData Protection Advisor reports are based on performance, status, and security of DPA itself andinclude reports from the following system templates:

l DPA System reports in DPA system templates on page 331

Reports by object

Dell EMC Data Protection Advisor Report Reference Guide 67

Enterprise Application reportingEnterprise Application reports are based on data gathered from Enterprise Applications and includereports from the following system templates:

l Capacity planning reports in Capacity Planning system templates on page 85

l Change management reports in Change Management system templates on page 99

l Chargeback reports in Chargeback system templates on page 115

l Compliance and risk mitigation reports in Compliance system templates on page 119

l Configuration reports in Configuration system templates on page 132

l Data protection reports in Data Protection system templates on page 178

l DPA reports in DPA system templates on page 331

l Performance reports in Performance system templates on page 361

l Scheduling reports in Scheduling system templates on page 426

l Service level management reports in Service Level Management system templates on page436

l Status reports in Status system templates on page 442

Reports are also included in the Control Panels section of the DPA web console.

Reports by object

68 Dell EMC Data Protection Advisor Report Reference Guide

CHAPTER 4

Reports by System Template

This chapter describes the system templates that are available in DPA when you choose the reporttype and then choose the monitor objects to apply the report to

l What are system templates?.................................................................................................70l Asset Management system templates................................................................................... 70l Capacity Planning system templates..................................................................................... 85l Change Management system templates................................................................................99l Chargeback system templates..............................................................................................115l Compliance system templates.............................................................................................. 119l Configuration system templates...........................................................................................132l Data Protection system templates....................................................................................... 178l Database system templates................................................................................................. 316l DPA system templates......................................................................................................... 331l Licensing system templates.................................................................................................336l Media management system templates.................................................................................338l Operations system templates..............................................................................................360l Performance system templates........................................................................................... 361l Provisioning system templates............................................................................................ 389l Recoverability system templates.........................................................................................389l Resource Utilization system templates................................................................................402l ROI system templates......................................................................................................... 425l Scheduling system templates.............................................................................................. 426l Service Level Management system templates.....................................................................436l Status system templates..................................................................................................... 442l Troubleshooting system templates......................................................................................482l Viewlet system templates....................................................................................................485

Dell EMC Data Protection Advisor Report Reference Guide 69

What are system templates?System templates define reports. They contain the logic, operators, sources, output formatting,and field names that are used by DPA to generate the report results. Reports > Custom Reports >System Templates contains all the report templates available in DPA by default. Report results aredetermined by the object(s) that are passed to the template. System templates cannot bemodified. To change system template parameters or to create a custom template based on asystem template, make a copy of the template and save it with a unique name.

Asset Management system templatesAsset Management reports show the physical configuration of a machine’s components. The assetmanagement control panel provides a high-level view of a machine’s configuration.

These reports provide information on:

l Summary of the number of processors

l Amount of memory

l Number of network interfaces

l Number of Fibre Channel HBAs

l Disk and file system configuration on a machine

For more specific details on the various reports, select one of the reports described in thefollowing sections.

Battery ConfigurationReturns the battery configuration in a table report. Uses data from the Battery Configuration datasource.

l Node - Name of the object

l Name - Name of the battery

l Type - Type of battery

Card ConfigurationReturns the card configuration in a table report. Uses data from the Card Configuration datasource.

l Node - Name of the object

l Adaptor - Identifier for the adaptor

l Sub Name - Identifier for the storage array

l Serial - Serial number of the card

l Type - Type of the card: Fibre Channel, iSCSI, Network

l Manufacturer - Manufacturer of the card

l Model - Model of the card

l Name - Name of the card

l Description - Description of the card

Reports by System Template

70 Dell EMC Data Protection Advisor Report Reference Guide

l Hardware Version - Version of the card hardware

l Firmware Version - Version of the card firmware

l Driver Name - Name of the card driver

l Driver Version - Version of the card driver

l Enclosure - Identifier for the enclosure containing the disk

l Signature - Unique number assigned to the Storage Processor by the manufacturer

l Memory - Amount of memory on the card

l Read cache - Size of the card read cache

l Write cache - Size of the card write cache

l Buffer size - Size of the buffer

Disk / Filesystem CapacityReturns the disk and file system capacity in a column chart. Uses data from the Disk Configurationand Filesystem Capacity data sources.

l Size - Size of the disk in gigabytes

l Disk number - Disk number for the enclosure (0–15)

l Bus - Identifier for the disk bus

l Capacity - Total capacity of the disk or file system (in MB)

l Hostname - Name of the host on which the disk resides

l Filesystem - Name of the file system

l Sub Name - Identifier for the storage array

l Device - Name of the device on which the file system is located

l Type - Type of file system; for example, UFS, EXT3, and NTFS

Disk Array ConfigurationReturns the disk array configuration in a table report. Uses data from the Disk Array Config datasource.

l Hostname - Hostname or IP address of the disk array

l Sub name - Name of the storage array

l System Type - Type of system; for example, CLARiiON

l Manufacturer - Manufacturer of the disk array

l Model - Model number of the disk array

l Firmware - Version of software of the disk array

l Volume delay - Volume Repair Delay parameter of the disk array

l Cache page Size - Size of cache page (in KB)

l Num devices - Number of logical devices

l High watermark - Percentage of dirty pages to trigger a cache flush

l Low watermark - Percentage of dirty pages to stop a cache flush

l Num disks - Number of physical disks that the array holds

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 71

l Num RAID groups - Number of RAID groups that the array holds

l Num storage groups - Number of storage groups

l Unassigned cache pages - Number of unassigned cache pages

l Num visible devices - Number of visible devices

Disk ConfigurationReturns the disk configuration in a table report. Uses data from the Disk Configuration datasource.

l Hostname - Name of the host to which the disk is attached

l Sub name - Identifier for the Storage Array

l Device - Identifier for the disk from the operating system

l System type - Type of system; for example, CLARiiON

l Manufacturer - Manufacturer of the disk

l Model - Model of the disk

l Serial number - Serial number of the disk

l Firmware revision - Firmware version of the disk

l Size - Size of the disk (in GB)

l Enclosure - Identifier for the enclosure containing the disk

l Disk number - Disk number for the enclosure (0–15)

l Bus - Identifier for the bus connected to the disk

l Director - Identifier for the Symmetrix director

l Interface - Identifier for the network interface

l SCSI Id - Identifier for the SCSI interface

l RAID group - RAID group the disk belongs to

l Pool name - Name of the storage pool

Disk Count By StateReturns the disk count by state in a line chart. Uses data from the Disk Count By State datasource.

l Node - Object associated with the disk

l State - State of the disk

l Disks - Count of disks in this state

l Sub name - Identifier for the Storage Array

Disk Count By UseReturns the disk count by use in a line chart. Uses data from the Disk Count By Use data source.

l Node - Object associated with the disk

l Use - Use of the disk

l Disks - Count of disks used for this purpose

Reports by System Template

72 Dell EMC Data Protection Advisor Report Reference Guide

l Sub name - Identifier for the Storage Array

Disk SummarySummary of the disks on a host in a table report. Uses data from the Disk Configuration datasource.

l Hostname - Hostname of the disk array

l Disks - Disks that the array holds

l Size - Size of the disk

Fan ConfigurationReturns the fan configuration in a table report. Uses data from the Fan Configuration data source.

l Node - Name of the object

l Name - Name of the fane

l Make - Make of the fan

l Model - Model of the fan

l Serial - Serial number of the fan

l Location - Case location of the fan

Fibre Channel ConfigurationReturns the Fibre Channel configuration in a table report. Uses data from the Fibre Channel PortConfig data source.

l Hostname - Name of the switch

l Port - Identifier for the Fibre Channel port:

n If the port is named, the name of the port is used as the identifier

n If the port is not named, the index for the port is used as the identifier

l Sub name - If returning data for RecoverPoint, the name of site in which RecoverPointAppliance is located. Otherwise, the identifier for the Celerra Data Mover

l Sub name 2 - Name of the RecoverPoint Appliance

l Controller - Number of the controller

l WWPN - World Wide Port Name for the Fibre Channel interface

l Mode - Indicates if the port is a Target or Initiator

l OS Device - Device name from which Fibre Channel port is visible on the operating system(HBAs only)

l Internal - Indicates if the Fibre Channel port is internal, that is, if the port is connected tointernal hardware, and not a SAN (HP disk arrays only)

l Type - Type of Fibre Channel port on the switch or HBA

l Virtual - Indicates if the Fibre Channel port is virtual or physical

l WWNN - World Wide Node Name of the Fibre Channel port

l Auto neg - Indicates if autonegotation is enabled on this interface

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 73

Fibre Channel Port CountReturns in the Fibre Channel port count in a column chart. Uses data from the Fibre Channel PortConfig data source.

l Count - Number of ports on the switch

Filesystem ConfigurationReturns the file system configuration in a table report. Uses data from the FilesystemConfiguration data source.

l Hostname - Name of the host on which the file system is mounted

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Filesystem ID - File system internal identifier

l Device - Name of the device on which the file system is located. For example, /dev/vol0

l Type - Type of file system; for example, UFS, EXT3, NTFS

l Capacity - Total space on the file system available for standard usage (in MB)

l Files - Maximum number of files on the file system (1000)

l Allocated - Pre-allocated capacity of the file system. Note that this is not the same as the usedcapacity of the file system but applies to space that has been reserved but not necessarilyused (in MB)

l Snapshot Capacity - Amount of space reserved for the use of snapshots (in MB). If the totalamount of data stored for snapshots is higher than the amount of space reserved forsnapshots, additional space is claimed from the volume itself

l Save Volume - Volume used to allocate checkpoints for this file system

l Convert UCode - Force conversion of all directories to UNICODE format when accessedthrough both NFS and CIFS

l Create UCode - Force UNICODE format directories to be created by default

l SVO Enable - Perform "SnapValidator" (for Oracle data) integrity checking of all operations onvolume

l SVO Allow RMAN - "SnapValidator" (for Oracle data) integrity checks are compatible withvolumes containing RMAN backup data

l SVO Checksum - Perform "SnapValidator" (for Oracle data) checksum calculation for allwrites on volume

l SVO Reject Errors - Reject operation and return an error to client if any of "SnapValidator"integrity checks fail (otherwise failure is simply logged)

l Extent - Allow extents (in which application writes are written as a write of a larger group ofrelated data blocks)

l FS Size Fixed - File system remains a fixed size when volume size changes (for example, whenadding disks to a traditional volume or when a snapmirrored volume relationship is broken)

l Ignore Inconsistent - Ignore (at boot time) aggregate level inconsistencies that would normallybe considered serious enough to keep the associated volume offline

l Maximum Directory Size - Maximum size to which a directory can grow (in KB)

l Minra - Filer performs minimal file read ahead (instead of employing speculative read-ahead)

Reports by System Template

74 Dell EMC Data Protection Advisor Report Reference Guide

l A Time Update - A time on inode is always updated (otherwise a time on inode is not updatedwhen a file is read

l I2P - Inode to parent pathname translations are enabled

l No Snap - Automatic snapshots are disabled

l No Snap Dir - Snapshot directories are inaccessible

l Sched Snap Name - How scheduled snapshots are named: create_time (name constructedusing <type>.<creation_time> (For example, hourly.2007-06-20-1200)), ordinal (nameconstructed using <type>.<ordinal> (For example, hourly.0, hourly.1, ...))

l NV Fail - Filer checks at boot time to verify that NVRAM is in a valid state

l Try First - Specifies which policy to pursue first to reclaim space when volume is full:volume_grow (attempt to increase the size of the (flexible) volume), snap_delete (deletesnapshots)

l Fractional Reserve - Percentage of required reserved space actually reserved for overwrites ofreserved objects

l RAID Type - Type of RAID used: raid0, raid4, raid_dp

l RAID Size - Maximum number of disks in each RAID group

l Resync Snap Time - Mirror resynchronization snapshot frequency (in seconds)

l Root - Volume is the root volume for the filer (or will become so at next reboot)

l Snap Mirrored - Volume is a snapmirrored copy of another volume

l Sec Style - Security Mode for access: UNIX, CIFS, Mixed

l Op Locks - Indicates whether opportunistic locking is enabled on the file system

l Volume Size - Size of the volume (in MB)

l Device Host - Name of the host that the device is connected

Filesystem Configuration for FilesystemReturns the file system configuration for filesystem in a table report. Uses data from the ClusterResource Mapping and Filesystem Configuration data sources.

l Hostname - Name of the host on which the file system is mounted

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Filesystem ID - File system internal identifier

l Device - Name of the device on which the file system is located. For example, /dev/vol0

l Type - Type of file system; for example, UFS, EXT3, NTFS

l Capacity - Total space on the file system available for standard usage (in MB)

l Files - Maximum number of files on the file system (1000)

l Allocated - Pre-allocated capacity of the file system. Note that this is not the same as the usedcapacity of the file system but applies to space that has been reserved but not necessarilyused (in MB)

l Snapshot Capacity - Amount of space reserved for the use of snapshots (in MB). If the totalamount of data stored for snapshots is higher than the amount of space reserved forsnapshots, additional space is claimed from the volume itself

l Save Volume - Volume used to allocate checkpoints for this file system

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 75

l Convert UCode - Force conversion of all directories to UNICODE format when accessedthrough both NFS and CIFS

l Create UCode - Force UNICODE format directories to be created by default

l SVO Enable - Perform "SnapValidator" (for Oracle data) integrity checking of all operations onvolume

l SVO Allow RMAN - "SnapValidator" (for Oracle data) integrity checks are compatible withvolumes containing RMAN backup data

l SVO Checksum - Perform "SnapValidator" (for Oracle data) checksum calculation for allwrites on volume

l SVO Reject Errors - Reject operation and return an error to client if any of "SnapValidator"integrity checks fail (otherwise failure is simply logged)

l Extent - Allow extents (in which application writes are written as a write of a larger group ofrelated data blocks)

l FS Size Fixed - File system remains a fixed size when volume size changes (for example, whenadding disks to a traditional volume or when a snapmirrored volume relationship is broken)

l Ignore Inconsistent - Ignore (at boot time) aggregate level inconsistencies that would normallybe considered serious enough to keep the associated volume offline

l Maximum Directory Size - Maximum size to which a directory can grow (in KB)

l Minra - Filer performs minimal file read-ahead (instead of employing speculative read-ahead)

l A Time Update - A time on inode is always updated (otherwise a time on inode is not updatedwhen a file is read

l I2P - Inode to parent pathname translations are enabled

l No Snap - Automatic snapshots are disabled

l No Snap Dir - Snapshot directories are inaccessible

l Sched Snap Name - How scheduled snapshots are named: create_time (name constructedusing <type>.<creation_time> (For example, hourly.2007-06-20-1200)), ordinal (nameconstructed using <type>.<ordinal> (For example, hourly.0, hourly.1, ...))

l NV Fail - Filer checks at boot time to verify that NVRAM is in a valid state

l Try First - Specifies which policy to pursue first to reclaim space when volume is full:volume_grow (attempt to increase the size of the (flexible) volume), snap_delete (deletesnapshots)

l Fractional Reserve - Percentage of required reserved space actually reserved for overwrites ofreserved objects

l RAID Type - Type of RAID used: raid0, raid4, raid_dp

l RAID Size - Maximum number of disks in each RAID group

l Resync Snap Time - Mirror resynchronization snapshot frequency (in seconds)

l Root - Volume is the root volume for the filer (or will become so at next reboot)

l Snap Mirrored - Volume is a snapmirrored copy of another volume

l Sec Style - Security Mode for access: UNIX, CIFS, Mixed

l Op Locks - Indicates whether opportunistic locking is enabled on the file system

l Volume Size - Size of the volume (in MB)

l Internal - Indicates if the fibre channel port is internal (if the port is connected to internalhardware, and not a SAN)

Reports by System Template

76 Dell EMC Data Protection Advisor Report Reference Guide

Filesystem Configuration SummarySummary of the file system configuration in a table report. Uses data from the FilesystemConfiguration data source.

l Hostname - Name of the host on which the file system is mounted

l Filesystem Count - Number of ports on the file system

l Total Capacity - Total capacity for all selected clients (in MB)

Filesystem DetailsReturns the file system details in a table report. Uses data from the Filesystem Configuration andFilesystem Status data sources.

l Hostname - Name of the host on which the file system is mounted

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Filesystem ID - File system internal identifier

l Device - Name of the device on which the file system is located. For example, /dev/vol0

l Type - Type of file system; for example, UFS, EXT3, NTFS

l Capacity - Total space on the file system available for standard usage (in MB)

l Files - Maximum number of files on the file system (1000)

l Allocated - Pre-allocated capacity of the file system. Note that this is not the same as the usedcapacity of the file system but applies to space that has been reserved but not necessarilyused (in MB)

l Snapshot capacity - Amount of space reserved for the use of snapshots (in MB). If the totalamount of data stored for snapshots is higher than the amount of space reserved forsnapshots, additional space is claimed from the volume itself

l Save Volume - Volume used to allocate checkpoints for this file system

l Used Space - Amount of space that is currently used on the file system in megabytes

l Used Files - Total number of files that are on the file system

l Used Snapshot Space - Amount of snapshot space used on the file system in megabytes

Filesystem Disk ConfigurationReturns the file system disk configuration in a table report. Uses data from the Filesystem DiskConfiguration data source.

l Filesystem node - Name of the object to which the file system is attached

l Filesystem - Name of the file system

l Filesystem Sub Name - Identifier for the storage array on which the file system resides

l Disk node - Name of the object to which the disk is attached

l Disk - Identifier of the disk

l Disk Sub Name - Name of the storage array on which the disk resides

l Manufacturer - Manufacturer of the disk

l Model - Model of the disk

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 77

l Serial Number - Serial number of the disk

l Firmware Revision - Firmware version of the disk

l Size - Size of the disk (in GB)

Filesystem SummarySummary of the file system in a table report. Uses data from the Filesystem Capacity andFilesystem User Space data sources.

l Used space - Total amount of used space on all hosts (in MB)

l Hostname - Name of the host on which the file system is mounted

l Filesystem - Name of the file system

l Sub Name - Identifier for the Storage Array

l Used Files - Total number of files that are on the file system

l Capacity - Total space on the file system available for standard usage (in MB)

l Device - Name of the device on which the file system is located. For example, /dev/vol0

l Type - Type of file system; for example, UFS, EXT3, NTFS

Filesystem Summary By ClientSummary of the file system by client in a table report. Uses data from the Filesystem Capacity ByClient and Filesystem User Space By Client data sources.

l Hostname - Name of the host on which the file system is mounted

l Used Space - Total amount of used space on all hosts (in MB)

l Filesystem - Name of the file system

l Sub Name - Identifier for the Storage Array

l Used Files - Total number of files that are on the file system

l Capacity - Total space on the file system available for standard usage (in MB)

l Device - Name of the device on which the file system is located. For example, /dev/vol0

l Type - Type of file system; for example, UFS, EXT3, NTFS

Host ConfigurationReturns the host configuration in a table report. Uses data from the Host Configuration datasource.

l Hostname - Name or IP address of the host

l Sub Name - Identifier for the storage array

l Vendor - Vendor name

l Controller - Controller name

l Product - Product name

l OS Class - Class of operating system (Windows or UNIX)

l Version - Version of the operating system

l iSCSI Name - Node name for machines with iSCSI interfaces. This field is not displayed formachines that do not have iSCSI interfaces

Reports by System Template

78 Dell EMC Data Protection Advisor Report Reference Guide

l Host ID - ID or serial number of the host

l Location - Hardware location

l Mail Server - Mail server name

Host CountReturns the host count in a column chart. Uses data from the Host Configuration data source.

l Count - Number of hosts

l Location - Hardware location

l Mail Server - Mail server name

Host OS DistributionReturns the host OS distribution in a pie chart. Uses data from the Host Configuration datasource.

l Product - Product name

l Hosts - ID or serial number of the host

l Location - Hardware location

l Mail Server - Mail server name

Host Summary By ClassReturns the host summary by class in a pie chart. Uses data from the Host Configuration datasource.

l OS Class - Class of operating system (Windows or UNIX)

l Hosts - ID or serial number of the host

l Location - Hardware location

l Mail Server - Mail server name

Host Summary By PlatformReturns the host summary by platform in a pie chart. Uses data from the Host Configuration datasource.

l Product - Product name

l Hosts - ID or serial number of the host

l Location - Hardware location

l Mail Server - Mail server name

Host Summary By VendorReturns the host summary by vendor in a pie chart. Uses data from the Host Configuration datasource.

l Vendor - Vendor name

l Hosts - ID or serial number of the host

l Location - Hardware location

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 79

l Mail Server - Mail server name

Host Summary By VersionReturns the host summary by version in a pie chart. Uses data from the Host Configuration datasource.

l Version - Version of the operating system

l Hosts - ID or serial number of the host

l Location - Hardware location

l Mail Server - Mail server name

iSCSI ConfigurationReturns information on the configuration of iSCSI adapters on a object in a table report. Uses datafrom the iSCSI Configuration data source.

l Node - Name of the object on which the iSCSI adapter exists

l Sub Name - Identifier for the Storage Array

l Name - Name of the iSCSI adapter

LUN ConfigurationReturns the LUN configuration in a table report. Uses data from the LUN Configuration datasource.

l Node - Name of the array on which the LUN exists

l Sub Name - Identifier for the storage array on which the LUN resides

l Name - Name of the LUN

l LUN Name - Name of the LUN on the storage system to which the disk-based volume ismapped. Populated only for disk-based volumes

l System Type - Type of system. For example, CLARiiON

l LUN ID - Identifier for the LUN

l Serial - Serial number of the LUN

l Size - Size of the LUN (in GB)

l Volume - Volume on which the LUN resides, if applicable

l Type - Type of operating system to which the LUN is exported: AIX, HPUX, Image, Linux,Netware, Solaris, VMware, Windows

l Description - Description of the LUN

l Guarantee - Type of reserve on the LUN: Full, None

l Created - Time the LUN was created

l Create Time - Timestamp of the LUN creation

l RAID Level - RAID level of the LUN

l Idle Delay Time - Time spent idle waiting for a task (in seconds)

l Idle Threshold - Maximum time spent idle before idle threshold action

l Max Prefetch (Blocks) - Maximum number of pages read ahead

Reports by System Template

80 Dell EMC Data Protection Advisor Report Reference Guide

l Prefetch Disable (Blocks) - Reading ahead is disabled

l Prefetch Idle Count - Maximum number of pages read ahead while idle

l Pool - Pool name

l RAID Group - RAID group the disk belongs to

LUNs And Filesystems On Same Volume for rulesetReturns details on LUNs and file systems are on the same volumes in a table report. Uses datafrom the File server exports and LUN Configuration data sources.

l Node - Name of the array on which the LUN exists

l Alert - Identifier of the alert

Memory ConfigurationReturns the memory configuration in a table report. Uses data from the Memory Configurationdata source.

l Physical Memory - Amount of physical memory (in MB)

l Virtual Memory - Amount of virtual memory (in MB)

Memory Configuration DetailsReturns details of the memory configuration in a table report. Uses data from the MemoryConfiguration data source.

l Hostname - Name of the host

l Sub Name - Identifier for the storage array

l Physical Memory - Amount of physical memory (in MB)

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Multiple Tape Drive Firmware Revisions for rulesetReturns the multiple tape drive firmware revisions in a table report. Report for Multiple tape drivefirmware revisions rule. Uses data from the Tape Drive Configuration data source.

l Alert - Identifier of the alert

Network Interface ConfigurationReturns the network interface configuration in a table report. Uses data from the NetworkInterface Config data source.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Identifier for the storage array

l Interface - Interface name

l Description - Optional description for the interface

l MAC Address - MAC address of the interface

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 81

l Autoneg - Indicates if the interface is set to auto negotiate

l MTU - Maximum Unit of Transmission for the interface (largest packet size) (in bytes)

l Failover - Standby interface if the primary interface goes down

l Multicast - If enabled, the interface can send data to more than one address at the same time

l Receive Buffer - Amount of data that can be received before sending a reply (in bytes). If sizeis not specified on the interface, then the system-wide settings are used

l Send Buffer - Amount of data that can be sent before receiving a reply (in bytes). If size is notspecified on the interface, then the system-wide settings are used

l Virtual - Indicates if the network interface is virtual or physical

l Jumbo Packets Enabled - Indicates that Jumbo Packets are enabled by default.

Network Interface CountReturns the network interface count in a column chart. Uses data from the Network InterfaceConfig data source.

l Count - Number of interfaces

Processor ConfigurationReturns the processor configuration in a table report. Uses data from the Processor Configurationdata source.

l Hostname - Hostname in which the processors are running

l Sub Name - Identifier for the Storage Array

l Num - Processor number

l Make - Make of the processors. For example, Intel

l Model - Model of the processor

l Speed - Speed of the processor (in MHz)

l Bus Speed - Speed of bus (in MHz)

Processor Configuration SummarySummary of the processor configuration in a column chart. Uses data from the ProcessorConfiguration data source.

l Model - Model of the processor

l Count - Number of processors

PSU ConfigurationReturns the PSU configuration in a table report. Uses data from the PSU Configuration datasource.

l Node - Name of the object

l Name - Name of the PSU

l Make - Make of the PSU

l Model - Model of the PSU

l Serial - Serial number of the PSU

Reports by System Template

82 Dell EMC Data Protection Advisor Report Reference Guide

l Location - Location of the PSU

Solid State Storage ConfigurationReturns the solid state storage configuration in a table report. Uses data from the Solid StateStorage Configuration and Solid State Storage Status data sources.

l Hostname - Name of machine hosting solid state storage device

l Size - NVRAM (non-volatile random-access memory) capacity (in MB)

l Window Size - Maximum size of data that can be received at one time by the solid state device(in MB)

l PCI Error Count - Number of PCI errors on NVRAM

l Error Count - Number of errors on NVRAM

Spare Disk Count by Use for rulesetReturns the spare disk count in a table report. Report for Running out of spare disks rule. Usesdata from the Disk Count By Use, Report Times, and User Input data sources.

l Node - Name of the object

l Alert - Identifier of the alert

Spare Disk Count for rulesetReturns the spare disk count in a table report. Report for Few spare disks rule. Uses data from theDisk Count By Use and User Input data sources.

l Node - Name of the object

l Alert - Identifier of the alert

Tape Drive ConfigurationReturns the tape drive configuration in a table report. Uses data from the Tape Drive Configurationdata source.

l Hostname - Hostname of the device being monitored

l Device Name - Name of the tape drive

l Make - Make of the tape drive. For example, Quantum

l Model - Model of the tape drive

l Firmware - Firmware version running on the tape drive

l Serial - Serial number of the tape drive

l Interface Type - Type of interface the drive has. For example, SCSI, fibre

l Interface Address - Address of the drive interface if fibre attached

l Virtual - Indicates if the tape drive is a virtual tape drive

l Controller Firmware - Firmware version for controller

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 83

Tape Drive Firmware RevisionsReturns the tape drive firmware revisions in a table report. Uses data from the Tape DriveConfiguration data source.

l Model - Model of the tape drive

l Firmware revisions - Firmware version running on the tape drive

Tape Drive Firmware SummarySummary of the tape drive firmware in a column chart. Uses data from the Tape DriveConfiguration data source.

Note: It is possible to gather data on only the firmware version of virtual tape drives, Physicaltape drives are not reflected in this chart.

l Firmware - Firmware version running on the tape drive

l Count - Number of tape drives

Tape Drive Interface SummarySummary of the tape drive interface in a column chart. Uses data from the Tape DriveConfiguration data source.

l Interface Type - Type of interface the drive has. For example, SCSI, fibre

l Count - Number of tape drives

Tape Drive Model SummarySummary of the tape drive models in a column chart. Uses data from the Tape Drive ModelSummary data source.

l Model - Model of the tape drive

l Count - Number of tape drives

Tape Library ConfigReturns the tape library configuration in a table report. Uses data from the Tape LibraryConfiguration data source.

l Hostname - Name of the device being monitored. For normal tape libraries, this value is thename of the tape library. For devices supporting multiple tape libraries such as an EDL, thisvalue is the name of the manager

l Library Name - Name of the tape library. This field is not populated if monitoring a librarydirectly. It is populated if monitoring a device that supports multiple libraries such as an EDL.Physical tape drives do not return information on the tape library in which they are a member.

l Vendor - Tape library vendor. For example, StorageTek or Quantum

l Model - Model of the tape library

l Firmware - Firmware of the tape library

l Serial - Serial number of the tape library

l Num Hands - Number of robotic hands in the tape library

Reports by System Template

84 Dell EMC Data Protection Advisor Report Reference Guide

l Num Slots - Number of slots in the tape library

l Num Caps - Number of cartridge access ports in the tape library

l Num Drives - Number of tape drives in the tape library

l Num Modules - Number of modules in the tape library

l Virtual - Indicates if this tape library is a virtual tape library

l Dedup Enabled - Indicates if deduplication is enabled on the virtual tape library

l Replication Enabled - Indicates if replication is enabled on the virtual tape library

l Backup Window - Indicates if a backup window has been defined, during which deduplicationoperations will not take place

l Backup Window Start Time - Start time of backup window (in seconds)

l Backup Window End Time - End time of backup window (in seconds)

Thermometer ConfigurationReturns the thermometer configuration in a table report. Uses data from the ThermometerConfiguration data source.

l Node - Name of the object

l Name - Name of the thermometer

l Make - Make of the thermometer

l Model - Model of the thermometer

l Serial - Thermometer Serial number

l Location - Location of the thermometer

Xsigo Infiniband Port ConfigurationReturns information on the InfiniBand ports on Xsigo switches in a table report. Uses data from theInfiniband Port Configuration data source.

l Hostname - Name of the Xsigo Director object

l Name - Identifier for the InfiniBand port

Capacity Planning system templatesCapacity Planning reports show the growth of the backup environment over time, which allowsplanning for future growth There are two types of Capacity Planning reports:

l Backup reports, which show growth in the number of Jobs that were backed up and theamount of data backed up in those Jobs

l Media reports, which show growth in the number of volumes and the amount of data managedby the backup server

For more specific details on the various reports, select one of the reports described in thefollowing sections.

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 85

Application GrowthReturns application growth in a table report. Uses data from the Application Growth data source.

l Hostname - Name of the host

l Initiator - Path initiator

l Component Name - Name of the component

l Component Type - Type of component

l Capacity - Total capacity (in GB)

l Growth - Total growth (in GB)

Application UsageReturns details of application usage in a table report. Uses data from the Masking Configuration,Component LUN, and LUN Configuration data sources.

l Disk Array Name - Name of the disk array

l Hostname - Name of the host

l Initiator - Initiator of the session

l LUN - Logical unit number (LUN) through which the disk can be accessed by the source

l Capacity - Size of the disk (in GB)

l Component Name - Name of the component

l Component Type - Type of component

Avamar Client Usage StatisticsReturns information on the Avamar client usage statistics in a table report. Uses data from theAvamar Garbage Collection Status, Backup Client Config, Backup Job Details, Last Backup Details,and Num Jobs data sources.

l Client - Name of the client on the backup server

l Domain Name - Avamar domain to which the client belongs

l Avg Daily Data Transferred -

l Last Backup End Time - Time the last incremental backup finished on the client

l Data Protected on Client -

l Change Rate -

l De-Dupe Rate - Average amount of data deduplicated

l Retention of Last Backup - Length of time for which job is retained

l Server - Name of the Avamar server

l Total Data Transferred in Period -

l # of successful backups -

l Client Added/Deleted -

Reports by System Template

86 Dell EMC Data Protection Advisor Report Reference Guide

Avamar Garbage Collection Data RecoveredReturns information on the Avamar garbage collection process in a column chart. Uses data fromthe Avamar Garbage Collection Status data source.

l Server - Name of the Avamar server

l Sub Name - Name of the Avamar client

l ID - Identifier for the garbage collection process

l Recovered - Number of bytes recovered by the collection process (in MB)

l Recovered Offset - Number of bytes that should be added or deleted from the Recovered fieldto return the size of data recovered by garbage collection

Backup Daily Staging By Storage PoolReturns the backup daily staging by storage pool in a column chart. Uses data from the TSM TotalSize Migrated By Storage Pool data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool

l Size - Total amount of data migrated from the storage pool (in MB)

Backup Daily Total Group DurationReturns the total duration of group runs for each 24 hour interval in a table report. Uses data fromthe Backup Group Duration data source.

l Server - Name of the backup server

l Group - Name of the group on the backup server

l Total Duration - Total duration of the group run

l Noted - Timestamp associated with the total duration value

Backup Data Backed Up DailyReturns the total data that are backed up daily in a column chart. Uses data from the Total Sizedata source.

l Total Size - Total amount of data backed up in a window (in GB)

Backup Data Backed Up Daily By DeviceReturns the total data by device that are backed up daily in a column chart. Uses data from theTotal Size By Device data source.

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device

l Total Size - Total amount of data (in MB)

l Media Server - Name of the media server on which the backup occurred

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 87

Backup Data Backed Up Daily By Media ServerReturns the total data by media server that are backed up daily in a column chart. Uses data fromthe Total Size data source.

l Total Size - Total amount of data backed up (in GB)

l Media Server - Name of the media server on which the backup occurred

Backup Data Backed Up Daily By ServerReturns the total data by server that are backed up daily in a column chart. Uses data from theTotal Size data source.

l Total Size - Total amount of data backed up (in GB)

l Server - Name of the server on which the backup occurred

Backup Data Backed Up WeeklyReturns the total data that are backed up weekly in a column chart. Uses data from the Total Sizedata source.

l Total Size - Total amount of data backed up (in GB)

Backup Data Backed Up Weekly By Media ServerReturns the total data by media server that are backed up weekly in a column chart. Uses datafrom the Total Size data source.

l Total Size - Total amount of data backed up (in GB)

l Media Server - Name of the media server on which the backup occurred

Backup Data Backed Up Weekly By ServerReturns the total data by server that are backed up weekly in a column chart. Uses data from theTotal Size data source.

l Total Size - Total amount of data backed up (in GB)

l Server - Name of the server on which the backup occurred

Backup Duration of Jobs Backed Up DailyReturns the total duration of jobs that are backed up daily in a column chart. Uses data from theTotal Duration data source.

l Total Duration - Total duration of backups up in a window (in seconds)

Backup Duration of Jobs Backed Up Daily By Media ServerReturns the total duration of jobs by media server that are backed up daily in a column chart. Usesdata from the Total Duration data source.

l Total Duration - Total duration of backups up in a window (in seconds)

l Media Server - Name of the media server on which the backup occurred

Reports by System Template

88 Dell EMC Data Protection Advisor Report Reference Guide

Backup Duration of Jobs Backed Up Daily By ServerReturns the total duration of jobs by server that are backed up daily in a column chart. Uses datafrom the Total Duration data source.

l Total Duration - Total duration of backups up in a window (in seconds)

l Server - Name of the server on which the backup occurred

Backup Duration of Jobs Backed Up WeeklyReturns the total duration of jobs that are backed up weekly in a column chart. Uses data from theTotal Duration data source.

l Total Duration - Total duration of backups up in a window (in seconds)

Backup Duration of Jobs Backed Up Weekly By Media ServerReturns the total duration of jobs by media server that are backed up weekly in a column chart.Uses data from the Total Duration data source.

l Total Duration - Total duration of backups up in a window (in seconds)

l Media Server - Name of the media server on which the backup occurred

Backup Duration of Jobs Backed Up Weekly By ServerReturns the total duration of jobs by server that are backed up weekly in a column chart. Uses datafrom the Total Duration data source.

l Total Duration - Total duration of backups up in a window (in seconds)

l Server - Name of the server on which the backup occurred

Backup Files Backed Up DailyReturns the total number of files that are backed up daily in a column chart. Uses data from theTotal Files data source.

l Total Files - Total number of files backed up

Backup Files Backed Up Daily By Media ServerReturns the total number of files by media server that are backed up daily in a column chart. Usesdata from the Total Files data source.

l Total Files - Total number of files backed up

l Media Server - Name of the media server on which the backup occurred

Backup Files Backed Up Daily By ServerReturns the total number of files by server that are backed up daily in a column chart. Uses datafrom the Total Files data source.

l Total Files - Total number of files backed up

l Server - Name of the server on which the backup occurred

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 89

Backup Files Backed Up WeeklyReturns the total number of files that are backed up weekly in a column chart. Uses data from theTotal Files data source.

l Total Files - Total number of files backed up

Backup Files Backed Up Weekly By Media ServerReturns the total number of files by media server that are backed up weekly in a column chart.Uses data from the Total Files data source.

l Total Files - Total number of files backed up

l Media Server - Name of the media server on which the backup occurred

Backup Files Backed Up Weekly By ServerReturns the total number of files by server that are backed up weekly in a column chart. Uses datafrom the Total Files data source.

l Total Files - Total number of files backed up

l Server - Name of the server on which the backup occurred

Backup Number of Jobs Backed Up DailyReturns the total number of jobs that are backed up daily in a column chart. Uses data from theNum Jobs data source.

l Num Jobs - Number of jobs that have completed

Backup Number of Jobs Backed Up Daily By Media ServerReturns the total number of jobs by media server that are backed up weekly in a column chart.Uses data from the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

l Media Server - Name of the media server on which the backup occurred

Backup Number of Jobs Backed Up Daily By ServerReturns the total number of jobs by server that are backed up weekly in a column chart. Uses datafrom the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

l Server - Name of the server on which the backup occurred

Backup Number of Jobs Backed Up HourlyReturns the total number of jobs that are backed up each week in a column chart. Uses data fromthe Num Jobs data source.

l Num Jobs - Number of jobs that have completed

Reports by System Template

90 Dell EMC Data Protection Advisor Report Reference Guide

Backup Number of Jobs Backed Up WeeklyReturns the total number of jobs that are backed up weekly in a column chart. Uses data from theNum Jobs data source.

l Num Jobs - Number of jobs that have completed

Backup Number of Jobs Backed Up Weekly By Media ServerReturns the total number of jobs by media server that are backed up weekly in a column chart.Uses data from the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

l Media Server - Name of the media server on which the backup occurred

Backup Number of Jobs Backed Up Weekly By ServerReturns the total number of jobs by server that are backed up weekly in a column chart. Uses datafrom the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

l Server - Name of the server on which the backup occurred

Capacity Overview for BlockReturns the block capacity overview in a column chart. Uses data from the Disk Configuration,RAID Group Configuration, and Storage Pool Config data sources.

l Capacity - Identifies the amount of potential capacity (in GB)

l Type - Type of system. For example, CLARiiON

l Sub Type -

Capacity Overview for FileReturns the file capacity overview in a column chart. Uses data from the Filesystem Configuration,Filesystem Status, Storage Pool Configuration, and Volume Configuration data sources.

l Value - (in MB)

l Type - Type of system. For example, CLARiiON

l Sub Type -

Data Domain Total Replicated CapacityReturns the Data Domain total replicated capacity in a table report. Uses data from the TotalReplicated Capacity data source.

l Hostname - Hostname of replicating server

l Destination Host - Unique identifier for the destination of replication

l Average Capacity - Average replicated capacity (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 91

Media Count By Location TrendReturns the media count by location trend in a line chart. Uses data from the Media Count ByLocation data source.

Note: Volumes that are offline are not displayed.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l Media Count - Total number of volumes configured on each backup server

Media Count By Pool and Location TrendReturns the count by pool and location trend in a line chart. Uses data from the Media Count ByPool and Location data source.

Note: Volumes that are offline are not displayed

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l Media Count - Total number of volumes configured on each backup server

l Pool - Name of the pool

Media Count By Pool and State and Location TrendReturns the media count by pool and state and location trend in a line chart. Uses data from theMedia Count By Pool and State and Location data source.

Note: Volumes that are offline are not displayed

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l Pool - Name of the pool

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count By Pool And State TrendReturns the media count by pool and state trend in a line chart. Uses data from the Media CountBy Pool and State data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

Reports by System Template

92 Dell EMC Data Protection Advisor Report Reference Guide

l Pool - Name of the pool

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count By Pool TrendReturns the media count by pool trend in a line chart. Uses data from the Media Count By Pooldata source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Pool - Name of the pool

Media Count By State and Location TrendReturns the media count by state and location trend in a line chart. Uses data from the MediaCount By State and Location data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l Pool - Name of the pool

l Media Count - Total number of volumes configured on each backup server

Media Count By State TrendReturns the media count by state trend in a line chart. Uses data from the Media Count By Statedata source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count TrendReturns the media count trend in a line chart. Uses data from the Media Count data source.

l Media Count - Total number of volumes configured on each backup server

Media Usage By Library TrendReturns the media usage by library trend in a line chart. Uses data from the Media Usage ByLocation data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the tape library in which the volume is located

l Media Usage - Total amount of data stored in that location (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 93

Media Usage By Pool and Library TrendReturns the media usage by pool and library trend in a line chart. Uses data from the Media UsageBy Pool and Location data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the tape library in which the volume is located

l Media Usage - Amount of data broken down by pool and location (in MB)

l Pool - Name of the media pool

Media Usage By Pool TrendReturns the media usage by pool trend in a line chart. Uses data from the Media Usage By Pooldata source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Pool - Name of the tape pool

l Media Usage - Total amount of data stored in that pool (in MB)

Media Usage TrendReturns the media usage trend in a line chart. Uses data from the Media Usage data source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Media Usage - Total amount of data stored on all media (in MB)

Networker Individual Job Size for Data DomainReturns the Networker individual job size for Data Domain in a column chart. Uses data from theBackup Device Status, Backup Device Config, Pools On Data Domain, Backup Job Device Mapping,and Backup Job Details with Volume data sources.

l Server - Name of the backup server

l Job - Name of the backup job

l Size - The size of the backup job

l Device Access - Name of the Data Domain server instance.

NetWorker Total Job Size and Used Space for Data DomainReturns the NetWorker total job size and the used space for Data Domain in a table report. Usesdata from the Backup Device Status, Backup Device Config, Pools On Data Domain, Backup JobDevice Mapping, Backup Job Details with Volume, and Filesystem Configuration data sources.

l Server - Name of the backup server

l Data Domain Name - Name of the Data Domain host

l Total Job Size - Amount of data backed up (in MB)

Reports by System Template

94 Dell EMC Data Protection Advisor Report Reference Guide

l Filesystem Used Size - Total amount of used space on all hosts (in MB)

Pool Capacity UsageReturns the pool capacity usage in a line chart. Uses data from the RAID Group Configuration andStorage Pool Config data sources.

l Hostname - Name of the server

l Pool Name - Name of the storage pool

l User Size - The free capacity on a storage pool over the time period

l Free Capacity -

l Used Capacity - The used capacity on a storage pool

Pool Capacity Usage for PoolReturns the pool capacity usage for pool in a line chart. Uses data from the RAID Group Locationand Storage Pool Config data sources.

l Hostname - Hostname or IP address of the host being monitored

l Name - Storage Pool name

l User Size - Amount of storage used by the pool (in MB)

l Free Capacity - Free capacity of the storage pool (in MB)

l Consumed Capacity - Amount of storage used by the pool (in MB)

l Logical Capacity - Potential capacity of the storage pool (in MB)

l Used Capacity - Amount of storage used by the pool (in MB)

RecoverPoint Protected CapacityReturns the protected data capacity by RecoverPoint server in a table. Uses data from theConsistency Group Data Protected and Consistency Group Copy Configuration data sources.

l Server - Name or IP address of the Management Interface of the RecoverPoint server

l Data Protected - Total amount of data protected (in MB)

Save Pool Detailed UsageReturns the detailed usage of save pool in a table report. Uses data from the Component LUN,Symmetrix Local Replications, and Symmetrix Snapshot Rule Status data sources.

l Hostname - Hostname or IP address of the host being monitored

l Disk Array Name - Identifier for the array

l Source Device -Name of the device on the storage array where the source object is located

l Target Device - Name of the device where the source is being replicated

l Snap Time -

l Save Pool -

l Used Capacity - Amount of storage used by the pool (in MB)

l Changed -

l Replication Method - Method by which the object has been replicated

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 95

l Component Name - Name of the component

l Component Type - Type of the component

Save Pool UsageReturns the usage of a save pool in a table report. Uses data from the Save Pool Configuration andSave Pool Status data sources.

l Pool Name - Name of the storage pool

l Array Name - Name of the array

l Total Capacity - Total capacity (in GB)

l Enabled Capacity - Enabled capacity (in GB)

l Used Capacity - Amount of storage used by the pool (in GB)

l Pool ID - Identifier for the pool

l Used - Amount used (as a percentage)

l State - State of the pool: Empty, Partial, Full, Frozen, Suspended

Snapshot UtilizationReturns the snapshot utilization in a line chart. Uses data from the Save Pool Configuration andSave Pool Status data sources.

l Array Name - Storage array name

l Pool Name - Name of the storage pool

l Usage Percentage - Utilization of the allocated snapshot space

Storage Array CapacityReturns the storage array capacity in a table report. Uses data from the Disk Array Status and DiskConfiguration data sources.

l Array Name - Storage array name

l Total Raw Capacity - Identifies the amount of raw capacity (in GB)

l Used Raw Capacity - Identifies how much of the raw capacity is used (in GB)

l Available Raw Capacity - Identifies how much of the raw capacity is available (in GB)

l Predicted Available -

l Out of Space (Estimated Time) - Amount of time into the future at which the storage array willbe out of space

Storage Array Capacity UsageReturns the storage array capacity usage in a line chart. Uses data from the Disk Array Status datasource.

l Hostname - Name of the host being monitored

l Used Capacity - Identifies how much of the capacity is used (in GB)

l Available Capacity - Identifies how much of the capacity is available (in GB)

l Total Capacity - Identifies the amount of capacity (in GB)

Reports by System Template

96 Dell EMC Data Protection Advisor Report Reference Guide

Storage Array Filling Up for rulesetReturns details when storage array is filling up in a table report. Report for Storage array is fillingup rule. Uses data from the Disk Configuration, Disk Status, RAID Group Configuration, StoragePool Config, and User Input data sources.

l Array Name - Storage array name

l Available Raw Capacity - Identifies how much of the raw capacity is available (in GB)

l Type -

l Pool -

l Free Capacity - Identifies how much of the capacity is available (in GB)

l Initial Consumed Capacity -

l Alert - Identifier of the alert

Storage Array Raw CapacityReturns the storage array raw capacity in a table report. Uses data from the Disk Array Config,Disk Array Status, Disk Configuration, Disk Status data sources. Raw capacity is considered to bethe total usable capacity of any disk that has not been put in a RAID group or block storage pool(not taking into account loss of space caused by the RAID protection or other overhead).

l Array Name - Storage array name

l Type -

l Total Raw Capacity - Identifies the amount of raw capacity (in GB)

l Used Raw Capacity - Identifies how much of the raw capacity is used (in GB)

l Available Raw Capacity - Identifies how much of the raw capacity is available (in GB)

l Prediction Time -

l Predicted Available - (in GB)

Storage Pool Application GrowthReturns the growth of the storage pool application in a table report. Uses data from the PoolApplication Growth data source.

l Hostname - Name of the host

l Initiator - Path initiator

l Component Name - Name of the component

l Component Type - Type of component

l Capacity - Total capacity (in GB)

l Growth - Total growth (in GB)

l Pool Name - Name of the pool

l Type - Type of the pool

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 97

Storage Pool Application UsageReturns the usage of the storage pool application in a table report. Uses data from the ComponentLUN, LUN Configuration, and Masking Configuration data sources.

l Pool Name - Name of the storage pool

l Initiator -

l Hostname -

l Disk Array Name -

l Capacity -

l LUN - Logical unit name (LUN) through which the disk can be accessed by the source

Storage Pool CapacityReturns the capacity of the storage pool in a table report. Uses data from the RAID GroupConfiguration and Storage Pool Config data sources.

l Array Name - Name of the storage array

l Pool Name - Name of the storage pool

l Type -

l Raw Capacity -

l User Capacity -

l Used Capacity -

l Subscribed -

l Free Capacity -

l Pool Type - Type of storage pool: Primary, Copy, or Active Data

l Out of Space (Estimated Time) -

Storage Pool Raw Capacity PeriodicReturns the periodic storage pool raw capacity in a line chart. Uses data from the RAID GroupConfiguration and Storage Pool Config data sources.

l Disk Array -

l Pool Name - Name of the storage pool

l Free Capacity -

l Pool Type - Type of storage pool: Primary, Copy, or Active Data

l Type -

l Disk Array -

l Pool Name - Name of the storage pool

l Free Capacity -

l Type-

Reports by System Template

98 Dell EMC Data Protection Advisor Report Reference Guide

TSM Daily Migration By Storage PoolReturns the TSM daily migration by storage pool in a column chart. Uses data from the TSMBackup Set and TSM Total Size Migrated By Storage Pool data sources.

l Server - Name of the TSM Server

l Sub Name -

l Storage Pool - Name of the storage pool

l Size - Total size of the migration jobs that were run on the storage pool

TSM Daily Reclamation By Storage PoolReturns the TSM daily reclamation by storage pool in a column chart. Uses data from the TSMTotal Size Reclaimed By Storage Pool data source.

l Server -

l Sub Name -

l Storage Pool - Name of the storage pool from which data has been staged

l Size -

Change Management system templatesChange Management reports show configuration changes that occur on the backup server over agiven time. Change management reports display details of all of the configuration changesbetween the start time and end time of the report time window.

Avamar Audit User Changes DetailsReturns information on changes made by users to Avamar objects in a table report. Uses data fromthe Avamar Audit data source.

l Server - Host name or IP address of the Avamar server on which the backup applicationresides

l Sub Name - Not applicable to Avamar

l Domain Name - Avamar domain to which the client belongs

l User - User who made the change

l Object - Object type that was changed. For example, schedule, user, group, domain, dataset,or client

l Operation - Description of the change

l Start Time - Time the change started

l End Time - Time the change took effect

Backup Application Change DetailsReturns changes in configuration for the devices, groups, jobs, and clients of a backup server in atable report. Uses data from the Backup Device Config, Backup Server Mapping, Backup ClientConfig, and Backup Group Config data sources.

l Server - Name of the backup server

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 99

l Sub Name - Name of TSM server instance

l Type - The type of configuration change; for example, client, group, job, or device.

l Object - Data selection or object associated with the backup job

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Backup Application Change Details for rulesetReturns changes in configuration for the devices, groups, jobs, and clients of a backup server in atable report. Report for Backup Application configuration changed rule. Uses data from the BackupDevice Config, Backup Server Mapping, Backup Client Config, and Backup Group Config datasources.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Alert - Identifier of the alert

Backup Application Change SummarySummary of the changes in configuration for the devices, groups, jobs, and clients of a backupserver in a column chart. Uses data from the Backup Device Config, Backup Server Mapping,Backup Client Config, and Backup Group Config data sources.

l Type - Type of configuration change; for example, client, group, job, or device

l Change - Type of change: Added, Deleted, Modified

l Count - Count of the number of the type of configuration change

Backup Application Configuration Changes for PoolsReturns the backup application configuration changes for pools in a table report. Uses data fromthe Backup Device Config, Backup Server Mapping, Backup Pool Device Config Mapping, BackupPool Job Config Mapping, Backup Pool Group Config Mapping, Backup Client Config, Backup PoolClient Config Mapping, and Backup Group Config data sources.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Pool - Pool of the volume that is required

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

l Type - Type of configuration change; for example, client, group, job, or device

l Object - Data selection or object associated with change

Backup Application Last 10 ChangesReturns the last 10 backup application changes in a table report. Uses data from the Backup ClientConfig, Backup Device Config, Backup Group Config, and Backup Server Mapping data sources.

l Server - Name of the backup server

Reports by System Template

100 Dell EMC Data Protection Advisor Report Reference Guide

l Sub Name - Name of the TSM server instance

l Type - Type of policy

l Object - Data selection or object associated with change

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Backup Client Configuration Change DetailsReturns the details of backup client configuration changes in a table report. Uses data from theBackup Client Config and Backup Server Mapping data sources.

l Server - Name of the backup server

l Sub Name - Name of TSM Server instance

l Client - Name of the client

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Backup Client Configuration Change SummarySummary of the changes to the backup client configuration in a column chart. Uses data from theBackup Client Config and Backup Server Mapping data sources.

l Added - A count of the number of client configuration changes added

l Removed - A count of the number of modified client configuration changes

l Modified - A count of the number of client configuration changes deleted

Backup Device Configuration Change DetailsReturns the details of the backup device configuration changes in a table report. Uses data fromthe Backup Device Config data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device in the backup software

l Device Alias - Alias for the drive, if available

l Device Path - Operating system path to the device

l Device Class - Class of device: Disk, Tape

l Device Type - Type of device. For example, DLT, Ultrium-2

l Jukebox - Name of the jukebox in which the device is located

l Read Only - Indicates if the drive is configured as read-only: Yes, No

l Num Target Sessions - Number of target sessions

l Max Sessions - Maximum number of client and server sessions

l Send/Receive Timeout - Send and Receive timeout

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 101

l Num Retries - Number of retries

l Network Retry Interval - Network failure retry interval (in seconds)

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

l Max Errors - Maximum number of errors

l Device Access - Device access information

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Backup Device Configuration Change SummarySummary of the backup device configuration changes in a column chart. Uses data from theBackup Device Config data source.

l Added - A count of the number of device configuration changes added

l Modified - A count of the number of modified device configuration changes

l Removed - A count of the number of device configuration changes deleted

Backup Group Configuration Change DetailsReturns the details of the backup group configuration changes in a table report. Uses data fromthe Backup Group Config data source.

l Server - Name of the backup server

l Sub Name - Name of TSM Server instance

l Group - Name of the group on the backup server

l Domain Name - Identifier for Application domain

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Backup Group Configuration Change SummarySummary of the backup group configuration changes in a column chart. Uses data from theBackup Group Config data source.

l Added - A count of the number of group configuration changes added

l Modified - A count of the number of group modified configuration changes

l Removed - A count of the number of group configuration changes delete

Backup Job Configuration Change DetailsReturns the details of the backup job configuration changes in a table report. Uses data from theBackup Server Mapping data source.

l Server - Name of the backup server

l Sub Name - Name of TSM Server instance

Reports by System Template

102 Dell EMC Data Protection Advisor Report Reference Guide

l Client - Name of the client

l Group - Name of the group on the backup server

l Job - Name of a backup Job

l Backup Set - Name of the backup set associated with the job

l Schedule - Name of the backup schedule

l Browse Policy - Browse policy of the NetWorker server

l Retention Policy - Retention policy of the NetWorker server

l Directive - Directive files of the NetWorker server

l Backup Command - Commands available in the NetWorker server

l Executable Path - Path for NetWorker server executable files

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Backup Job Configuration Change SummarySummary of the backup job configuration changes in a column chart. Uses data from the BackupServer Mapping data source.

l Added -

l Modified -

l Removed -

Backup Pool Configuration Change DetailsReturns the details of the backup pool configuration changes in a table report. Uses data from theBackup Pool Configuration data source.

l Server - Hostname of backup server on which the pool is located

l Sub Name - Name of TSM server instance

l Pool Name - Name of the storage pool

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Backup Schedule Configuration Change DetailsReturns a list of changes to backup schedules in a column chart. Uses data from the BackupSchedule Config and Backup Schedule Config Dates data sources.

l Server - Hostname of the backup server

l Group - Name of the group associated with the schedule

l Schedule - Name of the schedule on the backup server

l Change - Type of change: Added, Deleted, Modified

l Date Change -

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 103

Backup Schedule Configuration Change SummarySummary of the backup schedule configuration changes in a column chart. Uses data from theBackup Schedule Config and Backup Schedule Config Dates data sources.

l Added -

l Modified -

l Removed -

Backup Server Configuration Change DetailsReturns the details of the backup server configuration changes in a table report. Uses data fromthe Backup Server Config data source.

l Server - Hostname of the backup server

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Details of the specific changes that have taken place, including changed fieldvalue.

l Hostname - FQDN of the backup server

BTD Change DetailsReturns the details on the BTD changes in a table report. Uses data from the File Server Exports,Tape Library Configuration, and Tape Drive data sources.

l Hostname - Name of the device being monitored

l Object -

l Type - Type of export: CIFS, NFS

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

BTD Change SummarySummary information on the BTD changes in a column chart. Uses data from the File ServerExports, Tape Library Configuration, and Tape Drive Configuration data sources.

l Change - Type of change: Added, Deleted, Modified

l Count - Number of changes

l Type -

BTD Last 10 Change DetailsReturns information on the last 10 changes in a table report. Uses data from the File ServerExports, Tape Library Configuration, and Tape Drive Configuration data sources.

l Hostname - Name of the device being monitored

l Object -

Reports by System Template

104 Dell EMC Data Protection Advisor Report Reference Guide

l Type -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Celerra Change DetailsReturns the details of the Celerra changes in a table report. Uses data from the Data MoverConfiguration, File server exports, Network Interface Config, Quota Configuration, Storage PoolConfiguration, Filesystem Configuration, LUN Configuration, Disk Configuration, Filesystem MountConfiguration, Fibre Channel Port Config, Processor Configuration, Network Interface IP Config,iSCSI Configuration, Disk Array Config, Memory Configuration, and Volume Configuration datasources.

l Hostname - Name or IP Address of the Celerra

l Sub Name -

l Sub Name 2 -

l Type - Type of file system. For example, UFS, EXT3, NTFS

l Object -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if 'Modified' was indicated

Celerra Change SummarySummary of the Celerra changes in a column chart. Uses data from the Data Mover Configuration,File server exports, Network Interface Config, Quota Configuration, Storage Pool Configuration,Filesystem Configuration, LUN Configuration, Disk Configuration, Filesystem Mount Configuration,Fibre Channel Port Config, Processor Configuration, Network Interface IP Config, iSCSIConfiguration, Disk Array Config, Memory Configuration, and Volume Configuration data sources.

l Change - Type of change: Added, Deleted, Modified

l Change Count - Number of changes

l Type - Type of file system. For example, UFS, EXT3, NTFS

Celerra Configuration Change DetailsReturns the details of the Celerra configuration changes in a table report. Uses data from the DataMover Configuration and Filesystem Configuration data sources.

l Server - Name or IP Address of the Celerra

l Type - Type of file system. For example, UFS, EXT3, NTFS

l Object -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Celerra Last 10 Change DetailsReturns the details of the last ten Celerra changes in a table report. Uses data from the DataMover Configuration, File server exports, Network Interface Config, Quota Configuration, Storage

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 105

Pool Configuration, Filesystem Configuration, LUN Configuration, Disk Configuration, FilesystemMount Configuration, Fibre Channel Port Config, Processor Configuration, Network Interface IPConfig, iSCSI Configuration, Disk Array Config, Memory Configuration, and Volume Configurationdata sources.

l Hostname - Name or IP Address of the Celerra

l Sub Name -

l Sub Name 2 -

l Type -

l Object -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Data Domain Change DetailsReturns information on Data Domain changes in a table. Uses data from the Disk Configuration,Replication Rule Configuration, Fibre Channel Port Config, Network Interface Config, NetworkInterface IP Config, Symmetrix Local Replications, and LUN Configuration data sources.

l Hostname - Name or IP address of the Data Domain

l Change - Type of change: Added, Deleted, Modified

l Change Occurred On - The name of the object the change occurred on

l Difference - Description of the change if Modified is indicated

l Noted - Timestamp for the change

l Type - The type of configuration change. For example, Fibre Channel Port Configurationchange, Network Interface configuration change

Data Mover Configuration Change DetailsReturns the details of the Data Mover configuration changes in a table report. Uses data from theFile server exports, Fibre Channel Port Config, Network Interface Config, Processor Configuration,iSCSI Configuration, Network Interface IP Config, and Memory Configuration data sources.

l Hostname - Name of the file server

l Sub Name - Identifier for the Storage Array

l Type - Type of Fibre Channel port on the switch or HBA

l Object -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Disk Array Configuration Change DetailsReturns the details of the disk array configuration changes in a table report. Uses data from theDisk Array Config, Disk Configuration, and LUN Configuration data sources.

l Hostname - Name of the host to which the disk is attached

Reports by System Template

106 Dell EMC Data Protection Advisor Report Reference Guide

l Type - Type of system. For example, CLARiiON

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Fileserver Export Change DetailsReturns the details of the fileserver export changes in a table report. Uses data from the Fileserver exports data source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l Name - Name of the file system being exported

l Export - Name which the file system is being exported as

l Type - Type of export: CIFS, NFS

l Permission - Permissions on the export. For example, read only (NFS only)

l Dedup Enabled - Indicates if deduplication was enabled on the export

l Replication Enabled - Indicates if replication was enabled on the export

l Backup Window - Identifier for backup window in which export took place

l Backup Window Start Time - Start time for backup window (in seconds)

l Backup Window End Time - End time for backup window (in seconds)

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Filesystem Configuration Change DetailsReturns the details of the file system configuration changes in a table report. Uses data from theFilesystem Configuration data source.

l Hostname - Name of the host on which the file system is mounted

l Filesystem - Name of the file system

l Device - Name of the device on which the file system is located. For example, /dev/vol0

l Type - Type of file system; for example, UFS, EXT3, NTFS

l Capacity - Total space on the file system available for standard usage (in MB)

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Media Location Change DetailsReturns the details of the media location changes in a table report. Uses data from the MediaDetails data source.

l Server - Hostname of the backup server

l Sub Name - Identifier for the storage array

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 107

l Volume Id - Identifier for the volume

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Memory Configuration Change DetailsReturns the details of the memory configuration changes in a table report. Uses data from theMemory Configuration data source.

l Hostname - Name of the host

l Sub Name - Identifier for the storage array

l Physical Memory - Amount of physical memory (in MB)

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

NetBackup Storage Unit Configuration Change DetailsReturns the details of the NetBackup storage unit configuration changes in a table report. Usesdata from the NetBackup Storage Unit Config data source.

l Server - Name of the backup server

l Name - Name of the storage unit

l Media Server - Media Server with which the storage unit is associated

l Storage Unit Type - Storage unit type; for example, Media Manager, Disk, NDMP, Fastrax

l Media Sub Type -

l On Demand Only - Indicates if the storage unit can be used for On Demand backups only (thatis, only when a policy of schedule is explicitly configured to use this storage unit)

l Path - Absolute path name to the directory used by Disk based storage unit

l Robot Type - Type of robot on which the storage unit is located

l Density - Cartridge density used by Media Manager storage units

l Robot Number - Number of the robot associated with the storage unit

l Max Concurrent Drives - Maximum number of drives used by a Media Manager storage unit

l Max Concurrent Jobs - Maximum number of Jobs that can be multiplexed to a disk storage unit

l Max Multiplexing - Maximum number of jobs multiplexed per drive. Multiplexing sendsconcurrent, multiple backups from one or several clients to a single drive

l Max Fragment Size - Maximum fragment size used by the storage unit

l NDMP Host - NDMP Host used by NDMP storage units

l Disk Pool - Pool to which the storage unit belongs

l High Water Mark - Percentage of dirty pages to trigger a cache flush

Reports by System Template

108 Dell EMC Data Protection Advisor Report Reference Guide

l Low Water Mark - Percentage of dirty pages to stop a cache flush

l Ok On Root - Indicates if the volume can be mounted on root file system

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Network Interface Configuration Change DetailsReturns the details of the network interface configuration changes in a table report. Uses datafrom the Network Interface Config data source.

l Hostname -

l Interface - Identifier for the network interface

l MAC Address - Ethernet address for the network interface

l Auto Neg - Indication of whether the interface is set to autonegotiate with a switch

l Sub Name -

l Description - Network interface description

l MTU - Maximum transmission unit. Size of the largest packet that a network protocol cantransmit

l Failover - If enabled, the interface can standby if the primary interface goes down

l Multicast - If enabled, the interface can send data to more than one address at the same time

l Promiscuous - If enabled, all traffic is passed to the interface rather than just packetsaddressed to it

l Simplex - If enabled, the interface messages are filtered and not displayed

l Receive Buffer - Amount of data that can be received before sending a reply. If size is notspecified on the interface, then the system-wide settings are used.

l Send Buffer - Amount of data that can be sent before receiving a reply. If size is not specifiedon the interface, then the system-wide settings are used.

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

l Jumbo Packets Enabled - Indicates that Jumbo Packets are enabled by default.

RecoverPoint Change DetailsReturns the details of the RecoverPoint changes in a table report. Uses data from the ConsistencyGroup Configuration, Consistency Group Copy Configuration, RPA Configuration, and SplitterConfiguration data sources.

l Server - Name of the RecoverPoint host

l Type - Type of RecoverPoint component that was changed

l Object - Name of the component

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 109

RecoverPoint Change SummarySummary of the RecoverPoint changes in a column chart. Uses data from the Consistency GroupConfiguration, Consistency Group Copy Configuration, RPA Configuration, and SplitterConfiguration data sources.

l Added -

l Modified -

l Deleted -

RecoverPoint Last 10 ChangesReturns the last ten RecoverPoint changes in a table report. Uses data from the ConsistencyGroup Configuration, Consistency Group Copy Configuration, RPA Configuration, and SplitterConfiguration data sources.

l Server -

l Object -

l Type -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Symmetrix Change DetailsReturns the details of the Symmetrix changes in a table report. Uses data from the ReplicationRule Configuration, Network Interface Config, Symmetrix Local Replications, Storage Pool Config,Save Pool Configuration, LUN Configuration, Disk Configuration, Fibre Channel Port Config, iSCSIConfiguration, Network Interface IP Config, Save Pool Devices, Disk Array Config, MaskingConfiguration, and Memory Configuration data sources.

l Hostname - Name or IP Address of the Symmetrix host

l Sub Name - Storage array identifier

l Sub Name 2-

l Type -

l Object -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Symmetrix Change SummarySummary of the Symmetrix changes in a column chart. Uses data from the Replication RuleConfiguration, Network Interface Config, Symmetrix Local Replications, Storage Pool Config, SavePool Configuration, LUN Configuration, Disk Configuration, Fibre Channel Port Config, iSCSIConfiguration, Network Interface IP Config, Save Pool Devices, Disk Array Config, MaskingConfiguration, and Memory Configuration data sources.

l Added -

Reports by System Template

110 Dell EMC Data Protection Advisor Report Reference Guide

l Modified -

l Deleted -

Symmetrix Last 10 Change DetailsReturns the details of the last ten Symmetrix changes in a table report. Uses data from theReplication Rule Configuration, Network Interface Config, Symmetrix Local Replications, StoragePool Config, Save Pool Configuration, LUN Configuration, Disk Configuration, Fibre Channel PortConfig, iSCSI Configuration, Network Interface IP Config, Save Pool Devices, Disk Array Config,Masking Configuration, and Memory Configuration data sources.

l Hostname - Name or IP Address of the Symmetrix host

l Sub Name - Storage array identifier

l Sub Name 2-

l Type -

l Object -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Tape Drive Configuration Change DetailsReturns the details of the tape drive configuration changes in a table report. Returns the details ofthe Symmetrix changes in a table report. Uses data from the Tape Drive Configuration datasource.

l Hostname -

l Library Name - Name of the library in which the tape drive is located. Physical tape drives donot return information on the tape library in which they are a member.

l Device Name - Logical name of the device

l Make - Tape drive make

l Model - Model of the tape drive

l Firmware - Firmware version of the tape drive

l Serial - Serial number of the tape drive

l Virtual -

l Controller Firmware - Version of firmware running on the Controller

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Tape Library Configuration Change DetailsReturns the details of the tape library configuration changes in a table report. Uses data from theTape Library Configuration data source.

l Hostname - IP address of the server

l Library Name - Name of the library in which the tape drive is located. Physical tape drives donot return information on the tape library in which they are a member.

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 111

l Vendor - Name of the product vendor

l Model - Model of the tape drive

l Firmware - Firmware version of the tape drive

l Serial - Serial number of the tape drive

l Num Slots - Number of slots in the tape library

l Num Drives - Number of drives in the tape library

l Virtual -

l Dedup Enabled - Indication of whether deduplication is enabled on the export

l Replication Enabled - Indication of whether replication is enabled on the export

l Backup Window - Identifier for the backup window in which the export takes place

l Backup Window Start Time - Start time for the backup window

l Backup Window End Time - End time for the backup window

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Virtual Host Change DetailsReturns the details of virtual host changes in a table report. Uses data from the Virtual HostNetwork Interface Configuration, Network Interface Config, Processor Configuration, VirtualHosts, Virtual Host Configuration, Virtual Host Disk Configuration, Filesystem Configuration, andMemory Configuration data sources.

l Virtualization Server - Hostname of the virtualization server

l Object -

l Type -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Virtual Host Configuration Change SummarySummary of the virtual host configuration changes in a column chart. Uses data from the VirtualHost Network Interface Configuration, Network Interface Config, Processor Configuration, VirtualHosts, Virtual Host Configuration, Virtual Host Disk Configuration, Filesystem Configuration, andMemory Configuration data sources.

l Change - Type of change: Added, Deleted, Modified

l Change Count -

l Type -

Virtual Host Disk Configuration Change DetailsReturns details of the virtual host disk configuration changes in a table report. Uses data from theVirtual Host Disk Configuration data source.

l Virtualization Server - Name of the virtualization server

Reports by System Template

112 Dell EMC Data Protection Advisor Report Reference Guide

l Virtual Host -

l Name -

l Size - Capacity for the disk (in GB)

l Virtual Disk - Virtual disk to which the disk maps

l Datastore - Name of datastore on which the virtual disk is located

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Virtual Host Change DetailsReturns details of the virtual host changes in a table report. Uses data from the Virtual HostNetwork Interface Configuration, Network Interface Config, Processor Configuration, VirtualHosts, Virtual Host Configuration, Virtual Host Disk Configuration, Filesystem Configuration, andMemory Configuration data sources.

l Virtualization Server - Name of the virtualization server

l Virtual Host -

l Hostname -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Virtual Host Last 10 Changes DetailsReturns details of the last 10 virtual host changes in a table report. Uses data from the Virtual HostNetwork Interface Configuration, Network Interface Config, Processor Configuration, VirtualHosts, Virtual Host Configuration, Virtual Host Disk Configuration, Filesystem Configuration, andMemory Configuration data sources.

l Virtualization Server - Name of the virtualization server

l Object -

l Type -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

Virtual Host Network Interface Configuration Change DetailsReturns the details of changes to the configuration of network interfaces on virtual machines in atable report. Uses data from the Virtual Host Network Interface Configuration data source.

l Virtualization Server - Name of the virtual machine

l Virtual Host - Name of the Virtual Centre server

l Name - Identifier for the virtual interface

l Virtual Network - Network on which the virtual interface is located

l MAC Address - MAC Address of network interface

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 113

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if Modified was indicated

VNX/CLARiiON Change DetailsReturns details on VNX and CLARiiON changes in a table report. Uses data from the ReplicationRule Configuration, RAID Group Configuration, Network Interface Config, Storage Pool Config,Save Pool Configuration, LUN Configuration, Host Configuration, Disk Configuration, FibreChannel Port Config, iSCSI Configuration, Network Interface IP Config, Save Pool Devices, DiskArray Config, Masking Configuration, and Memory Configuration data sources.

l Hostname - Hostname or IP address of the disk array

l Sub Name - Name of the storage array

l Sub Name 2 - Identifier for the storage array on which the LUN resides

l Object -

l Type -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

l Difference - Description of what changed if 'Modified' was indicated

VNX/CLARiiON Change SummarySummary of VNX and CLARiiON changes in a column chart. Uses data from the Replication RuleConfiguration, RAID Group Configuration, Network Interface Config, Storage Pool Config, SavePool Configuration, LUN Configuration, Host Configuration, Disk Configuration, Fibre Channel PortConfig, iSCSI Configuration, Network Interface IP Config, Save Pool Devices, Disk Array Config,Masking Configuration, and Memory Configuration data sources.

l Change - Type of change: Added, Deleted, Modified

l Count -

l Type -

VNX/CLARiiON Last 10 Change DetailsReturns details on the last ten VNX and CLARiiON changes in a table report. Uses data from theReplication Rule Configuration, RAID Group Configuration, Network Interface Config, Storage PoolConfig, Save Pool Configuration, LUN Configuration, Host Configuration, Disk Configuration, FibreChannel Port Config, iSCSI Configuration, Network Interface IP Config, Save Pool Devices, DiskArray Config, Masking Configuration, and Memory Configuration data sources.

l Hostname - Hostname or IP address of the disk array

l Sub Name - Name of the storage array

l Sub Name 2 - Identifier for the storage array on which the LUN resides

l Object -

l Type -

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp for the change

Reports by System Template

114 Dell EMC Data Protection Advisor Report Reference Guide

l Difference - Description of what changed if Modified was indicated

Chargeback system templatesDPA provides chargeback reports that provide a financial cost analysis for the storage operationsthat have taken place in a customers environment. The chargeback reports use models based onthe following inputs:

l Size of data protected - Amount of data protected

l Size of data transferred - Amount of data replicated from primary storage

A cost based on these storage and transfer metrics is calculated for hosts and can be chargedback to the business unit that is responsible for that client or set of clients. The cost values perdata protection and transfer are configured in a chargeback policy, which is then assigned to thehost or subobject.

Chargeback costs can then be totalled against a cost center in reports. If an object is not assigneda cost center, a default cost center is used in reports. The Data Protection Advisor Installation andAdministration Guide describes how to configure Chargeback Policies for storage.

Chargeback DetailsReturns chargeback details in a table report. Uses data from the Backup Client Occupancy,Backup Statistics, Num Media Written To, and Restore Statistics data sources.

l Server - Name of the server on which the backups or restores occurred

l Client - Name of the client on which the backups or restores occurred

l Num. Backups - Total number of backups performed

l Cost Per Num Backups - Cost per Backup (derived from the chargeback policy)

l Cost for Num Backups - Total cost for all number of backups

l Cost Per GB Backed Up - Cost per gigabyte backed up (derived from the chargeback policy)

l Cost for Data Backed Up - Total cost for all gigabytes backed up

l Backup Size - Gigabytes of data backed

n Size - The size after data deduplication

n Sizescanned - The size before data deduplication

l Backup Cost - Total backup cost (number of backups and gigabytes backed up)

l Num. Restores - Total number of restores performed

l Cost Per Num Restores - Cost per restore (derived from the chargeback policy)

l Restore Size - Total size of all restores

l Cost Per GB Restored - Cost per gigabyte restored (derived from the chargeback policy)

l Cost for Data Restored - Total cost for all gigabytes restored

l Cost for Num Restores - Total cost for all number of restores

l Restore Cost - Total restore cost (number of restores and gigabytes restored)

l Data Retained - Total of all data stored

l Cost Per GB Retained - Cost per gigabyte stored (derived from the chargeback policy)

l Retention Cost - Total cost of storing data

l Cost Per Tape Used - Cost per tape used for backup (derived from the chargeback policy)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 115

l Num. Tapes - Total number of tapes used

l Tape Cost - Total cost of tape usage

l Total Cost - Total of all chargeback costs for that cost center

l Policy Used - Chargeback policy used to calculate chargeback costs for this object

l Cost Centre - Cost center as defined in a client’s Object Properties dialog box

Chargeback Details By Cost CentreReturns chargeback details by cost centre in a table report. Uses data from the Backup ClientOccupancy, Backup Statistics, Num Media Written To, and Restore Statistics data sources.

l Num. Backups - Number of backups performed for that cost center

l Backup Size - Gigabytes of data backed up for cost center

n Size - The size after data deduplication

n Sizescanned - The size before data deduplication

l Num. Restores - Number of restores performed for cost center

l Restore Size - Gigabytes of data restored for cost center

l Data Retained - Gigabytes of data stored for cost center

l Num. Tapes - Total number of tapes used for cost center

l Total Cost - Total of all chargeback costs for that cost center

l Cost Centre - Cost center as defined in a client’s Object Properties dialog box

Chargeback Details for Cost CentreReturns chargeback details for cost centre in a table report. Uses data from the Backup ClientOccupancy, Backup Statistics, Num Media Written To, and Restore Statistics data sources.

l Cost for Num Restores - Cost for the number of restores performed for the cost center

l Cost Per GB Retained - Cost per gigabyte retained for the cost center

l Cost Per GB Restored - Cost per gigabyte restored for the cost center

l Total Cost - Total of all chargeback costs for that cost center

l Num. Tapes - Number of tapes that are required

l Backup Cost - Total backup cost (number of backups and gigabytes backed up)

l Cost Per Num Restores - Total cost for all number of restores

l Retention Cost - Total cost of storing data

l Data Retained - Gigabytes of data stored for cost center

l Tape Cost - Total of all chargeback costs for that cost center

l Cost Per Tape Used - Cost per tape used for backup (derived from the chargeback policy)

l Restore Cost - Total restore cost (number of restores and gigabytes restored)

l Cost Per Num Backups - Cost per Backup (derived from the chargeback policy)

l Cost for Num Backups - Total cost for all number of backups

l Restore Size - Gigabytes of data restored for cost center

l Cost for Data Backed Up - Total cost for all gigabytes backed up

Reports by System Template

116 Dell EMC Data Protection Advisor Report Reference Guide

l Num. Restores - Number of restores performed for cost center

l Backup Size - Gigabytes of data backed up for cost center

n Size - The size after data deduplication

n Sizescanned - The size before data deduplication

l Cost for Data Restored - Total cost for all gigabytes restored

l Num. Backups - Number of backups performed for that cost center

Chargeback HistoryReturns chargeback history details in a column chart. Uses data from the Backup ClientOccupancy, Backup Statistics, Num Media Written To, and Restore Statistics data sources.

l Total Cost - Total of all chargeback costs for that cost center

l Month -

Chargeback SummaryReturns chargeback summary in a table report. Uses data from the Backup Client Occupancy,Backup Statistics, Num Media Written To, and Restore Statistics data sources.

This report may be run from a RecoverPoint host in the configuration tree to display the aggregatechargeback costs for all consistency groups configured on that host, or from one or moreindividual consistency groups.

l Num. Backups - Number of backups performed for that cost center

l Backup Size - Gigabytes of data backed up for cost center

n Size - The size after data deduplication

n Sizescanned - The size before data deduplication

l Num. Restores - Number of restores performed for cost center

l Restore Size - Gigabytes of data restored for cost center

l Data Retained - Gigabytes of data stored for cost center

l Num. Tapes - Number of tapes that are required

l Total Cost - Total of all chargeback costs for that cost center

Chargeback Summary By Cost CentreReturns chargeback summary by cost centre in a table report. Uses data from the Backup ClientOccupancy, Backup Statistics, Num Media Written To, and Restore Statistics data sources.

l Cost -

l Cost Centre - Cost center as defined in a client’s Object Properties dialog box

Chargeback Total Cost BreakdownReturns the chargeback total cost breakdown in a pie chart. Uses data from the Backup ClientOccupancy, Backup Statistics, Num Media Written To, and Restore Statistics data sources.

l Retention Cost - Total cost of storing data

l Tape Cost - Total of all chargeback costs for that cost center

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 117

l Backup Cost - Total backup cost (number of backups and gigabytes backed up)

l Restore Cost - Total restore cost (number of restores and gigabytes restored)

RecoverPoint Chargeback DetailsReturns the data protected and data transferred costs by server and consistency group in a tablereport. Uses data from the Consistency Group Data Protected, Consistency Group DataTransferred, and Consistency Group Copy Configuration data sources.

l Server - Name of the server on which the backups or restores occurred

l Consistency Group - Name of the Consistency Group

l Data Protected - Total amount of data protected (in MB)

l Data Transferred - Total amount of data transferred (in MB)

l Cost Per GB Protected - Cost per gigabyte protected (derived from the chargeback policy)

l Cost for Data Protected - Total cost for all gigabytes protected

l Cost Per GB Transferred - Cost per gigabyte transferred (derived from the chargeback policy)

l Cost for Data Transferred - Total cost for all gigabytes transferred

l Total Cost - Total of all chargeback costs for that cost center

l Policy Used - Chargeback policy used

l Cost Centre - Cost center as defined in a client’s Object Properties dialog box

RecoverPoint Chargeback SummarySummary of the data protected and data transferred costs by server and consistency group in atable report. Uses data from the Consistency Group Data Protected, Consistency Group DataTransferred, and Consistency Group Copy Configuration data sources.

l Data Protected - Total amount of data protected (in MB)

l Data Transferred - Total amount of data transferred (in MB)

l Cost for Data Protected - Total cost for all gigabytes protected

l Cost for Data Transferred - Total cost for all gigabytes transferred

l Total Cost - Total of all chargeback costs for that cost center

Chargeback Total Cost of Data RetainedReturns information on the total cost of data retained associated with the capacity per client in atable. Uses data from the Backup Server Mapping and Backup Client Occupancy by Client datasources.

l Server - Name of the server

l Client - Name of the client

l Total Data Retained - Total data retained on the client

l Group - Name of the groups associated with the clients

l Sub Name - Name of TSM Server instance

l Total Cost - Total of chargeback cost for data retained

Reports by System Template

118 Dell EMC Data Protection Advisor Report Reference Guide

Compliance system templatesCompliance and risk mitigation reports display backup and restore statistics to allow administratorsto measure data protection risk and policy compliance. For example, DPA provides backup andrestore KPI, strike rate, and daily success rate reports.

DPA also provides several reports to measure compliance for specific data protection regulations.For more specific details on the various reports, select one of the reports described in thefollowing sections.

Backup and Restore KPIsReturns the success rates and total gigabytes for backups, restores, and percentages of data andnumber of backups restored in a table report. Uses data from the Backup Statistics, Num FailedBackup Jobs After DeDuplication, and Restore Statistics data sources.

l Total Backups - Number of backups that completed

l Total Restores - Number of restores that completed

l Backup Success Rate - Success rate of backups

l Restore Success Rate - Success rate of restores

l Backup Data -

l Restore Data -

l % of Backups Restored -

l % of Data Restored -

l Successful Backups - All successful backups on a backup server

l Failed Backups - All failed backups on a backup server

l Successful Restores - All successful restores on a backup server

l Failed Restores - All failed restores on a backup server

Backup Daily Success Rate Against TargetReturns the percentage of daily successful backups measured against the target success rate in aline chart. Uses data from the Backup Statistics and Trend Line data sources.

l Success Rate - Success rate of backups

l Target - Target success rate

Backup Daily Success Rate And DataReturns the percentage of daily successful backups in a table report. Uses data from the BackupJob Details for Clients with Failures, Num Jobs, and Total Size data sources.

l Successful Backup - All successful backups on a backup server

l Failed Backups - All failed backups on a backup server

l Total Backups -

l Backup Success Rate - Success rate of backups over the reporting period

l Total Size - Total amount of data backed up (in GB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 119

Backup Success Rate Against TargetReturns the percentage of successful backups measured against the target success rate in a tablereport. Uses data from the Backup Statistics and Trend Line data sources.

l Success Rate - Success rate of backups

l Target - Target success rate

Backup Unprotected/Unconfigured ClientsReturns information on clients that have not had a backup in the last 3 days, the time of the lastbackup if greater than 3 days but less then a week, and the number of missed backups for the 3day period in a table. Uses data from the Backup Client Config, Backup Schedule Config, BackupGroup Config, Backup Server Mapping, Last Backup details by Client and Job, Num Jobs, andReport Times data sources.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of backup server instance

l Domain Name - Name of the domain

l Schedule Enabled - Whether the Job schedule is enabled or not

l Client - Name of the client backed up

l Client Active - Flag indicating whether the client is active

l Group Active - Flag indicating whether the group is active

l Last Backup - Time of the backup application completion

l Time Since Last Backup - Time elapsed from the backup application completion

l Number of Missing Backups - The number of missed backups within the 3 day period

Backup Unsuccessful ClientsReturns details of backups that were unsuccessful in a table report. Uses data from the BackupJob Details for Clients with Failures data source.

l Client - Name of the client backed up

l Status - Status of the Job backed up: Success, Failed, Missed

l Started - Time the backup started

l Finished - Time the backup finished

Client AdditionsReturns the client additions in a table report. Uses data from the Backup Client Config datasource.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Domain Name - Name of the application domain

l Client - Name of the client on the backup server

l Differences -

Reports by System Template

120 Dell EMC Data Protection Advisor Report Reference Guide

Client ChangesReturns changes to configuration for all backup clients in a table report. Uses data from theBackup Client Config data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Domain Name - Name of the application domain

l Client - Name of the client on the backup server

l Change - Type of change: Added, Deleted, Modified

Client Changes SummarySummary of the changes to configuration for all backup clients in a table report. Uses data fromthe Backup Client Config data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Domain Name - Name of the application domain

l Client - Name of the client on the backup server

l Differences -

Client DeletionsReturns the client deletions in a table report. Uses data from the Backup Client Config datasource.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Domain Name - Name of the application domain

l Client - Name of the client on the backup server

l Differences -

Client ModificationsReturns the client modifications in a table report. Uses data from the Backup Client Config datasource.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Domain Name - Name of the application domain

l Client - Name of the client on the backup server

l Differences -

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 121

Clients Without Full BackupReturns the clients that have not received a full backup in a table report. Uses data from the NodeDetails and Num Jobs data sources.

l Client - Name of the client on the backup server

Compliance OverviewReturns a compliance overview in a table report. Uses data from the Backup Statistics, Num FailedBackup Jobs After DeDuplication, Num Jobs, Restore Details, and Restore Statistics data sources.

l Period -

l Backup Data -

l Total Restores - Number of restores that completed

l Restore Success Rate -

l Restore Data -

l Total Backups - Number of backups that completed

l Backup Success Rate - Success rate of backups over the reporting period

Expired VolumesReturns the media that is eligible for recycling in a table report. Uses data from the Media Detailsdata source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

One Strike Failed ClientsReturns the one strike failures in a table report. Uses data from the Backup Job Details datasource.

l Client - Name of the client backed up

l Two Days Ago - (Hidden field) Status of the client one day ago. Can take the values 'failed' or'partial'

l Yesterday (Hidden field) Status of the client two days ago. If present can take the value'success'

Note the following regarding strikes and other elements of this report:

l Strikes are based on clients.

l Clients that have at least one failure in the last 24 hours, which is the last day, constitutes onestrike.

l If deduplication is enabled in Configure Report Settings in the DPA web console, the jobs onthe client are deduplicated to discount earlier failures where a job later succeeded.

Reports by System Template

122 Dell EMC Data Protection Advisor Report Reference Guide

l A partial success where some jobs are successful and some fail for a client, counts as strike.

l If a client has a combination of missed/failed or missed/successful jobs, it is considered apartial client and is included in the strike count. Alternatively, a client with all missed jobs isincluded in the count.

l Full or incremental Backup level does not make a difference; reports do not filter based on joblevel.

One Strike Failed Jobs For Specific ClientReturns the one strike failures for specific clients in a table report. Uses data from the Backup JobDetails data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Application status code associated with the job

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Queue Start - Time the Job started queuing

l End Time - Time the Job completed

l Start Time - Time the Job started writing

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 123

l Files Scanned - Number of files scanned

l Expiry Date - Date that a Job will expire

l Size Transferred - Total size of the data transferred (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted from the SizeTransferred field to return the Job size (in bytes)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

Reports by System Template

124 Dell EMC Data Protection Advisor Report Reference Guide

l Database Backup Type - Type of the database instance backed up (hidden field)

Restore Rate Statistics for rulesetReturns the restore rate statistics in a table report. Uses data from the Backup Statistics, RestoreStatistics, and User Input data sources.

l Max Backups Restored -

l Max Data Restored -

l % of Backups Restored -

l % of Data Restored -

l Alert - Identifier of the alert

Strike SummaryReturns the number of clients that have not been backed up for one or more days consecutively ina table report. Uses data from the Backup Job Details data source.

l One Strike - Count of the number of clients that have at least one failure in the last 24 hours,which is the last day

l Two Strikes - Count of the number of clients that have at least one failure in the last 24–48hour and last 24 hour period, which is the last two days

l Three Strikes - Count of the number of clients that have at least one failure in the last threedays

Note the following regarding strikes and other elements of this report:

l Strikes are based on clients.

l If deduplication is enabled in Configure Report Settings in the DPA web console, the jobs onthe client are deduplicated to discount earlier failures where a job later succeeded.

l A partial success where some jobs are successful and some fail for a client, counts as strike.

l If a client has a combination of missed/failed or missed/successful jobs, it is considered apartial client and is included in the strike count. Alternatively, a client with all missed jobs isincluded in the count.

l Full or incremental Backup level does not make a difference; reports do not filter based on joblevel.

l If you run a 3-strike report with a time period of last day, the Strike Summary reportalso worksbut it only returns a one strike failed client count because you only ran it for the last day. If yourun the Strike Summary report for last two days, it returns the count for one and two strikefailures if any exist. If you run it for last week/ last three days, Strike Summary returns anyfailures in last three days.

l The Strike Summary report is hard-coded to return failure counts only for consecutive failedclients for the last 3 days, maximum. It makes no difference to configure the report to run witha time period longer than 3 days; for example, if you run with time period of last month, it willnot report on any 3-strikes within the last month.

Success Rate Against Target for rulesetReturns the success rate against the target in a table report. Report for Success rate belowthreshold rule. Uses data from the Backup Statistics and Trend Line data source.

l Success Rate -

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 125

l Target -

l Alert - Identifier of the alert

Three Strike Failed ClientsReturns details on the clients with three strike failures in a table report. Uses data from the BackupJob Details data source.

l Client - Name of the client backed up

l Yesterday - (Hidden field) Status of the client one day ago. Can take the values 'failed' or'partial'

l Two Days Ago - (Hidden field) Status of the client two days ago. Can take the values 'failed' or'partial'

l Three Days Ago - (Hidden field) Status of the client three days ago. Can take the values 'failed'or 'partial'

Note the following regarding strikes and other elements of this report:

l Strikes are based on clients.

l Clients that have at least one failure in the last three days from the time the report was runconstitutes three strikes.

l If deduplication is enabled in Configure Report Settings in the DPA web console, the jobs onthe client are deduplicated to discount earlier failures where a job later succeeded.

l A partial success where some jobs are successful and some fail for a client, counts as strike.

l If a client has a combination of missed/failed or missed/successful jobs, it is considered apartial client and is included in the strike count. Alternatively, a client with all missed jobs isincluded in the count.

l Full or incremental Backup level does not make a difference; reports do not filter based on joblevel.

Three Strike Failed Clients for rulesetReturns details of three strike failed clients in a table report. Report for Three Strike Failures rule.Uses data from the Backup Job Details data source.

l Client - Name of the client backed up

l Alert - Identifier of the alert

Three Strike Failed Jobs For Specific ClientReturns details of three strike failed for specific clients in a table report. Uses data from theBackup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

Reports by System Template

126 Dell EMC Data Protection Advisor Report Reference Guide

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Status - Status of the Job backed up: Success, Failed, Missed

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Err Code - Error code from the backup application, if available

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Files Scanned - Number of files scanned

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes)

l Size Transferred - Total size of the data transferred (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted from the SizeTransferred field to return the Job size (in bytes)

l Archive Flag - Indicates whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Num Successful Copies - Number of successful copies

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 127

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Top 10 Most Exposed JobsReturns the last ten successful job for backup clients in a table report. Uses data from the LastBackup Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM Server instance

l Group - Name of the group in which the client is located

l Media Server - Name of the media server on which the backup occurred

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client that was backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the file system that was backed up

l Domain name - Name of the domain

Reports by System Template

128 Dell EMC Data Protection Advisor Report Reference Guide

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Queue Start - Time the Job started queuing

l Last Successful Start - Last successful start of the backup

Top 5 Most Exposed JobsReturns the last five successful Job for backup clients in a table report. Uses data from the LastBackup Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM Server instance

l Group - Name of the group in which the client is located

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client that was backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the file system that was backed up

l Domain name - Name of the domain

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Last Successful Start - Last successful start of the backup

l Time Since Last Backup - Amount of time since the last backup

Two Strike Failed ClientsReturns the clients with two strike failures in a table report. Uses data from the Backup Job Detailsdata source.

l Client - Name of the client backed up

l Yesterday - (Hidden field) Status of the client one day ago. Can take the values 'failed' or'partial'

l Two Days Ago - (Hidden field) Status of the client two days ago. If present can take the values' failed ' or ' partial '

l Three Days Ago - (Hidden field) Status of the client three days ago. If present can take thevalue 'success'

Note the following regarding strikes and other elements of this report:

l Strikes are based on clients.

l Clients that have at least one failure in the last 24–48 hour and last 24 hour period from thetime the report was run constitutes two strikes.

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 129

l If deduplication is enabled in Configure Report Settings in the DPA web console, the jobs onthe client are deduplicated to discount earlier failures where a job later succeeded.

l A partial success where some jobs are successful and some fail for a client, counts as strike.

l If a client has a combination of missed/failed or missed/successful jobs, it is considered apartial client and is included in the strike count. Alternatively, a client with all missed jobs isincluded in the count.

l Full or incremental Backup level does not make a difference; reports do not filter based on joblevel.

Two Strike Failed Jobs For Specific ClientReturns the specific clients with two strike failures in a table report. Uses data from the BackupJob Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Num Files - Number of files backed up

Reports by System Template

130 Dell EMC Data Protection Advisor Report Reference Guide

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Files Scanned - Number of files scanned

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes)

l Archive Flag - Indicates whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Attempts - Number of attempts that took place before the Job completed

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 131

l Database Backup Type - Type of the database instance backed up (hidden field)

Unprotected ClientsReturns the time since the last successful backup of the client compared to the client's recoverypoint objective in a table report. Uses data from the Last Backup Details and Node Details datasources.

l Client - Name of the client that was backed up

l Recovery Point Objective -

l Time Since Last Backup - Amount of time since the last backup

Volumes To Be DestroyedReturns the media that should be destroyed due to high numbers of mount or relabel operations, ordue to age of the media, in a table report. Uses data from the Report Times and Media Details datasources.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Remaining Lifetime -

Configuration system templatesConfiguration reports display information on the configuration of the backup application.

Array Fan-out RatioReturns details on the array fan-out ratio in a table report. Uses data from the Fibre Channel PortConfig, iSCSI Configuration, and LUN Mapping data sources.

l Node - Name of the array on which the LUN exists

l Sub Name - Identifier for the Storage Array

l Source - LUN that is mapped

l Fan-out Ratio -

l Port - Name of the Fibre Channel port

l Controller - Number of the controller

Avamar Retention Policy ConfigurationReturns information on the configuration of Avamar retention policies in a table report. Uses datafrom the Avamar Retention Policy Configuration data source.

l Server - Name of the Avamar server

l Sub Name - Not applicable to Avamar

l Name - Name of the retention policy

Reports by System Template

132 Dell EMC Data Protection Advisor Report Reference Guide

l Domain Name - Name of the Avamar domain associated with the retention policy

l Enabled - Indicates if the policy is active

l Read Only - Indicates if the policy is read only or writeable

l Expiration Date - Date the policy expires

l Duration - Duration that data should be backed up

l Duration Type - Unit of duration. For example, days, weeks, or months

l Override - Indicates if the policy overrides basic retention

l Num Days Daily Kept - Number of days of daily backups to retain

l Num Weeks Weekly Kept - Number of weeks of weekly backups to retain

l Num Months Monthly Kept - Number of months of monthly backups to retain

l Num Years Yearly Kept - Number of years of yearly backups to retain

Backup Client ConfigurationReturns details on the configuration of all physical hosts configured on a server in a table report.Uses data from the Backup Client Config and Backup Server Mapping data sources.

l Server - Name of the backup server on which the client is configured

l Client - Name of the client

l Active - Indicates if the client is active

l Registered – Whether the client is activated with Avamar server

l Software Version - Version of the backup software running on the client

l Remote IP - Remote IP address of the client

l OS Type - Type of client operating system

l OS Version - Version of the client operating system

l Sub Name - Name of the TSM server instance

l Domain Name - Name of the application domain

l Browse Policy - Browse policy of the NetWorker client

l Retention Policy - Retention policy of the NetWorker client

l Directive - Directive files of the NetWorker server

l Backup Command - Commands available on the NetWorker client

l Executable Path - Path to the NSR executables on this client

l Scheduled Backup - Indicates if the client is enabled for scheduled backup

l Comment - User remarks for the client

l Save Operations - Save operation instructions in the form KEYWORD:TOKEN=STATE.Instructions are required if the Job attribute for this client contains non-ASCII names

l File Inactivity Threshold - Number of days a file has not been accessed before it is counted asinactive. Zero indicates that no inactivity statistics were collected

l File Inactivity Alert Threshold - Percentage of space that can be occupied by inactive filesbefore a notification is generated. Zero indicates that no alert will be sent

l Remote User - Username used for remote commands on the client or to access application-specific data

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 133

l Application Information - Any application information for the client

l NDMP - Indicates if the client is an NDMP client

l NDMP Array Name - Logical name assigned to the array in NDMP NAS array configurations

l Dedup Backup - Indicates if the client is a deduplication client

l Dedup Node - Name of the deduplication object

l SCSI - Indicates if the client is a SCSI backup client

l VCB - Indicates if the client is a VCB backup client

l Proxy Backup Host - Proxy client where the saves were run

l Proxy Backup Type - Proxy method used for backups

l Virtual Client - Indicates if the machine is a virtual client

l Virtual Client Physical Hostname - Specifies the physical hostname, if this resource is for avirtual client. The hostname does not need to be fully qualified, and must be less than 64 bytes

l Boost Enabled - Indicates if boost is enabled

l Server Network Interface - Name of the network interface on the server to which the client isbacked up

l Priority - Priority of the client

l Parallelism - Number of jobs that can run in parallel on this client

l Contact - Text string of information identifying the client object’s administrator

l Client Identifier - Unique identifier for the client instance

l Archive Services - Indicates if archive services are available for the client

l Remote Access - List of remote users permitted to recover files from the client

l Index Path - Path to the client's index directory on the server. The path is either an absolutepath or NULL. If NULL, the index resides in the index/clientname subdirectory of the EMChome directory

l Owner Notification - Notification action used to send status message contents to the clientowner

l Hard Links - Indicates if hard link processing is enabled on the Windows client

l Short Filenames - Indicates if short file name processing is enabled on the Windows client

l BMR - Indicates if Bare Metal Recovery protection is enabled

l BMR Options - List of Bare Metal Recovery options

l Backup Type - Backup client type

l CPUs - Number of processors in the client machine

l Enabler In Use - Indicates if the client is using up a license count

l Licensed Applications - List of licensed applications used by the client

l Licensed PSPs - List of licensed PowerSnap® platforms used by the client

l Resource ID - Identifier for the client

l Registration Time - Time of registration

l Last Access Time - Time last accessed

l Password Set Time - Time that the password was set

l Invalid Password Count - Number of invalid password entries

Reports by System Template

134 Dell EMC Data Protection Advisor Report Reference Guide

l Compression - Indicates if compression is enabled

l Archive Delete - Indicates if archive deletion is permitted

l Backup Delete - Indicates if backup deletion is permitted

l Locked - Indicates if the client object is locked

l Registration Administrator - Name of the administrator who registered the client

l Option Set - Option set for the client specified on the TSM server

l Aggregation - Indicates if client file aggregation is enabled when backing up

l URL - URL for the web client

l Node Type - Type of client object: Client, Server, NAS

l Password Expiration Period - Number of days after which a password expires

l Keep Mount Point - Indicates if the client can keep mount points during a session

l Max Mount Points Allowed - Maximum number of mount points permitted for a client in asession

l Auto Filespace Rename - Indicates if TSM prompts the client to rename file spaces when theclient system upgrades to a client that supports Unicode

l Validate Protocol - Indicates if the client has data validation enabled

l GUID - Globally unique identifier of the client object

l Transaction Group Max - Maximum number of files or directories that can be contained in atransaction group

l Data Read Path - Transfer path when sending data: LAN path only, LAN-free path only, Anypath

l Data Write Path - Transfer path when receiving data: LAN path only, LAN-free path only, Anypath

l Session Initiation - Initiator of session: server or client, or server only

l Client HLA - High-level address of the NAS file server (IP address or domain name)

l Client LLA - Low-level address of the NAS file server (port number)

l Collocation Group Name - Name of the collocation group, if collocation is enabled, for theclient

l Proxy Target - Specifies which objects are proxy objects (agents) for other objects

l Compression Location - Location of data compression

l Proxy Node - Proxy object for deduplication if applicable

l Deduplication Location - Location of data deduplication: ClientOrServer, ServerOnly

l Client Direct - Client writes directly to the Data Domain/AFTD using DDBoost are enabled andno writes are made to the storage node

l Block Based Backup - Indicates whether block-based backup is enabled

l NAS File Access User - NAS file access user name

l Storage Replication Policy - Storage replication policy name

l NAS Management User - NAS management user name

l NAS Device Manager - NAS device management user name

l Hardware Type - The hardware type of the client

l NSR Tags - Client tag for NetWorker.

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 135

Backup Client CountReturns the number of clients in the environment in a column chart. Uses data from the NumClients data source.

l Count - Number of backup clients

Backup Client Count By OS TypeReturns the number of clients by OS in the environment in a column chart. Uses data from theBackup Client Config data source.

l OS Type - Type of client operating system

l Count - Number of backup clients

Backup Client Count By ServerReturns the number of clients configured on each backup server in a column chart. Uses data fromthe Backup Client Config data source.

l Server - Name of the backup server

l Client Count - Number of backup clients

Backup Device ConfigReturns the configuration of the backup device in a table report. Uses data from the BackupDevice Config data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device in the backup software

l Device Alias - Alias for the drive, if available

l Device Path - Operating system path to the device

l Device Class - Class of device: Disk, Tape

l Jukebox - Name of the jukebox in which the device is located

l Device Type - Type of device. For example, DLT, Ultrium-2

l Read Only - Indicates if the drive is configured as read-only: Yes, No

l Hardware Id - Identifier such as the device serial number that uniquely maps it to a physicaldevice

l Resource ID - Identifier for the client

l Media Manager Path - Operating system path to the media manager

l Firmware - Firmware version of the device

l Make - Make of the array

l Model - Model number of the array

l Serial - Serial number of the device

l Interface Type - Interface type of the tape drive, ISCSI or Fibre Channel

Reports by System Template

136 Dell EMC Data Protection Advisor Report Reference Guide

l Interface Address - Address to the interface

l Num Target Sessions - Number of target sessions

l Max Sessions - Maximum number of client and server sessions

l Send/Receive Timeout - Send and receive timeout

l Num Retries - Number of retries

l Network Retry Interval - Network failure retry interval (in seconds)

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

l Max Errors - Maximum number of errors

l Device Access - Device access information

Backup Device Config in JukeboxReturns the configuration of the backup device in jukebox in a table report. Uses data from theBackup Device Config data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device in the backup software

l Device Alias - Alias for the drive, if available

l Device Path - Operating system path to the device

l Device Class - Class of device: Disk, Tape

l Jukebox - Name of the jukebox in which the device is located

l Device Type - Type of device. For example, DLT, Ultrium-2

l Read Only - Indicates if the drive is configured as read-only: Yes, No

l Hardware Id - Identifier such as the device serial number that uniquely maps it to a physicaldevice

l Resource ID - Identifier for the client

l Media Manager Path - Operating system path to the media manager

l Firmware - Firmware version of the device

l Make - Make of the array

l Model - Model number of the array

l Serial - Serial number of the device

l Interface Type - Interface type of the tape drive, ISCSI or Fibre Channel

l Interface Address - Address to the interface

l Num Target Sessions - Number of target sessions

l Max Sessions - Maximum number of client and server sessions

l Send/Receive Timeout - Send and Receive timeout

l Num Retries - Number of retries

l Network Retry Interval - Network failure retry interval (in seconds)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 137

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

l Max Errors - Maximum number of errors

l Device Access -Device access information

Backup Device Count By ServerReturns the backup device count by server in a column chart. Uses data from the Backup DeviceConfig data source.

l Server - Name of the backup server

l Client Count - Number of backup devices

Backup Device Count By TypeReturns the backup device count by type in a column chart. Uses data from the Backup DeviceConfig data source.

l Device Type - Type of device. For example, DLT, Ultrium-2

l Count - Number of backup devices

Backup Device Writable CountReturns the backup device writable count in a column chart. Uses data from the Backup DeviceConfig data source.

l Writable - Indicates if the device is writable

l Read Only - Indicates if the drive is configured as read-only: Yes, No

Backup Group ConfigurationReturns the backup group configuration details in a table report. Uses data from the Backup GroupConfig data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Domain Name - Identifier for Application domain

l Policy ID - The name of the policy set that was last activated on the domain

l Group - Name of the group on the backup server

l Active - Indicates if the group is active

l Effective Date - Date and time that the policy went active

l Policy Type - Type of backup policy. For example, full or incremental

l Policy Action - Policy action

l Policy Description - Policy description

l Preceding Action - Preceding action

l Proxy List - VBA list

l Offhost Backup Method - Method used for performing offhost backups

l Storage Unit - Storage unit the policy is configured to use

Reports by System Template

138 Dell EMC Data Protection Advisor Report Reference Guide

l Volume Pool - Volume pool the policy is configured to use

l Limit Jobs Per Policy - Indicates if the policy is limited to run a number of Jobs

l Max Jobs Per Policy - Maximum number of jobs that can be run on the policy, if Limit Jobs PerPolicy is enabled

l Job Priority - Priority that is assigned to Jobs in this policy

l Frozen Image Clients - Indicates if Frozen Image backups are configured in this policy

l Cross Mount Points - Indicates if the backups cross mount points

l True Image Restore Information - Indicates if True Image Restore (TIR) information is gatheredby this policy

l True Image Move Detection - Indicates if True Image Restore information is gathered withmove detection

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

l File Restore Raw - Indicates if the File Restore Raw flag is set on a policy

l Disaster Recovery Info - Indicates if Disaster Recovery Information is gathered

l Block Level Incremental - Indicates if block level incremental backups are enabled

l Multiple Data Streams - Indicates if the policy implements multiple data streams

l Keyword Phrase - Keyword phrase associated with this policy

l Checkpoint Restart - Indicates if checkpoints are configured on this policy

l Checkpoint interval - Checkpoint interval that is used if checkpoint restarts are enabled

l Remote Filesystems - Indicates if Remote File systems are backed up by this policy

l Bare Metal Restore Info - Indicates if Bare Metal Restore Information is gathered

l Snapshot Backup - Indicates if snapshot backups are enabled

l Retain Snapshots - Indicates if snapshots will be retained

l Snapshot Method - Method for performing snapshots

l Offhost Backup - Indicates if offhost backup is enabled

l Use Alternate Client - Indicates if an alternate client is used when performing offhost backup

l Alternate Client Name - Alternate client that is used for offhost backup if Use Alternate Clientis set

l Use Data Mover - Indicates if a data mover is used

l Data Mover Type - Type of data mover to use if the Use Data Mover flag is set

l Resource ID - Identifier for the client

l Auto Restart - Indicates if the group is configured for automatic restarts

l Scheduled Start - Time of day that the group starts

l Parallelism - Indicates if groups can be run simultaneously

l Client Retries - Number of times a client attempts to retry

l Level - Level of backup for the group

l Schedule - Schedule used by the group

l Num Days Inactive Backup Retained - Number of days to retain inactive backup data

l Num Days Inactive Archive Retained - Number of days to retain inactive archive data

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 139

l Interval - Group run interval

l Restart Window - Group restart window

l Forced Incremental - Indicates if forced incremental backup is enabled

l Clones - Indicates if backup is cloned automatically

l Clone Pool - Pool for backup clones

l Success Threshold - Backup status considered as successful

l Inactivity Threshold - File inactivity threshold

l Inactivity Alert Threshold - File inactivity alert threshold

l Snapshot Policy - Snapshot policy name

l Snapshot Pool - Snapshot pool name

l Specification Type - Type of backup specification

l Management Class - The assigned default management class for the policy set

l Registered Nodes - The number of client nodes registered to the policy domain

l Description - Description of the policy domain

l Last Update By - Administrator who made most recent changes

l Last Updated - Date of last change

l Managing Profile - Managing profile name

l Changes Pending - Whether changes are being made but not activated

l Data Pool List - The list of active-data pools in the domain

l Policy - Name of the protection policy

l Workflow - Name of the workflow

Backup Group CountReturns a count of all backup servers across all backup groups in a column chart. Uses data fromthe Backup Group Config data source.

l Count - Total number of backup servers

Backup Group Count By ServerReturns a count of all backup servers across all backup servers in a column chart. Uses data fromthe Backup Group Config data source.

l Server - Hostname of backup server

l Group Count - Number of backup groups

Backup Job ConfigurationReturns a list of jobs that are configured on a backup server in a table report. Uses data from theBackup Server Mapping data source.

l Server - Name of the backup server on which the client is configured

l Sub Name - Name of the TSM server instance

l Client - Name of the client

l Group - Name of the group on the backup server

Reports by System Template

140 Dell EMC Data Protection Advisor Report Reference Guide

l Job - Name of a backup Job

l Policy - Name of the protection policy

l Workflow - Name of the workflow

l Backup Set - Name of the backup set associated with the job

l Schedule - Name of the backup schedule

l Resource ID - Identifier for NetWorker resource

Backup Jukebox ConfigReturns information on the configuration of any tape libraries managed by the backup applicationin a table report. Uses data from the Backup Jukebox Config data source.

l Server - Hostname of the backup server that controls the jukebox

l Sub Name - Name of TSM server instance

l Jukebox Host - Name of the host to which the jukebox is attached

l Jukebox - Name of the jukebox

l Num Devices - Number of devices in the jukebox

l Num Slots - Number of slots in the tape library

l Jukebox Number - Unique identifier for the jukebox

l Jukebox Control Host - Host that controls the jukebox if the jukebox is in a shared environment

l Type - Type of jukebox

l Vendor - Name of the vendor

l Model - Model of the device

l Serial - Serial number of the device

l WWNN - World Wide Node Name

Backup Jukebox ContentsReturns details of the backup jukebox contents in a table report. Uses data from the Media Detailsdata source.

l Server - Hostname of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 141

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Flag that indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Cleanings Left - For cleaning tapes, number of cleanings that are left (Symantec NetBackuponly)

Backup Pool ConfigurationReturns details about which jobs are backed up on each client within each group and with whatschedule in a table report. Uses data from the Backup Pool Configuration data source. This reportreturns data for NetWorker, NetBackup, and TSM

l Server - Hostname of backup server on which the pool is located

l Sub Name - Name of TSM server instance

l Pool Name - Name of the storage pool

l Pool Type - Type of storage pool: Primary, Copy, Any, Backup, Archive

l Description - Description of the backup pool

l Device Class - Device class associated with the storage pool: Disk, Tape

l Est. Capacity - Amount of estimated space of the backup pool (in MB)

l Estimated Capacity - Amount of estimated space of the backup pool (in GB)

l High Mig. Pct - Value at which the TSM server automatically starts migration for this storagepool. This value is determined when the number of volumes containing data reaches thispercentage of the total number of volumes in the storage pool. The total number of volumesincludes the maximum number of scratch volumes

l Low Mig. Pct - Value at which the TSM server stops migration for this storage pool. This valueis determined when the number of volumes containing data reaches this percentage of thetotal number of volumes in the storage pool

l Next Storage Pool - Primary storage pool to which files are migrated

l Reclaim Storage Pool - Primary storage pool as a target for reclaimed data from this storagepool

l Max Size Threshold - Maximum size for a physical file that the server can store in the storagepool (in MB)

l Overflow Location - Overflow location for the storage pool

l Cache Migrated Files - Indicates that the migration process leaves a cached copy of a file inthis storage pool after migrating the file to the next storage pool

l Co-Locate - Indicates whether the server attempts to keep data belonging to a single clientobject, group of client objects, or client file space stored on as few volumes as possible

l Reclamation Threshold - Value at which the TSM server reclaims a volume, based on thepercentage of reclaimable space on a volume (as a percentage)

l Offsite Reclamation Limit - Number of offsite volumes to have their space reclaimed duringreclamation for this storage pool (in MB)

l Max Scratch Volumes - Maximum number of scratch volumes that the server can request forthis storage pool. Valid values are between 0 and 100000000

Reports by System Template

142 Dell EMC Data Protection Advisor Report Reference Guide

l Delay Period for Re-use - Number of days that must elapse after all files are deleted from avolume before the volume can be rewritten or returned to the scratch pool

l Updated By - User ID of the user who updated the pool

l Updated - Date and time change is made to the backup pool

l Storage Pool Data Format - Data format to use to back up files to this storage pool and restorefiles from this storage pool

l Copy Storage Pools - Names of copy storage pools where the server simultaneously writesdata

l CRC Data - Indicates whether a cyclic redundancy check (CRC) validates storage pool datawhen audit volume processing occurs on the server

l Access - Specifies how client objects and server processes (such as migration andreclamation) can access files in the storage pool:

n READWrite — Specifies that client objects and server processes can read and write to filesstored on volumes in the storage pool

n READOnly — Specifies that client objects can only read files from the volumes in thestorage pool

n UNAVailable — Specifies that client objects cannot access files stored on volumes in thestorage pool

l Enabled - If selected, indicates whether the pool is enabled and considered for selection

l Archive - If selected, indicates that if the pool is set for archiving

l Label Template - Template that is to be used when labeling volumes in this pool

l Retention Policy - Retention policy associated with the backup pool. Retention policiesdetermine how long a volume is protected from being overwritten

l Groups - Groups that are required to enter into the backup pool

l Clients - Clients that are required to enter into the backup pool

l Levels - Levels that are required to enter into the backup pool

l Devices - Devices on which volumes are allowed to be mounted

l Store Index Entries - Indicates if file index entries are generated for the backup pool

l Auto Media Verify - Indicates if automated verification is performed while data is being writtento a volume from the backup pool

l Recycle To Pools - Indicates if recyclable volumes can be used by other pools

l Recycle From Pools - Indicates if backup pool can recycle volumes from other pools

l Vol Type Pref - Selection factor when a request is made for a write-able volume. Preferredtype is considered first within a priority level

l Max Parallelism - Number of parallel sessions per device allowed when saving to this backuppool

l Mount Class - Class of mount requests for media belonging to the pool or for media beingadded to this pool

l Worm Pool - Indicates if this pool uses WORM tapes and only WORM tapes

l Create DLT Worm - Indicates whether any tapes labelled in this WORM pool are initialized asDLTWORM tapes, assuming that they are in DLTWORM capable drives

l Barcode Prefix - Barcodes with this prefix value are selected for the pool

l Pool Host - Host on which the backup pool resides

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 143

l Pool User - Users allowed to access the backup pool

l Pool Group - Group to which the backup pool belongs

l Physical Volume Group 1 - Name of the first assigned physical volume group

l Physical Volume Group 2 - Name of the second assigned physical volume group

l Physical Volume Group 3 - Name of the third assigned physical volume group

l Number Volumes - Total number of logical volumes in the volume group

l Number Pending - Number of unfinished jobs in volume group

l Number Recover - Number of jobs for transfer-out (if in group TR-LVG) or, at startup, thenumber of single-saved logical volumes in a dual-save group

l Minimum Save - Minimum number of requested saves to retain when memory falls below thedefined threshold

l Deduplicated Data - Indicates backup data was deduplicated. Size of deduplicated data (in MB)

l Num Duplicate Identification Processes - Number of duplicate identification processes that arespecified as the default for the storage pool

l Data Deduplicated By Client - Indicates data was deduplicated by backup client

Backup Schedule ConfigurationReturns details on the schedules on a backup server in a table report. Uses data from the BackupSchedule Config data source.

l Server - Hostname of backup server

l SubName - Name of TSM server instance

l Domain Name - Name of the domain associated with the group

l Schedule - Name of the schedule on the backup server

l Group - Name of the group associated with the schedule

l Calendar Backup - Indicates if this schedule is a calendar type backup

l Calendar Retries Allowed - Indicates if retries are allowed after a run day

l Frequency - Frequency of the schedule

l Storage Unit Override - Storage unit that should be used by Jobs using this schedule

l Volume Pool Override - Volume Pool that should be used by Jobs using this schedule

l Retention - Retention used by Jobs using this schedule (in seconds)

l Multiplexing - Value of the media multiplexing field

l Sunday Window Start - Time of day that the window starts on a Sunday

l Sunday Window Duration - Duration of the window on Sunday

l Monday Window Start - Time of day that the window starts on a Monday

l Monday Window Duration - Duration of the window on Monday

l Tuesday Window Start - Time of day that the window starts on a Tuesday

l Tuesday Window Duration - Duration of the window on Tuesday

l Wednesday Window Start - Time of day that the window starts on a Wednesday

l Wednesday Window Duration - Duration of the window on Wednesday

l Thursday Window Start - Time of day that the window starts on a Thursday

Reports by System Template

144 Dell EMC Data Protection Advisor Report Reference Guide

l Thursday Window Duration - Duration of the window on Thursday

l Friday Window Start - Time of day that the window starts on a Friday

l Friday Window Duration - Duration of the window on Friday

l Saturday Window Start - Time of day that the window starts on a Saturday

l Saturday Window Duration - Duration of the window on Saturday

l Num Copies - Number of copies of data that should be made

l Copy 1 Storage Unit - Storage unit that should be used by the first copy of data

l Copy 1 Pool - Volume pool that should be used by the first copy of the data

l Copy 1 Retention Level - Retention level to be associated with the first copy of the data

l Copy 1 Failure Action - Failure action to take for the first copy of the data

l Copy 2 Storage Unit - Storage unit that should be used by the second copy of data

l Copy 2 Pool - Volume pool that should be used by the second copy of the data

l Copy 2 Retention Level - Retention level to be associated with the second copy of the data

l Copy 2 Failure Action - Failure action to take for the second copy of the data

l Copy 3 Storage Unit - Storage unit that should be used by the third copy of data

l Copy 3 Pool - Volume pool that should be used by the third copy of the data

l Copy 3 Retention Level - Retention level to be associated with the third copy of the data

l Copy3 Failure Action - Failure action to take for the third copy of the data

l Copy 4 Storage Unit - Storage unit that should be used by the fourth copy of data

l Copy 4 Pool - Volume pool that should be used by the fourth copy of the data

l Copy 4 Retention Level - Retention level to be associated with the fourth copy of the data

l Copy 4 Failure Action - Failure action to take for the fourth copy of the data

l Calendar Week Days - Week days selected if using a calendar schedule

l Calendar Month Days - Month days selected if using a calendar schedule

l Calendar Hours - Hours selected if using a calendar schedule

l Window Start - Start time of backup window

l Window Duration - Duration of the backup window

l Enabled - Indicates if scheduling is enabled

l Schedule Start Time - Start time of schedule

l Schedule End Time - End time of schedule

l Backup Type - Backup client type

l Time Zone - Time zone used for schedule

l Comment - User comment

l Period - Indicates a weekly or monthly schedule

l Action - Daily backup level for the schedule

l Override - Override action for the schedule

l Backup Application - Name of the backup application

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 145

Backup Server Client Group MappingReturns a list of clients that are included in a group in a table report. Uses data from the BackupServer Mapping data source.

l Server - Hostname of backup server

l Client -

l Group - Group that is required to enter into the backup pool

Backup Server ConfigurationThis report shows configuration details of an individual backup server or group of backup servers.

l Server - Hostname of backup server

l Sub Name -

l Application - Application name

l Version - Application version

l OS Type - Operating system on which the application is running

l Hostname - Server TCP/IP address

l Resource ID - Identifier for the client

l Port - Server port address

l Password Set - Indicates if the server password is set

l Install Date - Installation date of the server software

l Restart Date - Last date and time when the server was started

l Authentication On - Indicates if password authentication is set on or off

l Password Expiration Period - Period after which the administrator or client object passwordexpires (in days)

l Invalid Sign-On Attempt Limit - Number of invalid sign-on attempts before a object is locked

l Min Password Length - Minimum number of characters for the password

l Registration - Indicates if the client object registration is open or closed

l Availability - Indicates if the server is enabled or disabled

l Accounting - Indicates if an accounting record is generated at the end of each client objectsession

l Activity Log Retention - Number of days information is retained in the activity log, or the sizeof the log (in days)

l Activity Summary Retention Period - Number of days information is retained in the SQLactivity summary table (in days)

l License Audit Period - Period after which the license manager automatically audits the backupserver license (in days)

l Last License Audit - Date and time when the last license audit occurred

l License Compliance - Indicates if the server is in compliance (Valid) or out of compliance(Failed) with the license terms

l Scheduler - Indicates if central scheduling is running (active or inactive)

l Max Sessions - Maximum number of client/server sessions

Reports by System Template

146 Dell EMC Data Protection Advisor Report Reference Guide

l Max Scheduled Sessions - Maximum number of client/server sessions available for processingscheduled work

l Event Record Retention - Number of days central scheduler event records are retained (indays)

l Client Action Duration - Duration of the period during which the client processes the scheduledefined (in days)

l Schedule Randomization Percentage - Randomization percentage. Indicates how much of thestartup window is used for executing scheduled events in client-polling mode

l Query Schedule Period - Frequency with which clients poll the server to obtain scheduledwork, in client-polling mode (in hours). If the value in this field is Client, the polling frequency isdetermined by the client object

l Max Command Retries - Maximum number of times that a client scheduler retries after a failedattempt to execute a scheduled command. If the value in this field is Client, the client objectdetermines the maximum number of retries

l Retry Period - Number of minutes between attempts by the client scheduler to retry after afailed attempt to contact the server or to execute a scheduled command (in minutes). If thevalue in this field is Client, the client object determines the number of minutes between retries

l Scheduling Mode - Central scheduling modes supported by the server

l Log Mode - Mode for saving recovery log records: roll-forward, normal

l Database Backup Trigger - Backup manager automatically runs a backup of the database if thedatabase backup trigger is enabled

l Active Receivers - Active receivers for which event logging has begun

l Configuration Manager -Indicates if the server is a configuration manager

l Refresh Interval - Refresh interval. Interval that elapses before the managed server requests arefresh of any changes from a configuration manager

l Cross Define - Indicates if cross definition of servers is allowed

l Subfile Client -

l Context Messaging - Indicates if context messaging is enabled or disabled

l Server Free Status - Indicates if server-free data movement is on, off, or not supported

l Server Free Batch Size - Amount of data that is copied in a single instance of server-free datamovement (in MB)

l TOC Load Retention - Approximate number of minutes that unreferenced Table of Contentsdata will be retained in the database (in minutes)

l Machine GUID - Machine globally unique identifier (GUID) as of the last time that the serverwas started. This GUID identifies the host machine on which the current server resides

l Archive Retention Protection - Indicates if archive data retention protection is activated ordeactivated

l Last Refresh - If the server is a managed server, specifies the date and time of the lastsuccessful refresh of configuration information from the configuration manager

l Num Activity Log Records - Number of records in the activity log

l Activity Log Size - Size of the activity log (in MB)

l Deduplication Verification Level - Client-side deduplication verification level

l Database Report Mode - Database reporting mode

l Database Directories - Database data directories

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 147

l Encryption Strength -

l Capacity - Total capacity of the storage pool (in MB)

l Usable Capacity - Amount of the pool that is available for storage (in MB)

l IP Address - IP address of the backup server

l Hardware ID - Hardware identifier of the backup server

Backup Server Group Job MappingReturns a list of jobs that are included in a group in a table report. Uses data from the BackupServer Mapping data source.

l Server - Name of the backup server on which the client is configured

l Client - Name of the client

l Group - Name of the group on the backup server

l Job - Name of a backup Job

Backup Server Server CountReturns the number of clients in the environment in a column chart. Uses data from the BackupServer Config data source.

l Server Count - Number of clients in the environment

Backup Server Server Count By ApplicationReturns the number of backup servers of each application exist in the environment in a pie chart.Uses data from the Backup Server Config data source.

l Application - Type of software. For example, NetWorker, NetBackup

l Number of different values -

Backup Server Server Count By VersionReturns the number of backup servers of each version existing in the environment in a pie chart.Uses data from the Backup Server Config data source.

l Version - Type of software. For example, NetWorker, NetBackup

l Number of different values -

Celerra Filesystem to LUN MappingReturns the mapping between file systems and back-end storage on the storage, allowing you toidentify where disks are shared across file systems, in a topology report. Uses data from theFilesystem to LUN Visualization data source.

l Name - Name of disk volume presented to Celerra

l Type - Type of LUN

l Group - Name of the group

l ToolTip -

l Source - LUN that is mapped

l Target - Entity to which the LUN is mapped. This value can have multiple entries

Reports by System Template

148 Dell EMC Data Protection Advisor Report Reference Guide

Celerra Replication VisualizationReturns the configuration information for replication sources and targets in a topology report.Uses data from the Replication Visualization data source.

l Name - Name of the disk volume presented to Celerra

l Type - Type of array

l Label - Name of the field returned

l Group - Name of the group

l ToolTip -

l Source - Name of the source

l Target - Name of the target

l Node - Node name

l Network Status - Status of the network link being used by the replication set

l Source Status - Status of the source of the replication set

l Destination Status - Status of the target of the replication set

Celerra Storage Pool ConfigurationReturns the configuration and options set for storage pools configured on Celerra Storage in atable report. Uses data from the Storage Pool Configuration data source.

l Server - Hostname or IP address of the Celerra being monitored

l Storage Pool Name - Name of the storage pool

l Pool ID - Unique identifier for the pool

l Description - Description of the pool

l Disk Type - If a disk volume, the type of disk volume. If a volume type other than disk, the typeof the underlying disk volumes

l Capacity - Total capacity of the storage pool (in MB)

l Used Size - Amount of storage used by the pool (in MB)

l Auto Size - Indicates if the storage pool is set to extend automatically. If enabled, the poolautomatically extends with the unused disk volumes of the same profile, if available, wheneverneeded (in MB)

l Dynamic - Indicates whether a storage pool automatically attempts to grow or shrink membervolumes

l Greedy - Indicates whether a storage pool attempts to create new member volumes beforeusing existing space from current member volumes

Celerra Volume ConfigurationReturns details on the volumes configured on Celerra in a table report. Uses data from the VolumeConfiguration data source.

l Server - Hostname or IP address of the Celerra being monitored

l Volume Name - Name of the Celerra volume as displayed in the Celerra Manager

l Volume ID - Identifier for the volume

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 149

l Volume Type - Type of volume: disk, slice, stripe, meta, pool

l Volume Size - Size of the volume (in MB)

l Storage Pool - Storage pool associated with the volume

l Storage System - Storage system on which the volume is located

l LUN - Name of the LUN on the storage system that the disk based volume is mapped to (disk-based volumes only

l Disk Type - If a disk volume, the type of disk volume. If a volume type other than disk, the typeof the underlying disk volumes

l Stripe Size - Size of the stripe (stripe volumes only) (in MB)

Cluster ConfigurationReturns details on the cluster configuration in a table report. Uses data from the ClusterConfiguration data source.

l Cluster Name - Name of the cluster

l Description - Description of the cluster configuration

l Type - Type of cluster: VCS, MSCS

Cluster Filesystems Not Backed UpReturns a list of those file systems that have not had a successful backup during the reportingperiod in a table report. Uses data from the Backup Job Details and Cluster FilesystemConfiguration data sources.

l Host - Name of the cluster on which the file system is mounted.

l Filesystem - Name of the file system.

l Status - Status of the file system.

Data Domain Boost DetailsReturns the Data Domain Boost details in a table report. Uses data from the Data Domain BoostFiles for Devices data source.

l Server - Name of the backup server

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device in the backup software

l Device Path - Operating system path to the device

l Data Domain Name - Name of the Data Domain

l File Name - Name of the file that could not be backed up

l Storage Unit - Storage unit the policy is configured to use

Data Domain Boost FilesReturns information on the Data Domain Boost files in a table report. Uses data from the DataDomain Boost Files data source.

l Host Name- Name or IP address of Data Domain

l File Name - Name of the file that could not be backed up

Reports by System Template

150 Dell EMC Data Protection Advisor Report Reference Guide

l Storage Unit - Storage unit the policy is configured to use

Data Domain Mtree To Tenant Unit MappingReturns information on the Data Domain Mtree to tenant unit mapping in a table report. Uses datafrom the Mtree To Tenant Unit Mapping data source.

l Hostname - Name or IP address of Data Domain

l Name - Data Domain tenant name

l Mtree - Mtree name

Data Domain Network DNSReturns information on the Data Domain network DNS in a table report. Uses data from theNetwork DNS data source.

l Hostname - Name or IP address of Data Domain

l Domain Name Server - Domain Name Server name

Data Domain NTP ConfigurationReturns information on the Data Domain NTP (Network Time Protocol) configuration. NTP serversallow hosts to have their system time synchronised. Uses data from the NTP Configuration datasource.

l Hostname - Name or IP address of Data Domain

l Server - NTP Server name

Data Domain Replication ConfigurationReturns information regarding Data Domain replication configuration in a report. Uses data fromthe Replication Config data source.

l Hostname - Name or IP address of Data Domain

l Source - The Data Domain system that receives data from backup applications

l Destination - The Data Domain that receives data from the replication source Data Domain

l Context Number - The context number for directory replication or a zero (0) for collectionreplication

l Connection Host and Port - The destination system and port to connect to

l Low Bandwidth Optimization - Flag indicating the status of low-bw-optim: enabled or disabled

l Encryption Enabled - Flag indicating the state of encryption

l Replication Enabled - Flag indicating if the replication process is enabled or disabled

Data Domain Tenant Unit ConfigurationReturns information on the Data Domain tenant unit configuration in a table report. Uses data fromthe Tenant Unit Configuration data source.

l Hostname -Name or IP address of the Data Domain

l Name- Data Domain tenant name

l Number of Storage Units - Number of Data Domain storage units

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 151

l Number of Mtrees - Number of Data Domain Mtrees

l Number of Management Users - Number of management users

Data Domain VTL Access Group ConfigurationReturns information about the configuration of VTL access groups in a table report. Uses datafrom the Access Group Configuration data source. A VTL access group is a collection of initiators(WWPNs or aliases) and the drives and changers they are allowed to access.

l Hostname - Name or IP address of Data Domain

l Group - Group Name

l Initiator - Client Initiator

l VTL - Target VTL

l Drive - Target drive

l Changer - VTL Changer

l LUN ID - Target device's LUN number

l Primary Port - Primary port configured

l Port In Use - Port currently in use

Data Mover ConfigurationReturns the Data Mover configuration details in a table report. Uses Data from the Data MoverConfiguration data source.

l Server - Name or IP Address of the EMC File Storage (Celerra)

l Data Mover Name - logical name of Data Mover

l Slot - Slot on Celerra unit

l Role - Data Mover role

l Unicode - Internationalization mode of the server if Unicode (or otherwise ASCII)

l NTP Servers - IP addresses of NTP server hosts that mover uses to synchronize with

l Failover Policy - Failover policy: none, manual, auto, retry

l StandBy For - List of movers for which this mover is a standby

l StandBys - List of standbys for this mover

EDL Configuration OptionsReturns information on the configuration options on a VTL Unit in a table report. Uses data fromthe VTL Configuration Options data source.

l Node - Name of the EDL

l Option - Name of the configuration option

l Value - Value of the configuration option

Reports by System Template

152 Dell EMC Data Protection Advisor Report Reference Guide

Enclosure ConfigurationReturns the enclosure configuration details in a table report. Uses data from the Enclosure Configdata source.

l Hostname - Hostname or IP address of the array

l Sub Name - Identifier for the Storage Array

l Enclosure Name - Name of the enclosure that the disk is in

l Manufacturer - Manufacturer of enclosure

l Model - Model of enclosure

l Serial - Serial number of enclosure

l Type - Type of enclosure

l Rack Name - Identifier for disk rack

l Slots - Enclosure slot capacity

Exported LUNsReturns information on any LUNs that are exported from the selected objects as disks in a tablereport. Uses data from the Exported LUNs data source.

l LUN Node - Name of the host from which the LUN is being exported

l LUN - Name of the LUN before export

l Disk Node - Name of the host to which the LUN is being exported

l Disk - Name of the LUN as known by the host that imports the LUN

l Manufacturer - Name of the disk manufacturer

l Model - Model of the disk

l Serial Number - Serial number of the disk

l Firmware Revision - Firmware version of the disk

l Size - Size of the exported LUN (in GB)

Fibre Channel Device ConfigurationReturns the Fibre Channel device configuration details in a table report. Uses data from the FibreChannel Devices data source.

l Hostname - Name of the host in which the HBAs are installed

l Device - Name of the device on the host where the HBAs are installed. Forexample, /dev/rmt/1n

l WWPN - Fibre Channel World Wide Port Number of the target device

Fibre Channel Device MappingReturns the Fibre Channel device mapping details in a table report. Uses data from the FibreChannel Device to Tape Drive Mapping data source.

l Hostname - Name of the host in which the HBAs are installed

l Device - Name of the device on the host where the HBAs are installed. Forexample, /dev/rmt/1n

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 153

l Tape Library - Name of the tape library in which the device is physically present

l Tape Drive - Name of the tape drive within the library

l Make - Make of the tape drive

l Model - Model of the tape drive

l Firmware - Firmware version of the tape drive

l Serial - Serial number of the tape drive

Fileserver ExportsReturns details of file systems that are exported from a fileserver in a table report. Uses data fromthe File server exports data souce.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l Name - Name of the file system being exported

l Export - Name which the file system is being exported as

l Type - Type of export: CIFS, NFS

l SetUID - Indicates if the SetUID flag is supported on this export (where the caller may run aprogram with the privileges of the file owner) (NFS only)

l Permission - Permissions on the export. For example, read only (NFS only)

l Dedup Enabled - Indicates if deduplication was enabled on the export

l Replication Enabled - Indicates if replication was enabled on the export

l Backup Window - Identifier for backup window in which export took place

l Backup Window Start Time - Start time for backup window (in seconds)

l Backup Window End Time - End time for backup window (in seconds)

Filesystem Mount ConfigurationReturns the configuration options for file systems mounted on EMC File Storage. Uses data fromthe Filesystem Mount Configuration data source.

l Hostname - Name or IP address of the EMC File Storage

l Data Mover - Name of the Data Mover hosting the file system

l Filesystem - Name of the file system

l Mount Point - Pathname of the new mount

l Disabled - Indicates if the file system mount is disabled

l NT Credential - Indicates if the Celerra Network Server takes account of a user's Windowsgroup memberships when checking an ACL for access through NFS

l Prefetch - Indicates if prefetch processing is enabled

l Read Only - Indicates that the mount is read-only on the Data Mover

l Uncached - Indicates if well-formed writes (that is, multiples of a disk block and disk blockaligned) are sent directly to the disk without being cached on the server. Enabling this optionimproves performance for applications such as databases that have many connections to alarge file to the disk without being cached on the server.

l Virus Scan - Indicates if the virus checker protocol is enabled

l Access Policy - Access-checking policy for the file system. The default policy is NATIVE.Access-checking policies apply only when the Data Mover's user authentication is set to the

Reports by System Template

154 Dell EMC Data Protection Advisor Report Reference Guide

recommended default, ’NT’. An access-checking policy defines the file and directorypermissions that are applied (UNIX mode bits, Windows ACLS, or both) when a user attemptsto access a filesystem in a mixed NFS and CIFS environment. The policies are: NT, UNIX,NATIVE, SECURE, MIXED, MIXED_COMPAT

l Lock Policy - Policy for the locking behavior of NFSv2 and NFSv3 clients when accessing fileslocked by NFSv4 or CIFS clients: nolock, writelock, or rwlock. The default is nolock

l CIFS Sync Write - Indicates if the Celerra Network Server performs immediate, synchronouswrites to the disk, independent of the CIFS write protocol option

l CIFS Notify - Indicates if CIFS client notification is enabled for changes made to the directoryfile structure in the file system

l CIFS Notify On Access - Indicates if CIFS client notification is enabled whenever a useraccesses the file system

l CIFS Notify On Write - Indicates if CIFS client notification is enabled whenever a user writes tothe file system

l CIFS Trigger Level - Specifies the deepest directory level to which the notification settingsapply to the file system. The default setting is 512

l CIFS Op Locks - Indicates if opportunistic lock granting for CIFS client access is enabled onthe file system

Imported LUNsReturns information on imported LUNs in a table report. Uses data from the Imported LUNs datasource.

l Disk Node - Name of the host to which the LUN is being imported

l Disk - Name of the disk that is the imported LUN

l LUN Node - Name of the host from which the LUN is being imported

l LUN - Name of the LUN before import

l Serial - Serial number of the LUN

l Volume - Volume on which the LUN resides, if applicable

l Size - Size of the imported LUN (in GB)

l Type - Type of LUN: iSCSI, Fibre Channel

iSCSI iSNS ConfigurationReturns information on the names of the iSNS server configured on a object in a table report. Usesdata from the iSCSI iSNS Configuration data source.

l Node - Name of the object

l iSNS Server - Name of the iSNS server for the object

iSCSI Portal ConfigurationReturns information about the addresses of iSCSI portals on a object in a table report. Uses datafrom the iSCSI Portal Configuration data source.

l Node - Name of the object on which the iSCSI portal exists

l Sub Name - Identifier for the Storage Array

l Adapter ID - Identifier for the adapter

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 155

l IP Address - IP Address of the iSCSI portal

l Port - Port number of the iSCSI portal

Least LUNs Per PortReturns the least LUNs per port in a table report. Uses data from the Fibre Channel Port Configand LUN Mapping data source.

l Node - Name of the array on which the LUN exists

l Port - Name of the server port

l LUNs - Address of the LUN on the mapped endpoint

LUN Capacity Per NodeReturns the LUN capacity per object in a column chart. Uses data from the LUN Configurationdata source.

l Node - Name of the array on which the LUN exists

l Size - Size of the LUN (in GB)

LUN Capacity Per PortReturns the LUN capacity per port in a column chart. Uses data from the Fibre Channel PortConfig, LUN Configuration, and LUN Mapping data sources.

l Node - Name of the array on which the LUN exists

l Port - Name of the server port

LUN MappingReturns the mapping between LUNs and Fibre Channel WWNs or iSCSI IQNs, depending on theprotocol used to access the LUN, in a table report. Uses data from the LUN Mapping data source.

l Node - Name of the array on which the LUN exists

l Sub Name -

l Name - Name of the LUN. /vol/ is stripped from the value before it is returned

l Source - LUN that is mapped

l Target - Entity to which the LUN is mapped. This value can have multiple entries

l LUN - Address of the LUN on the mapped endpoint

l Type - Type of LUN: iSCSI, Fibre Channel

l OS Type - Operating system type of the mapped LUN

LUN Source PortsReturns the LUN source port details in a table report. Uses data from the LUN Mapping datasource.

l Node - Name of the array on which the LUN exists

l Sub Name -

l Name - Name of the LUN

Reports by System Template

156 Dell EMC Data Protection Advisor Report Reference Guide

l Source - LUN that is mapped

l Target - Entity to which the LUN is mapped. This value can have multiple entries

LUN Source Ports for rulesetReturns LUN source port details in a table report. Report for Too few source ports for LUN rule.Uses data from the LUN Mapping and User Input data sources.

l Node - Name of the array on which the LUN exists

l Name - Name of the LUN

l Alert - Identifier of the alert

LUNs Per NodeReturns the LUNs per object details in a column chart. Uses data from the LUN Configuration datasource.

l Node - Name of the array on which the LUN exists

l LUNs - Name of the LUNs on the storage system to which the disk-based volume is mapped

LUNs Per PortReturns the LUNs per port details in a column chart. Uses data from the Fibre Channel Port Configand LUN Mapping data sources.

l Node - Name of the array on which the LUN exists

l Name - Name of the LUN

l Source - LUN that is mapped

l Target - Entity to which the LUN is mapped. This value can have multiple entries

Mirror ConfigurationReturns the mirror configuration details in a table report. Uses data from the Mirror Configurationdata source.

l Node - Name of the object on which the mirror resides

l Path - Path to the mirror

MTree DetailsReturns the MTree details in a table report. Uses data from the Backup Device Access FilesystemDetails data source.

l Server - Name of the backup server

l Device Access - Device access information

l MTree Name - MTree name

MTree Quota ConfigurationReturns the MTree quota configuration details in a table report. Uses data from the MTree QuotaConfiguration data source.

l Hostname - Name or IP address of the Data Domain server

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 157

l Name - MTree name

l Pre Compression Size - Pre-compression size (in MB)

l Soft Limit - Soft limit value (in MB)

l Hard Limit - Hard limit value (in MB)

l Pre Compression Soft Limit Utilization - The Pre Compression Size divided by the Soft Limitvalue, then this value is multiplied by 100, displayed as a percentage (%)

l Pre Compression Hard Limit Utilization - The Pre Compression Size divided by the Hard Limitvalue, then this value is multiplied by 100, displayed as a percentage (%)

NetBackup Catalog File Backup ConfigurationReturns information on the files that are scheduled for backup as part of the NetBackup Catalogbackup process in a table report. Uses data from the NetBackup Catalog Backup File Config datasource.

l Server - Name of the NetBackup server

l Pathname - Path to the catalog file that is backed up

NetBackup Catalog Backup ConfigurationReturns information on the configuration of NetBackup Catalog backups in a table report. Usesdata from the NetBackup Catalog Backup Config data source.

l Server - Name of the NetBackup Master Server

l Schedule Type - Type of schedule that the catalog backup is following

l Media Server - Name of the NetBackup Media Server to which the catalog is backed up

l Media 1 Type - Type of media to which the catalog is backed up. For example, Disk, RemovableMedia for the first backup

l Media 1 Target - Either the Media ID that the backup will occur to or the pathname for a diskbased backup for the first backup

l Media 1 Density - Density of the media that the backup is going to for the first backup

l Media 2 Type - Type of media to which the catalog will be backed up. For example, Disk,Removable Media for the second backup

l Media 2 Target - Either the Media ID to which the backup occurs or the pathname for a diskbased backup for the second backup

l Media 2 Density - Density of the media that the backup is going to for the second backup

NetBackup Disaster Recovery ConfigurationReturns NetBackup Disaster Recovery Configuration details in a table. Uses data from theNetBackup Disaster Recovery Config data source.

l Server - Name of the NetBackup Server

l Group- Name of the catalogue Policy

l Email - Email address to send disaster recovery details to

l Disk Path - Disk path where the disaster recovery details are stored

l Media ID - Disaster Recovery media ID

l User - Name of the user who has access to the disaster media disk path

Reports by System Template

158 Dell EMC Data Protection Advisor Report Reference Guide

l Password Enabled - Whether password is defined for the user or not

l Critical Policy List - List of Critical Policies

l Density - Disaster Recovery media density

NetBackup Disk Pool ConfigurationReturns the NetBackup disk pool configuration details in a table report. Uses data from theNetBackup Disk Pool Config data source.

l Server - Name of the NetBackup Server

l Sub Name - Not applicable

l Pool - Name of the pool

l Pool ID - Identifier for the disk pool

l Storage Servers - Storage servers in the disk pool

l Server Type - Type of NetBackup server: master, client

l Disk Storage Type - Type of disk storage unit

l Raw Size - Raw size of the disk pool (in GB)

l Capacity - Effective capacity of the disk pool (in GB)

l Volume Count - Number of volumes in the pool

l System Tag - NetBackup-specified identifier for the Disk Volume

l Low Water Mark - Percentage of dirty pages to trigger a cache flush

l High Water Mark - Percentage of dirty pages to stop a cache flush

l Max I/O Streams - Maximum permitted number of I/O streams

l Comment - User-defined identifier or comment for the disk volume

l Patchwork - Indicates the pool is associated with an enclosure

l Visible - Indicates pool is visible and managed through the user interface

l Single Storage Server - Pool is limited to a single storage server

l Open Storage - Managed as an Open Storage disk pool

l Allow Roving Volumes - Allow active mounts and unmounts of disk volumes

l Allow Optimized Duplication - Allow optimized duplication

l Allow Span Images - Allow images to span volumes

l Allow Basic Staging - Allow basic image staging

l Allow Lifecycle Management - Allow image lifecycle management

l Allow Capacity Management - Allow capacity management

l Allow Image Fragmentation - Allow images to be fragmented

l Allow Catalog Backup - Allow catalog backups

l Allow Checkpoint/Restart - Allow checkpoint restarts

l Allow Random Write Access - Allow random write access

l Allow FT Channel Transfer - Allow transfer through FT channel

l Allow Capacity Managed Retention - Allow capacity managed retention

l Allow Capacity Managed Queuing - Allow capacity managed job queuing

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 159

l Allow Virtual Image Construction - Allow virtual image construction

l Meta Data - Describe client data during backup

NetBackup Disk Volume ConfigurationReturns information of the disk volumes on a NetBackup Server in a table report. Uses data fromthe NetBackup Disk Volume Config data source.

l Server - Name of the NetBackup Server

l Sub Name - Not applicable

l Volume ID - Identifier for the volume

l Path - Path to the volume

l Pool - Pool to which the volume belongs

l Disk Type - If a disk volume, the type of disk volume. If a volume type other than disk, the typeof the underlying disk volume

l Capacity - Capacity of disk (in GB)

l System Tag - NetBackup-specified identifier for the Disk Volume

l Ok On Root - Indicates if the volume can be mounted on root file system

l Read On Write - Indicates if reads are allowed on write-mounted volumes

NetBackup Global ConfigurationReturns NetBackup Global Configuration details in a table. Uses data from the NetBackup GlobalConfig data source.

l Server - Name of the NetBackup Server

l Mail Admin - The email address of the administrator

l Job Retry Delay (Minutes) - Job retry delay (in minutes)

l Max. Jobs per Client - Maximum jobs per client

l Backup Tries Period (Hours) - Backup tries in period (in hours)

l Backup Tries per Period - Number of backup tries per period

l Num. Days Logs Kept - Number of days log kept

l Max. Drives per Master - Maximum drives per master server

l Compress DB Files Interval - Compress DB files interval (in seconds). Returns 0 for nocompression

l Media Mount Timeout - Media mount timeout (in minutes). Returns 0 if unlimited

l Shared Timeout - Multihosted media mount timeout (in seconds). Returns 0 if unlimited

l Display Reports (Hours) - The number of hours ago that the start time for reports is. Forexample, if you set this to 24 hours, then the reports process data from 24 hours ago. Thedefault is 24 hours.

l Num. Days TIR Info Kept - Number of days TIR ( True-image-recovery) info is kept

l Prep Interval (Hours) - Specifies the preprocessing interval. This interval is the minimum timein hours between client queries to discover new paths when NetBackup uses auto-discover-streaming mode.

l Max. Backup Copies - Maximum number of backup copies

Reports by System Template

160 Dell EMC Data Protection Advisor Report Reference Guide

l DB Clean Interval (Hours) - DB Clean Interval (in hours)

l DB Clean Wait Time (Minutes) - DB Clean Wait Time (in minutes)

l Policy Update Interval (Minutes) -Policy Update Interval (in minutes)

NetBackup Lifecycle Policy ConfigurationReturns the NetBackup lifecycle policy configuration details in a table report. Uses data from theNetBackup Lifecycle Policy Config data source.

l Server - Name of the NetBackup Master Server

l Sub Name - Not applicable

l Policy - Name of the Lifecycle policy

l Data Classification - NetBackup Data Classification, if specified. For example, Gold or Bronze

l Duplication Priority - Number representing NetBackup duplication priority. The higher thenumber, the greater the priority

l State - Indicates whether policy is active or inactive

NetBackup Lifecycle Policy DestinationReturns the NetBackup lifecycle policy destination information in a table report. Uses data fromthe NetBackup Lifecycle Policy Destination data source.

l Server - Name of the NetBackup Master Server

l Sub Name - Not applicable

l Policy - Name of the lifecycle policy to which the destination belongs

l Destination Type - Type of storage destination

l Storage Unit - Storage unit the policy is configured to use

l Volume Pool - Name of destination volume pool

l Server Group - Name of destination server group

l Source - Indicates the source type. For example, the original client, or an image

l Retention Type - Storage retention type: Fixed, Staged Capacity Managed, Expire AfterDuplication

l Retention Level - Retention period

l Preserve Multiplexing - Preserve multiplexing

l Alternate Read Server - An alternate server that can read an image created by a differentmedia server

l State - Indicates whether the destination is active or inactive

NetBackup Media Server Configuration DetailsReturns the NetBackup media server configuration details in a table report. Uses data from theNetBackup Media Server Config data source.

l Server - Name of the NetBackup Master Server

l Num Data Buffers - Number of data buffers used when writing backups to tape

l Number Data Buffers for Disk - Number of data buffers used when writing backups to disk

l Num Data Buffers for Restores - Number of data buffers used when restoring backups to disk

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 161

l Size Data Buffers - Size of the data buffers used when writing to tape

l Size Data Buffers for Disk - Size of each data buffer used when writing to disk

l Network Buffer Size - Size of the buffer used when reading backup data from the network

l Network Buffer Size for Restores - Size of the buffer used when sending restore data to thenetwork

NetBackup Server Configuration DetailsReturns NetBackup server configuration details in a table report. Uses data from the NetBackupServer Config data source.

l Server - Name of the NetBackup Master Server

l Parameter - Name of the configuration parameter

l Value - Value of the parameter

NetBackup Storage Server ConfigurationReturns the NetBackup storage server configuration in a table report. Uses data from theNetBackup Storage Server Config data source.

l Server - Name of the NetBackup Storage Server

l Sub Name - Not applicable

l Name - Name of the storage unit

l Type - Type of storage server: master, client

l Storage Type - Type of storage unit

l Open Storage - Indicates server is managed as an Open Storage server

l Allow Roving Volumes - Allow active mounts and unmounts of disk volumes

l Allow Optimized Duplication - Enable optimized duplication

l Allow Span Images - Allow images to span volumes

l Allow Basic Staging - Allow basic image staging

l Allow Lifecycle Management - Allow image lifecycle management

l Allow Capacity Management - Allow capacity management

l Allow Image Fragmentation - Allow images to be fragmented

l Allow Catalog Backup - Allow catalog backups

l Allow Checkpoint/Restart - Allow checkpoint restarts

l Allow Random Write Access - Allow random write access

l Allow FT Channel Transfer - Allow transfer through FT channel

l Allow Capacity Managed Retention - Allow capacity managed retention

l Allow Capacity Managed Queuing - Allow capacity managed job queuing

l Allow Virtual Image Construction - Allow virtual image construction

l Meta Data - Describe client data during backup

l Disk Groups - Indicates if backup is aware of disk pools and enclosures

l Allow Active Disk Group Management - Allow active management of disk groups

l Allow Active Storage Server Management - Allow active management of storage servers

Reports by System Template

162 Dell EMC Data Protection Advisor Report Reference Guide

l Preferred For Restore - Preferred storage server for restores

l Required For Restore - Required storage server for restores

l Required For Duplication - Required storage server for duplicates

l Queue If Down - Queue jobs if storage server is down

NetBackup Storage Unit ConfigurationReturns the configuration of NetBackup storage units in a table report. Uses data from theNetBackup Storage Unit Config data source.

l Server - Name of the NetBackup Storage Server

l Name - Name of the storage unit

l Media Server - Media Server with which the storage unit is associated

l Storage Unit Type - Storage unit type. For example, Media Manager, Disk, NDMP, Fastrax

l Media Sub Type -

l On Demand Only - Indicates if the storage unit can be used for On Demand backups only (thatis, only when a policy of schedule is explicitly configured to use this storage unit)

l Path - Absolute path name to the directory used by Disk based storage unit

l Robot Type - Type of robot on which the storage unit is located

l Density - Cartridge density used by Media Manager storage units

l Robot Number - Number of the robot associated with the storage unit

l Max Concurrent Drives - Maximum number of drives used by a Media Manager storage unit

l Max Concurrent Jobs - Maximum number of Jobs that can be multiplexed to a disk storage unit

l Max Multiplexing - Maximum number of jobs multiplexed per drive. Multiplexing sendsconcurrent, multiple backups from one or several clients to a single drive

l Max Fragment Size - Maximum fragment size used by the storage unit

l NDMP Host - NDMP Host used by NDMP storage units

l Disk Pool - Pool to which the storage unit belongs

l High Water Mark - Percentage of dirty pages to trigger a cache flush

l Low Water Mark - Percentage of dirty pages to stop a cache flush

l Ok On Root - Indicates if the volume can be mounted on root file system

NetBackup Storage Unit Group ConfigurationReturns the configuration of NetBackup storage unit groups in a table report. Uses data from theNetBackup Storage Unit Group Config data source.

l Server - Name of the NetBackup Storage Server

l Group - Name of the Storage Unit group

l Storage Unit - Storage unit the policy is configured to use

l Selection Strategy - Indicates if the storage unit is On-Demand-Only or not

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 163

NetBackup VM Rule ConfigurationReturns details on current NetBackup VM Rule configuration in a table. Uses data from theNetBackup VM Rule Config data source.

l Server - The name of the NetBackup Server

l Bar Code Tag - Volume bar code prefix

l Media Type - Volume media type code

l Pool Name - Name of pool where the volume will be added

l Max. Mounts/Cleanings - Maximum number of volume mounts or maximum cleanings availableif this is a cleaning tape

l Description - Barcode rule description

NetWorker Action ConfigurationReturns Networker action configuration in a table report. Uses data from Action Configurationdata source.

l Server - Name of the backup server

l Action - Name of the action

l Workflow - Name of the workflow

l Policy - Name of the protection policy

l Preceding Actions - List of actions preceding this action

l Concurrent - Run this action at the same time as the preceding action

l Comment -Action comment

l Enabled - Field indicating if workflow is enabled or not

l Type - Action type option

l Sub Type - Backup Subtype option

l Schedule Period - Frequency to perform the action For example: weekly, monthly

l Schedule Activity - Actions scheduled for the period For example: full, incremental

l Num. Retries - Number of times to retry

l Retry Delay - Delay in seconds to wait before retrying

l Inactivity Timeout (Minutes) - Maximum number of minutes inactive

l Parallelism - Maximum number of concurrent operations

l Failure Impact - What to do when an operation fails

l Soft Limit - Time limit after action starts to stop initiation

l Hard Limit - Time limit after action starts to begin initiation

l Notification- Notification mode when action is complete

l Succeed After All Clients Succeed - Success only after all clients succeeded

l Discover Type - Type of discovery For example: NAS Snapshot

l Start Backup Only After All Probes Succeed - Start backup action only after all probes are fine

l Destination Storage Node - Storage node for the cloned savesets

Reports by System Template

164 Dell EMC Data Protection Advisor Report Reference Guide

l Source Storage Node - Storage node for the source savesets

l Destination Pool - Target media pool for the cloned savesets

l Retention - Amount of time to retain the cloned savesets

l Success Threshold - Backup status considered as successful

l Client Override - Can client override

l Schedule overrides - Configure overrides for the task that is scheduled on a specific day

l Delete Source Savesets After Clone Completes - Delete the source savesets after the clonecompletes

l Perform CFI - Perform CFI

l Perform Bootstrap - Perform bootstrap

l Saveset Type - Saveset Type for which to generate an index

l Filter Time Enabled - Filter On Time Range

l Filter Starttime - Time to start filter

l Filter Endtime - Time to stop filter

l Filter Clients Enabled - Filter Clients

l Filter Clients - Filter Clients type

l Filter Levels Enabled - Filter On levels

l Filter Levels - Filter Levels type

l Filter Savesets Enabled - Filter On Saveset type

l Filter Savesets - Filter saveset type

Networker Client Storage Nodes ConfigurationReturns the NetWorker client storage object configuration details in a table report. Uses data fromthe Networker Client Storage Nodes Config data source.

l Server - Name of the backup server

l Client - Name of the client

l Storage Node - Name of the Storage Node

l Type - Type of Media Server

Networker Protection Policy ConfigurationReturns current Protection Policy configuration details. Uses data from the Networker ProtectionPolicy Config data source.

l Server - Name of the backup server

l Policy - Name of the protection policy

l Comment - Policy comment

l Notification - Notification mode when policy is complete

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 165

NetWorker VBA ConfigurationReturns information on NetWorker Virtual Basic Appliance (VBA) configuration in a table. Usesdata from the VBA Configuration and VBA Status data sources.

l Server - Name of the Networker server

l Name - Name of the VBA

l Comment - User defined comments

l VCenter Host - Name or IP address of the vCenter host

l Total Capacity - Total capacity (MB)

l Policy List - Protection policy list

l External Proxy Hosts - External proxy host list

l Used Capacity - Used capacity of the VBA (MB)

l Last Validated - Last Validated Checkpoint

l Online - Indicates if the VBA is online

l State - State of the VBA

l Configuration Error - Configuration errors from the VBA

NetWorker Workflow ConfigurationReturns Networker workflow configuration in a table report. Uses data from WorkflowConfiguration data source.

l Server - Name of the backup server

l Workflow - Name of the workflow

l Policy - Name of the protection policy

l Comment -Action comment

l Enabled - Field indicating if workflow is enabled or not

l Notification- Notification mode when action is complete

l Start Time - Workflow start time

l Interval - Defines how frequently to repeat the actions that are defined in the workflow over a24 hour period

l Restart window - The duration of time in which NetWorker can manually or automaticallyrestart a failed or canceled workflow

l AutoStart Enabled - Determines whether the workflow runs automatically at the time that isspecified in the Start time attribute or not

RecoverPoint Consistency Group Copy DetailsReturns the RecoverPoint consistency group copy details in a table report. Uses data from theConsistency Group Copy Configuration data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the Copy

Reports by System Template

166 Dell EMC Data Protection Advisor Report Reference Guide

l Copy OS - Operating system of the Copy. If the copies written are not all running the sameoperating system, this value will be Others/Mixed

l Site - Location of the Copy

l Role - Role of the Copy. For example, Production or Local Replica

l Journal Compression - Level of compression enabled on the Journal: None, Medium, High

l Required Protection Window - How far in time the replica image could be rolled back (inseconds)

l Journal Lag Unlimited - Indicates if the journal lag is set to be unlimited

l Max Journal Lag - Maximum journal lag for a copy (in MB)

l Logged Writes Proportion - Proportion of journal allocated for target-side log (as apercentage)

l Journal Size Limit - Maximum size of the journal (in MB)

l Reservations Policy - Reservations Policy to be applied to the Copy: Auto, IF, SCSI-2, SCSI-3,PowerPath, PowerPath (non-auto)

l Allow Distribution of Snapshots - Indicates if the Copy should allow distribution of snapshotsthat are larger than the capacity of journal volumes

RecoverPoint Consistency Group Copy Details for Consistency GroupReturns the RecoverPoint consistency group copy details for consistency group in a table report.Uses data from the Consistency Group Copy Configuration data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Consistency group name

l Copy OS - Operating system of the Copy. If the copies written are not all running the sameoperating system, this value will be Others/Mixed

l Site - Location of the Copy

l Role - Role of the Copy. For example, Production or Local Replica

l Journal Compression - Level of compression enabled on the Journal: None, Medium, High

l Required Protection Window - How far in time the replica image could be rolled back (inseconds)

l Journal Lag Unlimited - Indicates if the journal lag is set to be unlimited

l Max Journal Lag - Maximum journal lag for a copy (in MB)

l Logged Writes Proportion - Proportion of journal allocated for target-side log (as apercentage)

l Journal Size Limit - Maximum size of the journal (in MB)

l Reservations Policy - Reservations Policy to be applied to the Copy: Auto, IF, SCSI-2, SCSI-3,PowerPath, PowerPath (non-auto)

l Allow Distribution of Snapshots - Indicates if the Copy should allow distribution of snapshotsthat are larger than the capacity of journal volumes

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 167

RecoverPoint Consistency Group DetailsReturns the RecoverPoint consistency group details in a table report. Uses data from theConsistency Group Configuration and Consistency Group Status data sources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Name - Name of the consistency group

l Production Copy - Name of the copy that is the source of the transfer

l Enabled - Indicates if the consistency group is enabled

l Preferred RPA - RPA preferred to replicate this consistency group

l Reservation Support - Indicates if reservation support is configured

l Compression Enabled - Indicates if compression is enabled

l Compression Level - Level of compression to use if enabled. A number between 1 and 10

l Minimize Lag - Indicates if RecoverPoint should use as much bandwidth as possible to minimizelag

l Minimize Bandwidth - Indicates if RecoverPoint should preserve bandwidth to maintain lagwithin its limits

l Priority - Amount of bandwidth allocated to this consistency group in relation to all otherconsistency groups: Idle, Low, Normal, High, Critical

l Bandwidth Limited - Indicates if the consistency group should limit the amount of bandwidth ituses

l Bandwidth Allocation - Bandwidth to which the consistency group is limited (MB/second)

l Hosts OS - Operating system of the hosts writing to the storage in the consistency group. Ifthe hosts are not all running the same operating system, this value will be Others/Mixed

l Global Cluster Mode - Global Cluster mode for the Copy group: None, Manual, Auto-data,Auto-quorum (shared data), Manual (shared data)

l Allow Regulation - Indicates if RecoverPoint should be allowed to slow or stop the hostapplication when approaching a policy limit

l Transfer Data with Non Preferred RPA - Indicates if data should be transferred even when thegroup is handled by a non-preferred RPA

l Measure Lag at Remote Appliance - Indicates if lag should be measured when writes reach thetarget RPA (as opposed to the journal)

l CDP System Optimized Lag - Indicates if the system should optimize the lag for CDP

l CDP Fast First Time Init - Indicates if the CDP copy should perform fast first time initialization

l CDP Snapshot Granularity - Snapshot granularity for CDP as a text string: Dynamic, Fixed(persecond), Fixed(per write)

l CDP Lag Size - Maximum allowed lag for CDP, if not using system optimization (in MB)

l CDP Lag Time - Unit in which CRR lag is measured if CRR Lag Size is stored as a time (inseconds)

l CDP Lag Writes - Number of writes, if CRR Lag Size is stored as a number of writes

l CRR System Optimized Lag - Indicates if the system should optimize the lag for CRR

l CRR Lag Size - Maximum allowed lag for CRR, if not using system optimization (in MB)

l CRR Lag Time - Unit in which CRR lag is measured if CRR Lag Size is stored as a time (inseconds)

Reports by System Template

168 Dell EMC Data Protection Advisor Report Reference Guide

l CRR Lag Writes - Number of writes, if CRR Lag Size is stored as a number of writes

l CRR Fast First Time Init - Indicates if the CRR copy should perform fast first time initialization

l CRR Snapshot Granularity - Snapshot granularity for CDP as a text string: Dynamic, Fixed(persecond), Fixed(per write)

l Set Name - Name of the replication set

l Distributed -

l Enabled - Indicates if the consistency group is active

RecoverPoint Replication Set ConfigurationReturns the RecoverPoint replication set configuration details in a table report. Uses data from theConsistency Group Configuration and Replication Set Configuration data sources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Name - Name of the replication set

l Consistency Group Name - Name of the consistency group containing the replication set

l Size - Size of the consistency group (in MB)

RecoverPoint RPA DetailsReturns the RecoverPoint appliance details in a table report. Uses data from the RPAConfiguration and RPA Status data sources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which RecoverPoint Appliance is located

l Name - Name of the RecoverPoint Appliance

l Version - Version of the RecoverPoint Appliance

l Status - Status of the RecoverPoint Appliance

l Repository Volume - Status of the repository volume

l Remote Connection - Status of the connection with the remote site

l LAN - Status of the LAN interface

l LAN Connection - Status of the local connection

l WAN - Status of the WAN interface

l WAN Connection - Status of the WAN connection

l Data Link - Status of data links on the RecoverPoint Appliance

l Volume Connections - Status of volume connections on the RecoverPoint Appliance

RecoverPoint Splitter DetailsReturns the RecoverPoint splitter details in a table report. Uses data from the SplitterConfiguration and Splitter Status data sources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the splitter is located

l Name - Name of the Splitter

l Type - Type of splitter

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 169

l Status - Status of the splitter

l RPA Connections - Status of connections to the RecoverPoint Appliance from the splitter

l Volume Access - Level of access to the volume. For example, read-only or read-write

Remote Mirror ConfigurationReturns the remote mirror configuration in a table report. Uses data from the Remote MirrorConfiguration data source.

l Source node - Name of the object on which the source mirror resides

l Source path - Path to the mirror source

l Mirror node - Name of the object on which the remote mirror resides

l Mirror path - Path to the remote mirror

Save Pool ConfigurationReturns the save pool configuration details in a table report. Uses data from the Save PoolConfiguration data source.

l Array Name - Hostname or IP address of the host being monitored

l Pool Name - Name of the pool

l Pool ID - Identifier for the pool

l Total Capacity - Total capacity of the pool (in GB)

l Enabled Capacity - Enabled capacity of the pool (in GB)

Shared Memory ConfigurationReturns the shared memory configuration in a table report. Uses data from the MemoryConfiguration data source.

l Hostname - Name of the host

l Sub Name - Identifier for the storage array

l Physical Memory - Amount of physical memory (in MB)

l Virtual Memory - Amount of virtual memory (in MB)

l Read Cache - Read cache size (in MB)

l Write Cache - Write cache size (in MB)

l shmmax - System-wide maximum allowable shared memory segment size (in MB)

l shmmni - System-wide minimum allowable number of shared memory segments

l shmseg - Maximum number of shared memory segments that can be simultaneously attachedto a single process. Not available on Solaris platforms

l msgmap - Size of the free-space resource map used for assigning locations for new messagesin shared memory. Not available on AIX and Solaris

l msgmax - Maximum individual messages size allowed (in bytes)

l msgmnb - Maximum total size of all messages that can be queued simultaneously on a messagequeue (in bytes)

l msgmni - Maximum number of message queues that can exist simultaneously on the system

Reports by System Template

170 Dell EMC Data Protection Advisor Report Reference Guide

l msgseg - Message segment size that is to be used when allocating message space in messagequeues. Not available on Solaris and AIX platforms

l msgssz - Message segment size that is to be used when allocating message space in messagequeues (in bytes). Not available on AIX and Solaris

l msgtql - Maximum number of messages that are allowed to exist on the system at any giventime

l semmap - Size of the free-space resource map used for allocating new System V IPCsemaphores in shared memory. Not available on AIX, HP-UX 11.23, and Solaris

l semmni - Maximum number of sets of IPC semaphores that can exist simultaneously on thesystem

l semmns - System-wide maximum number of individual IPC semaphores that can be allocatedfor users. Not available on AIX

l semmsl - Maximum number of Semaphores per semaphore set. Not available on AIX

l semopm - Number of semaphore operations that can be performed per semop call. Notavailable on HP-UX

l semume - Maximum number of IPC semaphores that a given process can have undo operationspending on

Symmetrix LUN to Data Domain vDisksReturns Symmetrix LUN to Data Domain vDisk details in a table. Uses data from the LUN to LUNMapping and LUN Configuration data sources.

l Symmetrix Device - Symmetrix Device

l Data Domain LUN - Data Domain vDisk

l Size - Size of the Data Domain disk (in GB)

l Pool - Data Domain pool name

Tape Library Drive Count By LibraryReturns the number of tape drives that are configured on each library in a column chart. It ispossible to map only virtual tape drives to tape libraries. Physical tape drives are not displayed inthis chart. Uses data from the Tape Library Configuration data source.

l Hostname - Name of the device being monitored: For normal tape libraries, this value is thename of the tape library. For devices supporting multiple tape libraries such as an EDL, thisvalue is the name of the manager

l Library Name - Name of the tape library. This field is not populated if monitoring a librarydirectly. It is populated if monitoring a device that supports multiple libraries such as an EDL.Physical tape drives do not return information on the tape library in which they are a member

l Num Drives - Number of tape drives in the tape library

Tape Library Firmware SummarySummary of the tape library firmware versions in a column chart. It is only possible to gatherfirmware information from virtual tape libraries. Physical tape libraries are not displayed in thischart. Uses data from the Tape Library Configuration data source.

l Firmware - Firmware of the tape library

l Count - Number of tape libraries

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 171

Tape Library Model SummarySummary of the tape library models in a column chart. Includes all physical and virtual librariesmanaged by the virtual tape library. Uses data from the Tape Library Configuration data source.

l Model - Model of the tape drive

l Count - Number of tape drives

Tape Library Slot Count By LibraryReturns the number of slots that are configured on each library in a column chart. Uses data fromthe Tape Library Configuration data source.

l Hostname - Name of the device being monitored: For normal tape libraries, this value is thename of the tape library. For devices supporting multiple tape libraries such as an EDL, thisvalue is the name of the manager

l Library Name - Name of the tape library. This field is not populated if monitoring a librarydirectly. It is populated if monitoring a device that supports multiple libraries such as an EDL.Physical tape drives do not return information on the tape library in which they are a member

l Num Slots - Number of slots in the tape library

TSM Copy Group ConfigurationReturns the TSM Copy Group Configuration details in a table report. Uses data from the TSMCopy Group Configuration data source.

l Server - Name of the TSM Server

l Sub Name - Name of the TSM Server instance

l Policy Domain Name - Policy domain of the copy group

l Policy Set Name - Policy set of the copy group

l Management Class Name - Management class of the copy group

l Copy Group Name - Name of the copy group

l Copy Group Type - Type of the copy group

l Maximum Num. Versions Data Exists - Maximum number of backup versions retained

l Maximum Num. Versions Data Deleted - Maximum number of backup versions deleted fromclient

l Num. Days Extra Versions Retained - Number of days backup versions retained after beinginactive

l Num. Days Only Version Retained - Number of days backup versions retained after beingdeleted

l Copy Mode - Can be modified or absolute

l Copy Serialization - How to process modified files during backup

l Copy Frequency (Days) - How frequently a file can be backed up in days

l Copy Destination - Primary storage pool for data

l Table Of Contents Destination - Primary storage pool for Table of Contents (TOC)

l Last Updated By - Administrator who made most recent changes

l Last Updated - Date of the last change

Reports by System Template

172 Dell EMC Data Protection Advisor Report Reference Guide

l Managing Profile - Managing profile name

l Changes Pending - Whether changes are pending

TSM Defined Server ConfigurationReturns the TSM defined server configuration details in a table report. Uses data from the TSMDefined Server Configuration data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Defined Server - Name of the defined server. In previous DPA releases, this field was calledLAN-free Server Name

l Version - Server version

l Hostname - IP address of the server

l Port - Specifies the port for the TSM server if you are monitoring TSM remotely and there ismore than one instance on a system. The default value is 1500

l Description - Server description

l Node - Name of client object

l Allow Replacement - Indicates if server definitions can be replaced

l Locked - Indicates if client object is locked out of TSM

l Compression - Type of compression performed by TSM on client files

l Archive Delete Allowed - Indicates if the client object can delete its own archive files

l URL - URL of the server

l Registration Date - Date and time that the client object was registered

l Password Set - Indicates if the server password is set

l Password Set Date - When the server password was set

l Invalid Sign-On Count - Maximum number of invalid sign on attempts allowed

l Validate Protocol - Indicates if data validation is enabled

l Registering Administrator - Name of the administrator that registered the client object

l Roles - TSM server roles. For example, Storage Agent, Replication

l Communication Method - Method of communication

l SSL - Indicates if SSL is enabled

l Virtual Volume Password Set Status - Status of the virtual volume password

l Password Set Date - When the virtual volume password was set

l Grace Delete Period (Days) - Grace deletion period (in days)

TSM LAN Free Server ConfigurationReturns the TSM LAN-free server configuration details in a table report. Uses data from the TSMLAN Free Server Configuration data source. In DPA 6.0, LAN-Free Server Configuration isrenamed Defined Server Configuration. LAN-free Server Configuration is supported for backwardscompatibility; however, Defined Server Configuration is preferred going forward.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 173

l LAN Free Server - Name of the LAN-free Server

l Version - Server version

l Hostname - IP address of the server

l Port - Specifies the port for the TSM server if you are monitoring TSM remotely and there ismore than one instance on a system. The default value is 1500

l Description - Server description

l Node - Name of client object

l Allow Replacement - Indicates if server definitions can be replaced

l Locked - Indicates if client object is locked out of TSM

l Compression - Type of compression performed by TSM on client files

l Archive Delete Allowed - Indicates if the client object can delete its own archive files

l URL - URL of the server

l Registration Date - Date and time that the client object was registered

l Password Set - Indicates if the server password is set

l Password Set Date - When the server password was set

l Invalid Sign-On Count - Maximum number of invalid sign on attempts allowed

l Validate Protocol - Indicates if data validation is enabled

l Registering Administrator - Name of the administrator that registered the client object

TSM Management Class ConfigurationReturns TSM Management Class Configuration details in a table report. Uses data from the TSMManagement Class Configuration data source.

l Server - Name of the TSM Server

l Sub Name - Name of the TSM Server instance

l Policy Domain Name - Policy domain of the management class

l Policy Set Name - Policy set of the management class

l Management Class Name - Management class name

l Default Management Class -Whether this is the default management class for the policy set

l Description - Description

l Space Management Technique - File migration technique

l Num. Days Since Non-Use Before Auto Migrate - Elapsed days of last access before file can bemigrated

l Migration Requires Backup -Whether backup version exists before migration

l Migration Destination - Primary storage pool for migrated data

l Last Updated By - Administrator who made most recent changes

l Last Updated - Date of the last change

l Managing Profile - Managing profile name

l Changes Pending - Whether changes are pending

Reports by System Template

174 Dell EMC Data Protection Advisor Report Reference Guide

TSM Policy Set ConfigurationReturns TSM Policy Set Configuration details in a table report. Uses data from the TSM Policy SetConfiguration data source.

l Server - Name of the TSM Server

l Sub Name - Name of the TSM Server instance

l Policy Set Name - Policy set name

l Policy Domain Name - Name of the domain the policy set is assigned to

l Default Management Class - The default management class assigned to this policy set

l Description - Description

l Last Updated By - Administrator who made most recent changes

l Last Updated - Date of the last change

l Managing Profile - Managing profile name

l Changes Pending - Whether changes are pending

Virtual Data Mover ConfigurationReturns the virtual data mover configuration details in a table report. Uses data from the VirtualData Mover Configuration data source.

l Node - Hostname of the storage array

l Sub Name - Name of the storage array

l Virtual Data Mover - Name of the virtual data mover

Virtual Host ConfigurationReturns the configuration of virtual machines on a virtualization server in a table report. Uses datafrom the Virtual Host Configuration and Virtual Host Status data sources.

l Virtualization Server - Hostname of a Virtualization Server managed by Virtual Centre

l Virtual Host - Name of the Virtual Centre server

l Virtual Machine Type - Type of virtual machine

l Number CPU - Number of CPUs configured on the virtual machine

l Maximum CPU - Maximum number of CPUs able to be configured on the virtual machine (inMHz)

l Reserved CPU - Number of CPUs reserved on the virtual machine (in MHz)

l Limit CPU - Number of CPU cycle that the virtual machine is limited to (in MHz)

l Memory - Amount of memory configured on the virtual machine (in MB)

l Reserved Memory - Amount of memory reserved for the virtual machine (in MB)

l Limit Memory - Amount of memory that the virtual machine is limited to (in MB)

l Status - Status of the virtual machine

l CPU Used - CPU utilization of the virtual machine (in MHz)

l Memory Used - Amount of memory used by the virtual machine (in MB)

l Startup Time - Time virtual host was started

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 175

l Storage Used - Total storage space in MB committed to the virtual machine across alldatastores.

l Storage Provisioned - Storage Used plus additional storage space in MB, potentially used bythis virtual machine on all datastores.

l Storage Unshared - Total storage space in MB occupied by the virtual machine across alldatastores, that is not shared with any other virtual machine.

Virtual Host Disk ConfigurationReturns the virtual host disk configuration details in a table report. Uses data from the Virtual HostDisk Configuration data source.

l Virtualization Server - Hostname of a Virtualization Server managed by Virtual Centre

l Virtual Host - Name of the Virtual Centre server

l Name - Name of the virtualization server

l Size - Capacity of the disk (in MB)

l Virtual Disk - Virtual disk to which the disk is mapped

l Datastore - Name of the datastore on which the virtual disk is located

Virtual Host Network Interface ConfigurationReturns the virtual host network interface configuration details in a table report. Uses data fromthe Virtual Host Network Interface Configuration and Virtual Host Network Interface Status datasources.

l Virtual Host - Name of the Virtual Centre server

l Virtualization Server - Hostname of a Virtualization Server managed by Virtual Centre

l Name - Identifier for the virtual interface

l Virtual Network - Network on which the virtual interface is located

l MAC Address - MAC Address of network interface

l Link Up - Indicates if the interface is currently connected

l IP Address - IP address of the network interface

Virtualization Manager ConfigurationReturns configuration information on Virtual Centre servers in a table report. Uses data from theVirtual Centre Server Configuration data source.

l Server - Name of the Virtual Centre Server host

l Application Name - Name of the application running on the Virtual Centre server

l Version - Version of the application

l Vendor - Name of the application vendor

l Operating System - Operating system running on the Virtual Centre host

Reports by System Template

176 Dell EMC Data Protection Advisor Report Reference Guide

VNX/CLARiiON RAID Group ConfigurationReturns VNX and CLARiiON RAID group configuration details in a table report. Uses data from theRAID Group Configuration data source.

l Hostname - Name of the host

l Name - Name of group

l Type - Type of group

l Logical Capacity - Identifies the amount of logical capacity (in GB)

l Raw Capacity - Identifies the amount of raw capacity (in GB)

l Used Capacity - Identifies how much of the capacity is used (in GB)

l Free Capacity - Identifies how much of the capacity is free (in GB)

l Max Disks - Maximum number of disks

l Max Devices - Maximum number of devices

VNX/CLARiiON Storage Pool ConfigurationReturns the VNX and CLARiiON storage pool configuration details in a table report. Uses data fromthe Storage Pool Config data source.

l Hostname - Name of the host being monitored

l Name - Name for the Storage Pool

l Description - Description of the pool

l Disk Type - Disk type used by the storage pool

l Pool ID - Unique identifier for the pool

l Capacity - Total capacity of the storage pool (in GB)

l User Size - Amount of storage used by the pool (in GB)

l Free Capacity - Total free capacity (in GB)

l RAID Type - Type of RAID used

l Pool Type - Type of storage pool. For example, primary, copy, or active data

l Consumed Capacity - Total used capacity (in GB)

l Num Disks - Number of disks storage pool holds

l Is Mixed -

l Full Threshold -

l Subscribed Capacity - Total subscribed capacity (in GB)

l % Subscribed -

l Oversubscribed Capacity - Total capacity oversubscribed (in GB)

l EFD Cache State -

l Consumed -

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 177

Webserver ConfigurationReturns information on webserver configuration in a table report. Uses data from the WebserverConfiguration data source.

l Node - Name of the object running the webserver

l Product - Webserver product

l Version - Webserver version

Xsigo Virtual To Physical Port MappingReturns the mapping of virtual interfaces to physical ports on the Xsigo appliance in a table report.Uses data from the Physical to Virtual Port Mapping data source.

l Hostname - Name of the Xsigo Director object

l Sub Name - Identifier for the switch

l Virtual Type - Type of virtual port: 1 (virtual), 0 (physical)

l Virtual Port - Identifier for virtual port mapped to the physical port

l Physical Port - Identifier for the physical port

Data Protection system templatesData protection is the main category for reports that present information about the backups thathave taken place on a backup server. Data protection includes reports on any restores that havealready occurred, and the current exposure of any backup clients.

Note: Size Offset and Size Scanned Offset values are gathered by the backup modules, but bydefault are not displayed in the reports. Size Offset is the number of bytes that should beadded to or subtracted from the Size field to return the job size in bytes. Size Scanned Offsetis the number of bytes that should be added to or subtracted from the Size Scanned field toreturn the job size in bytes.

Active Clone Job DetailsReturns information on the status of clone jobs. Uses data from the Clone Job Status data source.

l Server - Server which started the clone job

l Media Server - Name of the media server on which the clone job took place

l Clone ID - Identifier for the clone job

l Clone - Object being cloned

l Status - Status of the cloned job: Success, Failed, Started

l Queue Start - Time the job went into the queue

l Start Time - Time the job started

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Reports by System Template

178 Dell EMC Data Protection Advisor Report Reference Guide

Application Exposure for RPO missed rulesetReturns information on RPO missed exposures in a table report. Report for Application recoverypoint objective missed rule. Uses data from the User Input and Application Exposure data sources.

l Current Backup Exposure - Amount of time for which the application has been exposed to dataloss, measured as the difference between the restore point and the report's end time

l Recovery Point Objective (Secs) - As specified in the Protection Policy

l Alert - Identifier of the alert

Application Exposure for RTE high rulesetReturns information on RTE high exposures in a table report. Report for Application restore timeestimate too high rule. Uses data from the User Input and Application Exposure data sources.

l Estimated restore time -

l Backup Recovery Time Objective - As specified in the Protection Policy

l Recovery Time Objective (Secs) - As specified in the Protection Policy

l Alert - Identifier of the alert

Avamar Data Retained by ClientReturns the Data Retained value for all unexpired jobs on the Avamar server in a table. Uses datafrom the Avamar Data Retained by Client data source.

l Client - Name of the Avamar client

l Data Retained - Calculated as the sum of the Size Scanned of the earliest job on the client andthe sum of the Bytes Modified Sent and the Bytes Modified Not Sent for the remaining jobs

Avamar Domain FootprintReturns the names of the clients and the total size of all the successful, unexpired jobs per domainin a table report. Uses data from the Backup Job Details data source.

l Domain Name - Name of the Avamar domain

l Server - Name of the backup server on which the job took place

l Clients Backed Up Within Domain - The names of the clients backed up within the domain

l Data Written to Grid - The total size in MB of all successful, unexpired jobs on clients on thedomain

Avamar Garbage Collection JobsReturns information on the Avamar garbage collection process in a column chart. Uses data fromthe Avamar Garbage Collection Status data source.

l Server - Name of the Avamar server

l Sub Name - Name of the Avamar client

l ID - Identifier for the garbage collection process

l Node Count - Number of Avamar objects involved in the collection process

l Processed Index Stripes - Number of index stripes processed by garbage collection

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 179

l Total Index Stripes - Total number of index stripes

l Recovered - Number of bytes recovered by the collection process (in MB)

l Recovered Offset - Number of bytes that should be added or deleted from the Recovered fieldto return the size of data recovered by garbage collection

l Deleted Chunks - Number of chunks deleted by the collection process

l Result - Status of the garbage collection process after completion

l Start Time - Time the job started

l End Time - Time the job ended

Avamar Replication SummaryReturns the amount of data backed up and the percentage that is replicated in the last 24 hours,24–48 hours, and over 48 hours in a table. Uses data from the Num Jobs, Uncloned Backup Jobs,Backup Server Status, Clone Job Details, Total Size Scanned (MB) data sources.

l Server - Name of the backup server

l Utilization - Percentage that is being utilized of the server

l Under 24 Hours - Backed Up Logical - Amount of logical data backed up in the last 24 hours inMB

l Under 24 Hours - Replicated Logical - Amount of logical data replicated in the last 24 hours asa percentage of data backed up for same time period (%)

l 24–48 Hours - Backed Up Logical - Amount of logical data backed up in the last 24–48 hourperiod in MB

l 24–48 Hours - Replicated Logical - Amount of logical data replicated in the last 24–48 hourperiod as a percentage of data backed up for same time period (%)

l Over 48 Hours - Backed Up Logical - Amount of logical data backed up over 48 hours ago inMB

l Over 48 Hours - Replicated Logical - Amount of logical data replicated over 48 hours ago as apercentage of data backed up for the same time period (%)

l 24–48 Hours - Num Jobs - Internal field used for report row colours

l 24–48 Hours - Num Replications - Internal field used for report row colours

l Over 48 Hours - Num Jobs - Internal field used for report row colours

l Over 48 Hours - Num Replications - Internal field used for report row colours

l Expiry Date - The date of the earliest expiry for un-replicated backups

l Current Exceptions - Field drills down to report Backup Unreplicated Clients - All Exceptions.This lists all backups that started over 24 hours ago and are not yet replicated, and all backupswhich are replicated but the gap between backup and replication was over 24 hours

l All Exceptions - Field drills down to report Backup Unreplicated Clients - Current Exceptions.This lists all backups that started over 24 hours ago and are not yet replicated

Backup 2-Day ComparisonReturns comparison information on the two day backups in a column chart. Uses data from theBackup Statistics data source.

l Backups - Number of backups that completed

l Size - Amount of data that was backed up (in GB)

Reports by System Template

180 Dell EMC Data Protection Advisor Report Reference Guide

l Period -

Backup Active ClientsReturns information on the active backup clients in a table report. Uses data from the Backup JobStatus data source.

l Server - Name of the backup server

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Sub Name - Name of TSM server instance

l Group - Name of the group or policy under which the Job is running

l Schedule - Name of the schedule under which the Job is running

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job: pending, queued, initializing, started, completed, severed,restarted, in progress, future, failed - no restart

l Error Code - Error code associated with the backup

l Queued - Time the Job started queuing

l Started - Time the Job started

l Num Jobs - Number of jobs

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

Backup Active JobsReturns information on the active backup jobs in a table report. Uses data from the Backup ActiveJobs data source.

l Job Id - Job ID in the activity log

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Group - Name of the group or policy under which the Job is running

l Schedule - Name of the schedule under which the Job is running

l Client - Name of the client

l Job - Name of the Job

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 181

l Status - Status of the Job: pending, queued, initializing, started, completed, severed,restarted, in progress, future, failed - no restart

l Error Code - Error code associated with the backup

l Queued - Time the Job started queuing

l Started - Time the Job started

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

Backup Active GroupsReturns information on the active backup groups in a table report. Uses data from the BackupGroup Status data source.

l Server - Name of the backup server on which the group is located

l Group - Name of the group in which the backup job occurred

l Start Time - Last start time of the group. This value is not set if the group has never ran before

l End Time - Last end time of the group. This value is not set if the group is running or has neverrun

l Status - Status of the group: Never run, Started, Cloning, Completed, Queued

l Backup Application - Name of the backup application that performed the backup. For example,NetWorker

l Group Job ID - ID of the group job instance

Backup All ClientsReturns information on all clients backed up in a table report. Uses data from the Backup JobDetails data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Domain Name - Name of the domain

l Backup Set - Name of the backup set associated with the job

Reports by System Template

182 Dell EMC Data Protection Advisor Report Reference Guide

l Proxy - Proxy backup host

l Session - Number of sessions when a volume is present and mounted in the device

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Storage Unit - Storage unit the policy is configured to use

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Size Transferred - Total size of the data transferred (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted from the SizeTransferred field to return the Job size (in bytes)

l Archive Flag - Flag indicating whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 183

l Effective Path - Effective path of the Backup

l Error Code Summary - Error code summary associated with the error message

l Status Code Summary - Status code summary from the job

l Plugin Name - Plug-in name

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Transferred - Size transferred to server (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted from the SizeTransferred field to return the Save Set size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

Reports by System Template

184 Dell EMC Data Protection Advisor Report Reference Guide

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Duration -

l Num Jobs -

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup All GroupsReturns details of all the group runs that have occurred in a table report. Uses data from theBackup Group Details data source.

l Server - Name of the server on which the group runs

l Group - Name of the group that has run

l Session - Number of sessions when a volume is present and mounted in the device

l Start Time - Time the group started

l End Time - Time the group ended

l Status - Status of the group: Success, Fail

l Application Status - Status of the Backup Exec group: Cancelled, Completed With Exceptions,Missed

l Backup Application - Name of the backup application performing the backup

l Group Job ID - ID of the group job instance

Backup All Jobs - No RestartsReturns the details of all jobs, excluding failed restarts, in a table report. Uses data from theBackup Job Details and Restarted Backup Job Details data sources.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 185

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions simultaneously accessing the device

l Proxy - Proxy backup host

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Size Transferred - Total size of the data transferred (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

Reports by System Template

186 Dell EMC Data Protection Advisor Report Reference Guide

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Effective Path - Effective path of the Backup

l Error Code Summary - Error code summary associated with the error message

l Status Code Summary - Status code summary from the job

l Plugin Name - Plug-in name

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup All JobsReturns the details of all jobs in a table report. Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 187

l Domain Name - Name of the domain

l Storage Unit - Storage unit the policy is configured to use

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB). For DB2, this information is displayed for version11.1.1.1 and later only. For DB2 version 10.5 and earlier, size displayed in DPA is NULL.shows the correct information in MB

l Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the backup went into the backup applications queue

Reports by System Template

188 Dell EMC Data Protection Advisor Report Reference Guide

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Total number of secondary copies taken, if any

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies combines (including primary copy)

l Job ID 2 - NetBackup Job ID in the activity log

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Size Transferred - Total size of the data transferred (in MB)

l Size Transferred Offset - Number of bytesthat should be added or subtracted from from theSize Scanned field to return the Save Set size in bytes

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 189

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup All Jobs for RMAN Backup SetDrill down report for RMAN Backup Sets and RMAN Backup Pieces in Set reports. Returns a list ofall jobs that are related to the selected backup piece. Uses data from the Backup Job Details datasource.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Domain Name - Name of the domain

l Storage Unit - Storage unit the policy is configured to use

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

Reports by System Template

190 Dell EMC Data Protection Advisor Report Reference Guide

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB). For DB2, this information is displayed for version11.1.1.1 and later only. For DB2 version 10.5 and earlier, size displayed in DPA is NULL.shows the correct information in MB

l Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the backup went into the backup applications queue

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 191

l Number of Secondary Copies - Total number of secondary copies taken, if any

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies combines (including primary copy)

l Job ID 2 - NetBackup Job ID in the activity log

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Size Transferred - Total size of the data transferred (in MB)

l Size Transferred Offset - Number of bytesthat should be added or subtracted from from theSize Scanned field to return the Save Set size in bytes

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup All Jobs for Specific ClientReturns a list of all jobs that have run on a backup server in a table report. Uses data from theBackup Job Details data source.

l Id - Identifier that uniquely identifies this Job

Reports by System Template

192 Dell EMC Data Protection Advisor Report Reference Guide

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Storage unit the policy is configured to use

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Policy - Name of the protection policy

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Action - Name of the action

l Job - Name of the Job backed up

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Backup Set - Name of the backup set associated with the job

l App Type - Name of the TDP that was used to perform the backup

l Session - session associated with the job

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 193

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the backup went into the backup applications queue

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Job ID 2 - NetBackup Job ID in the activity log

l Total Size of Copies - Total size of copies (in MB)

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Number of seconds waiting for the backup media

l Total Reduction Ratio - The ratio for the size of data compressed and deduplicated against theoriginal data size over time

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

Reports by System Template

194 Dell EMC Data Protection Advisor Report Reference Guide

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup All Large JobsReturns a list of all jobs greater than 500 GB that have run on a backup server in a table report.Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Storage unit the policy is configured to use

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Proxy - Proxy backup host

l Session - session associated with the job

l App Type - Name of the TDP that was used to perform the backup

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 195

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the backup. This is hardcoded to full

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the backup went into the backup applications queue

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

Reports by System Template

196 Dell EMC Data Protection Advisor Report Reference Guide

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup All Long Running JobsReturns a list of all completed jobs that have a total run time that is longer than 12 hours in a tablereport. Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 197

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l App Type - Name of the TDP that was used to perform the backup

l Session - session associated with the job

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhenthe Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

Reports by System Template

198 Dell EMC Data Protection Advisor Report Reference Guide

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the backup went into the backup applications queue

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 199

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup All Slow JobsReturns a list of all jobs that have run on a backup server that are less than 1 MB/second in a tablereport. Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Session - session associated with the job

l Proxy - Proxy backup host

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

Reports by System Template

200 Dell EMC Data Protection Advisor Report Reference Guide

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the backup went into the backup applications queue

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 201

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Average Details For Specific JobReturns information on the average details for a backup of the selected Job on that client sincerecords began in a table report. Only successful Jobs of the same backup level are considered.Uses data from the Backup Job Details data source.

l Group - Name of the group or policy in which the Job took place

l Client - Name of the client backed up

Reports by System Template

202 Dell EMC Data Protection Advisor Report Reference Guide

l Job - Name of the Job backed up

l Size - Amount of data backed up (in MB)

l Duration - Time the backup application took to complete the job

Backup Average Full Details By ClientReturns information on the full details for a backup by client on that client since records began in atable report. Only successful Jobs of the same backup level are considered. Uses data from theBackup Job Details data source.

l Group - Name of the group or policy in which the Job took place

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Duration - Time the backup application took to complete the job

Backup Client Configuration for PoolReturns details on the configuration of all physical hosts configured on a server in a table report.Uses data from the Backup Pool Client Config Mapping and Backup Server Mapping data sources.

l Server - Name of the backup server on which the client is configured

l Sub Name - Name of the TSM server instance

l Client - Name of the client

l Pool - Pool of the volume that is required

l Domain Name - Identifier for domain

l Active - Identifies if the backup pool client is active

l Software Version - Version of the backup software running on the client

l Remote IP - Remote IP address of the client

l OS Type - Type of client operating system

l OS Version - Version of the client operating system

l Server Network Interface - Network interface on the server or media server to which the clientconnects when running backups

l Priority - Priority of the client

l Parallelism - Number of jobs that can run in parallel on this client

l Contact - Text string of information identifying the client object's administrator

l Client Identifier - Unique identifier for the client instance

l Archive Services - Indicates if archive services are available for the client

l Remote Access - List of remote users permitted to recover files from the client

l Index Path - Path to the client's index directory on the server. The path is either an absolutepath or NULL. If NULL, the index resides in the index/clientname subdirectory of the EMChome directory

l Owner Notification - Notification action used to send status message contents to the clientowner

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 203

l Hard Links - Indicates if hard link processing is enabled on the Windows client

l Short Filenames - Indicates if short file name processing is enabled on the Windows client

l BMR - Indicates if Bare Metal Recovery protection is enabled

l BMR Options - List of Bare Metal Recovery options

l Backup Type - Backup client type

l CPUs - Number of processors in the client machine

l Enabler In Use - Indicates if the client is using up a license count

l Licensed Applications - List of licensed applications used by the client

l Licensed PSPs - List of licensed PowerSnap platforms used by the client

l Resource ID - Identifier for the client

l Registration Time - Time of registration

l Last Access Time - Time last accessed

l Password Set Time - Time that the password was set

l Invalid Password Count - Number of invalid password entries

l Compression - Indicates if compression is enabled

l Archive Delete - Indicates if archive deletion is permitted

l Backup Delete - Indicates if backup deletion is permitted

l Locked - Indicates if the client object is locked

l Registration Administrator - Name of the administrator who registered the client

l Option Set - Option set for the client specified on the TSM server

l Aggregation - Indicates if client file aggregation is enabled when backing up

l URL - URL for the web client

l Node Type - Type of client object: Server, Client, NAS

l Password Expiration Period - Number of days after which a password expires

l Keep Mount Point - Indicates if the client can keep mount points during a session

l Max Mount Points Allowed - Maximum number of mount points permitted for a client in asession

l Auto Filespace Rename - Indicates if TSM prompts the client to rename file spaces when theclient system upgrades to a client that supports Unicode

l Validate Protocol - Indicates if the client has data validation enabled

l GUID - Globally unique identifier of the client object

l Transaction Group Max - Maximum number of files or directories that can be contained in atransaction group

l Data Read Path - Transfer path when sending data: ANY, LAN, LAN-free

l Data Write Path - Transfer path when receiving data: ANY, LAN, LAN-free

l Session Initiation - Initiator of session: ServerOnly, ClientOrServer

l Client HLA - High-level address of the NAS file server (IP address or domain name)

l Client LLA - Low-level address of the NAS file server (port number)

l Collocation Group Name - Name of the collocation group, if collocation is enabled, for theclient

Reports by System Template

204 Dell EMC Data Protection Advisor Report Reference Guide

l Proxy Target - Specifies which objects are proxy objects (agents) for other objects

l Compression Location - Location of data compression

l Proxy Node - Proxy object for deduplication if applicable

l Deduplication Location - Location of data deduplication

l Client Direct - Client writes directly to the Data Domain/AFTD using DDBoost are enabled andno writes are made to the storage node.

l NAS File Access User- NAS file access user name

l Storage Replication Policy - Storage replication policy name

l NAS Management User - NAS management user name

l NAS Device Manager - NAS device management user name

Backup Client De-Dupe Rate DistributionReturns the backup client deduplication rate distribution in a column chart. For NetBackup, thisreport works correctly with backups only for non-accelerator jobs. Uses data from the Backup JobDetails and Last Backup Details data sources.

l Range -

l Count -

Backup Client De-Dupe RatiosReturns the backup client deduplication ratios in a table report. For NetBackup, this report workscorrectly with backups only for non-accelerator jobs. Uses data from the Backup Job Details andLast Backup Details data sources.

l Client - Name of the client backed up

l Protected - Amount of data on the backup client that is being protected. For applications suchas NetWorker and NetBackup, this is determined by looking at the last full backup of the client.For applications like Avamar, the statistics are derived directly from the application

l Avg Daily Change - Amount of daily change

l De-Dupe Ratio -

l Change Rate - Change rate

l De-Dupe Rate - Deduplication rate

Backup Client Size Monthly ComparisonReturns the backup comparison between any two months per client in a table. Uses data from theTotal Size, Report Times, and Total Size Scanned data sources.

l Client - Name of the client backed up

l Total Data Protected First Month - Total size of the data protected before deduplication forthe first month (in GB)

l Total Data Protected Second Month - Total size of the data protected before deduplication forthe second month (in GB)

l Total Data Backed Up First Month - Amount of data backed up for the first month (in GB)

l Total Data Backed Up Second Month - Amount of data backed up for the second month (inGB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 205

l Backed Up Change - Difference between how much data was backed up between the firstmonth and the second month (in GB)

l Protected Change - Difference between how much data was protected between the firstmonth and the second month (in GB)

l Backed Up - Change - Percentage change between how much data was backed up betweenthe first month and the second month (in GB)

l Protected - Change - Percentage change between how much data was protected (in GB)between the first month and the second month

l 1st Month - Earliest start date for the first month

l 2nd Month - End date for the second month

Backup Client SummarySummary of the backup client in a table report. Uses data from the Backup Job Details, BackupJob Details for Clients with Failures, Backup Job Status, and Backup Statistics data sources.

l Missed - Count of the number of clients with all missed jobs on them

l Completed - Count of the total number of clients on the backup server that has at least one jobon it

l Partial - Indicates that some jobs succeeded and some failed during the reporting period.Partial, which indicates jobs with different status or mixed status values. The status could beSuccessful, Failure, or Missed. The Client Summary report will list a client as a Partial clientwhen it has a mix of failed, successful, and missed jobs within the time period.

l Failed - Count of the total number of clients after deduplication with only failed jobs on them

l Successful - Indicates that all jobs processed on the client during the reporting period weresuccessful

l Success Rate - Success rate of clients on the backup server over the reporting period

l Active - Count of the number of clients with active jobs running

Backup Clients Not Backed UpReturns the clients that were not backed up in a table report. Uses data from the Backup ClientConfig, Num Jobs, and Virtual Hosts data sources. Use this report to identify scheduling problemson the backup application or clients that continue to have repetitive failures.

l Client - Name of the client on the backup server

Backup Cumulative Number Of Completed JobsReturns the backup cumulative number of completed jobs in an area chart report. Uses data fromthe Num Jobs data source.

l Jobs - Number of jobs that have completed

Backup Cumulative Size Of Completed JobsReturns the backup cumulative size of completed jobs in an area chart report. Uses data from theTotal Size data source.

l Size - Total amount of data backed up (in GB)

Reports by System Template

206 Dell EMC Data Protection Advisor Report Reference Guide

Backup Data Domain Clone DetailsDrill down report from the Backup Jobs Details template that returns clone job details for a specificbackup job in a table report. Uses data from the Backup Data Domain Clone Details data source.

l Server - Name of the backup server

l Clone ID - Identifier for the clone job

l Size Scanned - Total size of the data scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size in bytes

Backup Device Configuration for PoolReturns backup device configuration for pool in a table report. Uses data from the Backup PoolDevice Config Mapping data source.

l Server - Name of the backup server

l Sub Name - Identifier for the storage array

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device in the backup software

l Pool - Name of the pool

l Device Alias - Alias for the device, if available

l Device Path - Operating system path to the device

l Device Class - Class of the device: Disk, Tape

l Jukebox - Name of the jukebox in which the device is located

l Device Type - Type of device. For example, DLT or Ultrium-2

l Read Only - Indicates if the drive is configured as read-only: Yes, No

l Hardware Id - Identifier such as the device serial number that uniquely maps it to a physicaldevice

l Firmware - Firmware version of the device

l Resource ID - Resource identifier for the device

l Media Manager Path - Operating system path the media manager

l Num Target Sessions - Number of target sessions

l Max Sessions - Maximum number of sessions

l Send/Receive Timeout - Send and receive timeout

l Num Retries - Number of retries

l Network Retry Interval - Network failure retry interval (in seconds)

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

l Max Errors - Max errors

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 207

l Device Access - Device access information

Backup Failed ClientsReturns information on all clients for which backups failed in a table report. Uses data from theBackup Job Details for Clients with Failures data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server to which a Job was backed up (NetBackup only)

l Storage Unit - Name of the storage unit to which the Job was backed up

l Session - Number of sessions simultaneously accessing the device

l Proxy - Proxy backup host

l Group - Name of the group/policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Policy - Name of the protection policy

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Action - Name of the action

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Error Code - Error code (if available) from the backup application

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size Scanned - Total size of the data scanned (in MB)

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

Reports by System Template

208 Dell EMC Data Protection Advisor Report Reference Guide

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the backup went into the backup applications queue

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size in bytes

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Job size in bytes

l Archive Flag - If selected, indicates that the backup Job is an archive Job

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that tool place before the Job completed (NetBackup only)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 209

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Failed GroupsReturns information on all groups for which backups failed in a table report. Uses data from theBackup Group Details data source.

l Server - Name of the server on which the group runs

l Group - Name of the group that has run

l Start Time - Time the group started

l End Time - Time the group ended

l Status - Status of the group: Success, Fail

l Application Status - Status of the Backup Exec group: Cancelled, Completed With Exceptions,Missed (Backup Exec only)

l Backup Application - Name of the backup application performing the backup

l Group Job ID - ID of the group job instance

Backup Failed JobsReturns a list of all failed jobs on a backup server in a table report. Uses data from the Backup JobDetails data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

Reports by System Template

210 Dell EMC Data Protection Advisor Report Reference Guide

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (Symantec NetBackuponly)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Backup Set - Name of the backup set associated with the job (CommVault only)

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Error Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backupwindow (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 211

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (Symantec NetBackuponly)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

Reports by System Template

212 Dell EMC Data Protection Advisor Report Reference Guide

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Failed Jobs For ClientDrill down report for Backup Top 10 Most Unreliable Clients that returns all of the failed jobs on aclient in a table report. Uses date from the Backup Job Details report.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (Symantec NetBackuponly)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id -Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Session - session associated with the job

l Proxy - Proxy backup host

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 213

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Expiry Date - Date that a Job will expire

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (Symantec NetBackuponly)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

Reports by System Template

214 Dell EMC Data Protection Advisor Report Reference Guide

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Failed Jobs for Client for rulesetReport for the Many backups failed rule that returns details for the backup failed jobs for client in atable report. Uses data from the Num Jobs, Report Times, and User Input data sources.

l Server - Name of the backup server on which the Job took place

l Client - Name of the client on which the Job took place

l Num Fails - Number of jobs that have failed

l Alert - Identifier of the alert

Backup Failed Jobs for rulesetReport for Many backups failed rule that returns details on backup failed jobs in a table report.Uses data from the Backup Job Details, Report Times, and User Input data sources.

l Num Failed - Number of jobs that have failed

l Alert - Identifier of the alert

Backup Full History of Specific JobReturns the details of all known backups of the selected client and Job in an table report. Usesdata from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (Symantec NetBackuponly)

l Group - Name of the group or policy in which the Job took place

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 215

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Session - session associated with the job

l Proxy - Proxy backup host

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Files - Number of files backed up

l Files Scanned - Number of files scanned

l Queued - Time the Job started queuing

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Started - Time the Job started writing

l Finished - Time the Job completed

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Expires - Date that a Job will expire

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (Symantec NetBackuponly)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

Reports by System Template

216 Dell EMC Data Protection Advisor Report Reference Guide

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Group Configuration for PoolReturns the backup group configuration for pool details in a table report. Uses data from theBackup Pool Group Config Mapping data source.

l Server - Hostname of backup server on which the pool is located

l Sub Name - Name of TSM server instance

l Group - Name of the group associated with the schedule

l Domain Name - Name of the domain associated with the group

l Proxy - Proxy backup host

l Pool - Pool of the volume that is required

l Policy Type - Type of backup for the group. For example, full or incremental

l Policy Action - Policy action

l Policy Description - Policy description

l Preceding Action - Preceding action

l Offhost Backup Method - Method used for performing offhost backups

l Active - Identifies if the backup pool client is active

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 217

l Effective Date - Date and time that the policy went active

l Storage Unit - Storage unit the policy is configured to use

l Volume Pool - Volume pool the policy is configured to use

l Checkpoint Restart - Indicates if checkpoints are configured on this policy

l Checkpoint interval - Checkpoint interval that is used if checkpoint restarts are enabled

l Limit Jobs Per Policy - Indicates if the policy is limited to a number of Jobs

l Max Jobs Per Policy - If Limit Jobs Per Policy is enabled, the value of the limit

l Job Priority - Priority that is assigned to Jobs in this policy

l Frozen Image Clients - Indicates if Frozen Image backups are configured in this policy

l Remote Filesystems - Indicates if Remote File systems are backed up by this policy

l Cross Mount Points - Indicates if the backups cross mount points

l True Image Restore Information - Indicates if True Image Restore (TIR) information is gatheredby this policy

l True Image Move Detection - Indicates if True Image Restore information is gathered withmove detection

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

l File Restore Raw - Indicates if the File Restore Raw flag is set

l Disaster Recovery Info - Indicates if Disaster Recovery Information is gathered

l Bare Metal Restore Info - Indicates if Bare Metal Restore Information is gathered

l Multiple Data Streams - Indicates if the policy implements multiple data streams

l Keyword Phrase - Keyword phrase associated with this policy

l Block Level Incremental - Indicates if block level incremental backups are enabled

l Snapshot Backup - Indicates if snapshot backups are enabled

l Retain Snapshots - Indicates if snapshots will be retained

l Snapshot Method - Method for performing snapshots

l Offhost Backup - Indicates if Offhost backup is enabled

l Use Alternate Client - Indicates if an Alternate client is used

l Alternate Client Name - Alternate client that is used

l Use Data Mover - Indicates if a data mover is used

l Data Mover Type - Data mover type that is used

l Resource ID - Resource ID of the group

l Auto Restart - Indicates if the group is configured for automatic restarts

l Scheduled Start - Time of day that the group starts

l Parallelism - Parallelism of the group

l Client Retries - Number of retries that clients attempt

l Level - Level of backup for the group

l Schedule - Schedule used by the group

l Num Days Inactive Backup Retained - Number of days to retain inactive backup data

Reports by System Template

218 Dell EMC Data Protection Advisor Report Reference Guide

l Num Days Inactive Archive Retained - Number of days to retain inactive archive data

l Interval - Group run interval

l Restart Window - Group restart window

l Forced Incremental - Indicates if forced incremental backup is enabled

l Clones - Indicates if backup is cloned automatically

l Clone Pool - Pool for backup clones

l Success Threshold - Backup status considered as successful

l Inactivity Threshold - File inactivity threshold

l Inactivity Alert Threshold - File inactivity alert threshold

l Snapshot Policy - Snapshot policy name

l Snapshot Pool - Snapshot pool name

l Specification Type - Type of backup specification

Backup Group Job Status DetailsReturns group status details along with information about the jobs associated with the groups in atable. Because the Backup Group Job Status Details report uses the Group Job Id field to mapgroups and jobs, the Backup Group Job Status Details report works for any module that populatesthe Group Job Id field. Uses data from the Backup Group Status, Backup Job Details, BackupGroup Config, and Report Times data sources.

l Server- Name of the backup server

l Group - Name of group associated with schedule

l Status - Status of the group: started, completed, never run, cloning, queued

l Level - Overall level of the jobs backed up in the group. Full, Incr, Manual, Cumulative, Incr,Differential Incr, Mixed

l Size - Amount of data backed up (in MB)

l Start Time- Earliest Job start time for job backed up in the group

l End Time - Latest job end time for job backed up in the group

l Expiry Date - Latest expiry time for jobs backed up in the group

l Group Job Id - ID of the group job instance

l Retention - Retention days

l Client - Name of the Clients backed up

l Job -Name of the jobs backed up

l Group Start Time - Time the group started

l Group End Time - Time the group ended

l Group Status - Status of the Backup Exec group: Cancelled, Completed With Exceptions,Missed (Backup Exec only)

l Group Duration - Time the group took to complete the job

l Schedule - Name of the schedule under which the Job is running

l Remaining Time to Expire - Difference between the expiry date and the report run end time

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 219

Backup Group StatusReturns the details of all backup groups in a table report. Uses data from the Backup Group Statusdata source.

l Server - Name of the backup server on which the group is located

l Group - Name of the group in which the backup job occurred

l Start Time - Last start time of the group. This value is not set if the group has never ran before

l End Time - Last end time of the group. This value is not set if the group is running or has neverrun

l Status - Status of the group: Never run, Started, Cloning, Completed, Queued

l Backup Application - Name of the backup application that performed the backup. For example,NetWorker

l Group Job ID - ID of the group job instance

Backup Group SummarySummary of the backup group in a table report. Uses data from the Backup Group Details, BackupGroup Status, and Total Size data sources.

l Completed -

l Successful - Number of successful jobs

l Failed - Number of failed jobs

l Active - Number of active jobs

l Total Size - Total amount of data backed up (in GB)

l Success Rate - Success rate of backups over the reporting period

Backup Hourly Job StatusReturns the backup hourly job status in a column chart. Uses data from the Num Jobs data source.

l Successful - Number of successful jobs

l Failed - Number of failed jobs

Backup Job AttemptsReturns details of the backup job attempts in a table report. Uses data from the Backup JobAttempts and Backup Job Details data sources.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (Symantec NetBackuponly)

Reports by System Template

220 Dell EMC Data Protection Advisor Report Reference Guide

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job (CommVault only)

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Error Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data that was backed up (in MB)

l Files - Amount of data backed up (in MB)

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Ran In Window -

l Started In Window -

l Finished In Window -

l Time In Window -

l Time Out Of Window -

l Out Of Window Reason -

l Trailing Space In Window -

l Leading Space In Window -

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the backup went into the backup applications ended

l Duration - Time the Job completed

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Retention -

l Expires -

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 221

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (Symantec NetBackuponly)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level -

l Valid Retention -

l Compliant -

l Policy Used -

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Backup Job Attempts for Specific JobReturns details of the backup job attempts for specific job in a table report. Uses data from theBackup Job Attempts data source.

l Id - Identifier that uniquely identifies this Job

l Job Id - Unique ID of the backup Job

l Server - Name of the backup server on which the Job took place

Reports by System Template

222 Dell EMC Data Protection Advisor Report Reference Guide

l Sub Name - Name of the server instance, if applicable

l Attempt - Attempt number (first, second, and others)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Media Server - Name of the Media Server on which the backup or archive occurred

l PID - Identifier of the underlying system process

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Description - Status description

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Num Files - Number of files backed up

l Started - Time the Job started writing

l Finished - Time the Job completed

Backup Job Change Ratio AggregateReturns the ratio of data backed up to data protected and aggregated over all of the backupclients in a table report. Uses data from the Last Backup Details, Num Jobs, and Total Size (MB)data sources.

l Protected - Amount of data on the backup client that is being protected. For applications suchas NetWorker and NetBackup, this is determined by looking at the last full backup of the client.For applications like Avamar, the statistics are derived directly from the application.

l Last Incremental Size - Amount of data that was backed up on the last incremental backup ofthe backup client. For Avamar and TSM, this value is taken from the last backup of the client,as both products perform only incremental backups.

l Last Incremental Rate - Ratio of the last incremental size to the amount of data that isprotected. In environments in which very little data changes, this value would be expected tobe low. For applications such as NetWorker, this value would typically be in the range of 10–15%. For applications such as Avamar, this value would be expected to be significantly lower.

l Average Incremental Size - Calculated by analyzing all of the incremental backups that haveoccurred on the client over the reporting period, and dividing the total data backed up by thenumber of the backups that have taken place. This value allows you to see if there is asignificant discrepancy between the last incremental backup and the overall average.

l Average Incremental Rate - Ratio of the average incremental size to the amount of data that isprotected. For backup applications such as NetWorker, this would typically be in the range of10–15%. For applications such as Avamar, this value would be expected to be significantlylower.

l Total Size - Total amount of data that has been backed up on this client over the reportingperiod. This includes full backups and incrementals.

l Size Rate - Ratio of the total amount of data that has been backed up to the amount of datathat has been protected. For applications such as NetWorker and NetBackup, this value wouldbe expected to be a multiple of the amount of data protected. For backup applications such asAvamar, this value should be a significantly smaller number than the amount of data protected.

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 223

Backup Job Change RatiosReturns the ratio of data backed up to data protected in a table report. This ratio is calculated foreach backup job on the client selected from the configuration tree. Uses data from the LastBackup Details, Num Jobs, and Total Size (MB) data sources.

l Protected - Amount of data on the backup client that is being protected. For applications suchas NetWorker and NetBackup, this is determined by looking at the last full backup of the client.For applications like Avamar, the statistics are derived directly from the application.

l Last Incremental Size - Amount of data that was backed up on the last incremental backup ofthe backup client. For Avamar and TSM, this value is taken from the last backup of the client,as both products perform only incremental backups.

l Last Incremental Rate - Ratio of the last incremental size to the amount of data that isprotected. In environments in which very little data changes, this value would be expected tobe low. For applications such as NetWorker, this value would typically be in the range of 10–15%. For applications such as Avamar, this value would be expected to be significantly lower.

l Average Incremental Size - Calculated by analyzing all of the incremental backups that haveoccurred on the client over the reporting period, and dividing the total data backed up by thenumber of the backups that have taken place. This value allows you to see if there is asignificant discrepancy between the last incremental backup and the overall average.

l Average Incremental Rate - Ratio of the average incremental size to the amount of data that isprotected. For backup applications such as NetWorker, this would typically be in the range of10–15%. For applications such as Avamar, this value would be expected to be significantlylower.

l Total Size - Total amount of data that has been backed up on this client over the reportingperiod. This includes full backups and incrementals.

l Size Rate - Ratio of the total amount of data that has been backed up to the amount of datathat has been protected. For applications such as NetWorker and NetBackup, this value wouldbe expected to be a multiple of the amount of data protected. For backup applications such asAvamar, this value should be a significantly smaller number than the amount of data protected.

Backup Job Change Ratios By ClientReturns the ratio of data backed up to data protected by client in a table report. This ratio iscalculated for each backup job on the client selected from the configuration tree. Uses data fromthe Last Backup Details, Num Jobs, and Total Size (MB) data sources.

l Protected - Amount of data on the backup client that is being protected. For applications suchas NetWorker and NetBackup, this is determined by looking at the last full backup of the client.For applications like Avamar, the statistics are derived directly from the application.

l Last Incremental Size - Amount of data that was backed up on the last incremental backup ofthe backup client. For Avamar and TSM, this value is taken from the last backup of the client,as both products perform only incremental backups.

l Last Incremental Rate - Ratio of the last incremental size to the amount of data that isprotected. In environments in which very little data changes, this value would be expected tobe low. For applications such as NetWorker, this value would typically be in the range of 10–15%. For applications such as Avamar, this value would be expected to be significantly lower.

l Average Incremental Size - Calculated by analyzing all of the incremental backups that haveoccurred on the client over the reporting period, and dividing the total data backed up by thenumber of the backups that have taken place. This value allows you to see if there is asignificant discrepancy between the last incremental backup and the overall average.

Reports by System Template

224 Dell EMC Data Protection Advisor Report Reference Guide

l Average Incremental Rate - Ratio of the average incremental size to the amount of data that isprotected. For backup applications such as NetWorker, this would typically be in the range of10–15%. For applications such as Avamar, this value would be expected to be significantlylower.

l Total Size - Total amount of data that has been backed up on this client over the reportingperiod. This includes full backups and incrementals.

l Size Rate - Ratio of the total amount of data that has been backed up to the amount of datathat has been protected. For applications such as NetWorker and NetBackup, this value wouldbe expected to be a multiple of the amount of data protected. For backup applications such asAvamar, this value should be a significantly smaller number than the amount of data protected.

Backup Job Change Ratios for ClientReturns the ratio of data backed up to data protected for client in a table report. This ratio iscalculated for each backup job on the client selected from the configuration tree. Uses data fromthe Last Backup Details, Num Jobs, and Total Size (MB) data sources.

l Protected - Amount of data on the backup client that is being protected. For applications suchas NetWorker and NetBackup, this is determined by looking at the last full backup of the client.For applications like Avamar, the statistics are derived directly from the application.

l Last Incremental Size - Amount of data that was backed up on the last incremental backup ofthe backup client. For Avamar and TSM, this value is taken from the last backup of the client,as both products perform only incremental backups.

l Last Incremental Rate - Ratio of the last incremental size to the amount of data that isprotected. In environments in which very little data changes, this value would be expected tobe low. For applications such as NetWorker, this value would typically be in the range of 10–15%. For applications such as Avamar, this value would be expected to be significantly lower.

l Average Incremental Size - Calculated by analyzing all of the incremental backups that haveoccurred on the client over the reporting period, and dividing the total data backed up by thenumber of the backups that have taken place. This value allows you to see if there is asignificant discrepancy between the last incremental backup and the overall average.

l Average Incremental Rate - Ratio of the average incremental size to the amount of data that isprotected. For backup applications such as NetWorker, this would typically be in the range of10–15%. For applications such as Avamar, this value would be expected to be significantlylower.

l Total Size - Total amount of data that has been backed up on this client over the reportingperiod. This includes full backups and incrementals.

l Size Rate - Ratio of the total amount of data that has been backed up to the amount of datathat has been protected. For applications such as NetWorker and NetBackup, this value wouldbe expected to be a multiple of the amount of data protected. For backup applications such asAvamar, this value should be a significantly smaller number than the amount of data protected.

Backup Job Configuration for PoolReturns the backup job configuration for pool details in a table report. Uses data from the BackupPool Job Config Mapping and Backup Server Mapping data sources.

l Server - Hostname of backup server on which the pool is located

l Sub Name - Name of TSM server instance

l Pool - Pool of the volume that is required

l Client - Clients that are required to enter into the backup pool

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 225

l Job - Jobs that are allowed in the backup pool

l Group - Name of the group or policy in which the backup job occurred

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Schedule - Name of the backup schedule

l Resource ID - Identifier for the client

Backup Job Deduplication Ratio for ClientReturns the ratio of data deduplicated against data backed up over the time period in a tablereport. Uses data from the Backup Job Details data source.

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Data Protected -

l Data Transferred -

l Change Rate -

l De-Dupe Rate -

l De-Dupe Ratio -

Backup Job Details for Specific VolumeReturns backup job details with expiry of greater than or equal to eight years in a table report.Uses data from the Backup Job Details with Volume data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of the TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Policy - Name of the protection policy

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Action - Name of the action

l Job - Name of the Job backed up

l Session - session associated with the job

l Proxy - Proxy backup host

l Domain Name - Name of the domain associated with the group

Reports by System Template

226 Dell EMC Data Protection Advisor Report Reference Guide

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application (Avamar only)

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size in bytes

l Storage Units - Name of the Storage Unit to which a Job was backed up (SymantecNetBackup only)

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Expiry Date - Date that a Job will expire

l Archive Flag - Indicates if the job is a backup or archive job

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, Symantec NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (Symantec NetBackuponly)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Volume Id - Identifier for the volume

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Retention - Retention days

l Is Snap - If job is a snapshot backup

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 227

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Job Device MappingReturns the backup job device mapping in a table report. Uses data from the Backup Job DeviceMapping data source.

l Server - Name of the backup server

l Sub Name - Name of the server instance, if applicable

l Device Host - Name of the host to which the device is attached

l Group - Name of the group on the backup server

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Storage Node - Name of the storage object

l Device Name - Name of the device in the backup software

Backup Job Error DetailsReturns details of all job errors on a backup server or client in a table report. Uses data from theBackup Job Details and Backup Job Errors data sources.

l Id - Identifier that uniquely identifies this Job

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Group - Name of the group or policy in which the Job took place

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Severity - Severity of the failure

l Err Code - Error code from the backup application, if available

l Error - Error string

l Error Code Summary - Summary of the error codes associated with the backup

l Time - Time the failure took place

Reports by System Template

228 Dell EMC Data Protection Advisor Report Reference Guide

l Schedule - Name of the schedule under which the Job ran

l Queue Start - Time the Job started queuing

Backup Job Error Details for Specific JobReturns details of all job errors for a specific job in a table report. Uses data from the Backup JobErrors data source.

l Id - Identifier that uniquely identifies this Job

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM server instance

l Client - Name of the client on which the Job failed

l Severity - Severity of the failure

l Err Code - Error code from the backup application, if available

l Error - Error string

l Time - Time the failure took place

Backup Job Error DistributionReturns the backup job error distribution details in a table report. Uses data from the Num Jobsdata source.

l Num Jobs - Number of jobs that have completed

l Err Code - Error code from the backup application, if available

Backup Job Error SummarySummary of the backup job error details in a pie chart. Uses data from the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

l Err Code - Error code from the backup application, if available

Backup Job Media DetailsReturns a list of volumes that a backup was written to in a table report. Uses data from the BackupJob Details with Volume and Backup Job Media data sources.

l Server - Name of the backup server on which the Job took place

l Volume Id - Unique identifier of the volume to which the backup Job was written

l State - State of the media

l Pool - Backup pool in which the backup Job belongs

l Online - Indicates if the volume is online

l Jukebox - Jukebox in which the volume resides

l Slot - Jukebox slot occupied by the volume

l Expiry Date - Date the volume is due to expire

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 229

Backup Job Status By ServerReturns backup job status by server details in a table report. Uses data from the Num Jobs andNum Jobs In Event State By Server data sources.

l Server - Name of the backup server on which the Job took place

l Succeeded - Number of jobs that were successful over the reporting period

l State -

l Failed - Time the backup went into the backup applications queue

l Queued - Time the backup went into the backup applications queue

l Running -

Backup Job SummarySummary of all jobs that were processed on a backup server or client in a table report. Uses datafrom the Backup Statistics and Num Jobs In Event State data sources.

l Completed - Total number of jobs that have completed over the reporting period

l Succeeded - Number of jobs that were successful over the reporting period

l Failed - Number of jobs that failed over the reporting period

l Missed - Number of jobs that were missed over the reporting period (TSM only)

l Active - Shows jobs which meet the following conditions:

n Has an end time of the end of Unix time (the year 2038) - hi is how we track the lateststatus of a job

n Was queued between the start of the report window and the end of the report window

n Is in one of the following states: started, queued, severed, restarted, future, failed - norestart, pending, in progress

l Size - Amount of data that was backed up (in GB)

l Success Rate - Success rate of backups over the reporting period

Backup Successful Job Summary for Group RunSummary of jobs that have run during the group run in a table report. Uses data from the BackupStatistics data source.

l Completed - Total number of jobs that have completed over the reporting period

l Succeeded - Number of jobs that were successful over the reporting period

l Failed - Number of jobs that failed over the reporting period

l Total Size - Amount of data that was backed up (in GB)

l Success Rate - Success rate of backups over the reporting period

l Is Compressed - Indicates whether the RMAN backup is compressed or not

Reports by System Template

230 Dell EMC Data Protection Advisor Report Reference Guide

Backup Last 5 Runs of JobReturns details about the last five runs of the same client and selected job in a table report. Usesdata from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (Symantec NetBackuponly)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Start Time - Time the Job started writing

l End Time - Time the Job completed

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 231

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Expiry Date - Date that a Job will expire

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (Symantec NetBackuponly)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Reports by System Template

232 Dell EMC Data Protection Advisor Report Reference Guide

Backup Last n Runs of ClientReturns details of last jobs backup jobs in a table report. Uses data from the Backup Job Detailsdata source.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Group - Name of the group or policy in which the Job took place

l Domain Name - Name of the domain associated with the group

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Media Server - Name of the Media Server on which the backup or archive occurred

l Backup Set - Name of the backup set associated with the job

l App Type - Name of the TDP that was used to perform the backup

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 233

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Bytes Modified Not Sent - (in bytes)

l Bytes Modified Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Files Scanned - Number of files scanned

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the

l Size Scanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Total number of secondary copies taken, if any

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies combines (including primary copy)

l Job ID 2 - NetBackup Job ID in the activity log

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

Reports by System Template

234 Dell EMC Data Protection Advisor Report Reference Guide

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Is Snap - If job is a snapshot backup; field hidden by default

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target; field hidden by default

l Snap Target Platform - Snap target platform type; field hidden by default

l Snap Policy - Snap replication policy name; field hidden by default

l Snap Creation Type - Snap creation type, either Managed or Discovered; field hidden bydefault

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Last n Successful Runs of ClientReturns details of last jobs successful backup jobs in a table report. Uses data from the BackupJob Details data source.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Domain Name - Name of the domain

l Backup Set - Name of the backup set associated with the job

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 235

l Num Files - Number of files backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Statu Status Code - Status code of the job from the backup applications Code Summary -Status code summary from the job

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Files Scanned - Number of files scanned

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Total number of secondary copies taken, if any

Reports by System Template

236 Dell EMC Data Protection Advisor Report Reference Guide

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies combines (including primary copy)

l Job ID 2 - NetBackup Job ID in the activity log

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Is Snap - If job is a snapshot backup; field hidden by default

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target; field hidden by default

l Snap Target Platform - Snap target platform type; field hidden by default

l Snap Policy - Snap replication policy name; field hidden by default

l Snap Creation Type - Snap creation type, either Managed or Discovered; field hidden bydefault

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Last Successful Full Run of ClientReturns the backup last successful full run of client in a table report. Uses data from the BackupJob Details data source.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Group - Name of the group or policy in which the Job took place

l Media Server - Name of the Media Server on which the backup or archive occurred

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 237

l Domain Name - Name of the domain

l Backup Set - Name of the backup set associated with the job

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l App Type - Name of the TDP that was used to perform the backup

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

Reports by System Template

238 Dell EMC Data Protection Advisor Report Reference Guide

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Files Scanned - Number of files scanned

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Total number of secondary copies taken, if any

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies combines (including primary copy)

l Job ID 2 - NetBackup Job ID in the activity log

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 239

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Last Successful Run of ClientReturns the backup last successful run of client details in a table report. Uses data from theBackup Job Details data source.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Domain Name - Name of the domain

l Backup Set - Name of the backup set associated with the job

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l App Type - Name of the TDP that was used to perform the backup

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - AmAmount of data backed up (in MB)

l Num Files - Number of files backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen In Window is false. Can be one of:

n Job started out of window - Job started outside of its backup window

Reports by System Template

240 Dell EMC Data Protection Advisor Report Reference Guide

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Files Scanned - Number of files scanned

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Total number of secondary copies taken, if any

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies combines (including primary copy)

l Job ID 2 - NetBackup Job ID in the activity log

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 241

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Last Successful Run of JobReturns the backup last successful run of jobs in a table report. Uses data from the Backup JobDetails data sources.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (Symantec NetBackuponly)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

Reports by System Template

242 Dell EMC Data Protection Advisor Report Reference Guide

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Expiry Date - Date that a Job will expire

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (Symantec NetBackuponly)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 243

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup; field hidden by default

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target; field hidden by default

l Snap Target Platform - Snap target platform type; field hidden by default

l Snap Policy - Snap replication policy name; field hidden by default

l Snap Creation Type - Snap creation type, either Managed or Discovered; field hidden bydefault

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Missed ClientsReturns all clients for which backups were missed during the reporting period in a table report.Uses data from the Backup Job Details data source.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy- Name of the protection policy

l Job - Name of the Job backed up

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Reports by System Template

244 Dell EMC Data Protection Advisor Report Reference Guide

l Ran In Window -

l Started In Window -

l Finished In Window -

l Time In Window -

l Time Out Of Window -

l Out Of Window Reason -

l Trailing Space In Window -

l Leading Space In Window -

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Retention -

l Valid Level -

l Valid Retention -

l Compliant -

l Policy Used -

Backup Missed JobsReturns details of backup jobs that were missed in a table report. Uses data from the Backup JobDetails data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (Symantec NetBackuponly)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 245

l Backup Set - Name of the backup set associated with the job (CommVault only)

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (Avamar only

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Ran In Window -

l Started In Window -

l Finished In Window -

l Time In Window -

l Time Out Of Window -

l Out Of Window Reason -

l Trailing Space In Window -

l Leading Space In Window -

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Retention -

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (Symantec NetBackuponly)

Reports by System Template

246 Dell EMC Data Protection Advisor Report Reference Guide

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level -

l Valid Retention -

l Compliant -

l Policy Used -

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Open FilesReturns information about files that were not successfully backed up during a backup of a Job in atable report. Files may have been missed because they were in use by another application atbackup time. Uses data from the Open Files data source.

l Job Id - Unique identifier of the backup Job. Matches the ID column in Backup Job Details

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Client - Name of the client on the backup server

l File Name - Name of the filename that could not be backed up

l Error Message - Reason why files were not backed up

l Time - Start time of the Job associated with the file that could not be backed up

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 247

Backup Open Files for Specific JobReturns information about files that were not successfully backed up during a backup of a Job in atable report. Files may have been missed because they were in use by another application atbackup time. Uses data from the Open Files data source.

l Job Id - Unique identifier of the backup Job. Matches the ID column in Backup Job Details

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Client - Name of the client on the backup server

l File Name - Name of the filename that could not be backed up

l Error Message - Reason why files were not backed up

l Time - Start time of the Job associated with the file that could not be backed up

Backup Partial ClientsReturns information on all clients for which backups were partially successful during the reportingperiod in a table report. A client is partially successful if it had at least one failed Job and onesuccessful job. Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (Symantec NetBackuponly)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

Reports by System Template

248 Dell EMC Data Protection Advisor Report Reference Guide

l Status Code - Status code of the job from the backup application (Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Expiry Date - Date that a Job will expire

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (Symantec NetBackuponly)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 249

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Partial GroupsReturns information on all the backup clients for which backup groups were partially successfulduring the reporting period in a table report. Uses data from the Backup Group Details data source.

l Server - Name of the server on which the group runs

l Group - Name of the group that has run

l Session - Number of sessions simultaneously accessing the device

l Start Time - Time the group started

l End Time - Time the group ended

l Status - Status of the group: Success, Fail

l Application Status - Status of the Backup Exec group: Cancelled, Completed With Exceptions,Missed (Backup Exec only)

l Backup Application - Name of the backup application performing the backup

l Group Job ID - ID of the group job instance

Backup Problem ClientsReturns details of the backup problem clients in a table report. Uses data from the BackupStatistics data source.

l Client - Name of the client on the backup server

l Failing -

l Slow -

l Long-running -

l Large -

l Status -

Reports by System Template

250 Dell EMC Data Protection Advisor Report Reference Guide

Backup Protected versus Avg IncrementalReturns the backup protected versus average incremental details in a column chart. Uses datafrom the Last Backup Details, Num Jobs, and Total Size (MB) data sources.

l Protected - Amount of data on the backup client that is being protected. For applications suchas NetWorker and NetBackup, this is determined by looking at the last full backup of the client.For applications like Avamar, the statistics are derived directly from the application.

l Average Incremental Size - Average incremental size (in MB)

Backup Protected versus Backed UpReturns the backup protected versus backed up details in a column chart. Uses data from the LastBackup Details, Num Jobs, and Total Size (MB) data sources.

l Protected - Amount of data on the backup client that is being protected. For applications suchas NetWorker and NetBackup, this is determined by looking at the last full backup of the client.For applications like Avamar, the statistics are derived directly from the application.

l Total Size - Amount of data backed up (in MB)

Backup Report CardReturns information about each client that was backed up over the reporting period and thenumber of successful and unsuccessful jobs on a daily basis in a report card. Uses data from theNum Jobs data source.

l Num Jobs - Number of jobs that have completed

l Client - Name of the client on the backup server

l Status - Indicates if the backup completed successfully

Use this report to easily identify clients that have repetitive failures, or more importantly, clientsthat have not been backed up at all. For each day in the specified reporting period, a cell displaysthe backup status of each client:

l If the cell for a client is completely green, all backups were successful for that client on thatday.

l If the cell is completely red, all backups failed for that client on that day.

l If there is a mix of red and green, the proportion represents the percentage of backups thatfailed on that client on that day.

l If a cell is white, no backups occurred for that client on that day.

Backup Replication Sync Times by ClientReturns the time difference between run of latest backup jobs and corresponding cloned job perclients in a table for NetWorker, NeBackup, BackupExec and Data Protector. Uses data from theBackup Job Details and Clone Job Details data sources.

l Client - Name of the Client the backup job took place on

l Job - Name of the backup job

l Last Successful Backup Time - The end time of the job

l Replicate Client - Name of the client the clone job took place on

l Last Successful Clone Time - The corresponding clone job end time

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 251

l Time out of Sync - Duration calculated as the difference between the Last Successful BackupTime and Last Successful Clone Time. This field is populated only if the clone is out of syncwith the backup.

Backup Restore DetailsReturns the details of all restores that have been processed in a table report. Uses data from theRestore Details data source.

l Id - Unique identifier for the restore

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server on which thejob ran

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Media Server - Name of the Media Server to which the Job was backed up

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the restore job

l Status - Status of the restore: Success, Failed, Missed (TSM only)

l Err Code - Error code associated with the restore

l Size - Amount of data restored (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to view the totalnumber of bytes that have been restored

l Size Scanned - Total size of the data scanned (in MB)

l Size Scanned Offset - Number of bytes that must be added to the Size Scanned field to beable to view the total number of bytes that have been scanned

l Num Files - Number of files restored

l Backup Time - Time at which the data being restored was originally backed up

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieve operationand not a restore operation (TSM only)

l Backup Number - Number of the backup that is being restore

l Backup Label - Name of the backup that is being restored

l Recorded Date Time - Timestamp of the restore

l Number Of Files - Number of files restored

l Scanned - Size of the scanned and compressed file (in MB)

l Plugin Name - Plug-in name

l Backup Application - Name of the backup application on which the restore occurred

l Queued - Time the restore started queuing

l Started - Time the restore started reading

l Finished - Time the restore completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Reports by System Template

252 Dell EMC Data Protection Advisor Report Reference Guide

Backup Running JobsReturns a list of jobs that are running now in a table report. Uses data from the Backup Job Statusdata source.

l Job Id - Job ID in the activity log

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Group - Name of the group or policy under which the Job is running

l Schedule - Name of the schedule under which the Job is running

l Client - Name of the client

l Job - Name of the Job

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the domain associated with the group

l Status - Status of the Job: pending, queued, initializing, started, completed, severed,restarted, in progress, future, failed - no restart

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Error Code - Error code associated with the backup

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started

l End Time - Time the job completed

l Backup Application - Name of the backup application that performed the backup. For example,NetWorker

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

Backup Server Error DetailsReturns details on errors and warnings that have occurred on a backup server in a table report.Uses data from the Application Errors data source.

l Application Id - Session ID or Process ID that the error is associated with

l Server - Server on which the error occurred

l Sub Name - Name of TSM server instance

l Client - Client on which the error occurred

l Severity - Severity of the message: Severe error, Error, Warning

l Error Code - Error code of the message: message prefix, message number, message type

l Error String - Text of the error message

l Type - Type of the event

l Source - Source of the event

l Domain - Avamar domain of the event

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 253

l Category - Category of event

l Timestamp - Time the error started

Backup Server Group Client MappingReturns a list of clients that are included in a group in a table report. Uses data from the BackupServer Mapping data source.

l Server - Name of the backup server on which the client is configured

l Client - Name of the client

l Group - Name of the group on the backup server

Backup Successful ClientsReturns information on the status of all successfully backed-up clients processed during thereporting period in a table report. Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (Symantec NetBackuponly)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Error Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

Reports by System Template

254 Dell EMC Data Protection Advisor Report Reference Guide

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (Symantec NetBackuponly)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies (including primary copy)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 255

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies (including primary copy)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Successful GroupsReturns the backup successful groups in a table report. Uses data from the Backup Group Detailsdata source.

l Server - Name of the server on which the group runs

l Group - Name of the group or policy in which the backup job occurred

l Start Time - Time the group started

l End Time - Time the group ended

l Status - Status of the group: Success, Fail

l Application Status - Status of the Backup Exec group: Cancelled, Completed With Exceptions,Missed (Backup Exec only)

Reports by System Template

256 Dell EMC Data Protection Advisor Report Reference Guide

l Backup Application - Name of the backup application performing the backup

l Group Job ID - ID of the group job instance

Backup Successful JobsReturns a list of all successful jobs on a backup server in a table report. Uses data from the BackupJob Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server on which theJob ran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the media server on which the backup occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (Symantec NetBackuponly)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job (CommVault only)

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Status - Status of the Job backed up: Success, Failed, Missed (TSM only)

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application (Avamar only)

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 257

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (Symantec NetBackuponly)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

Reports by System Template

258 Dell EMC Data Protection Advisor Report Reference Guide

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Successful Jobs with failed SLA for rulesetReturns backup successful jobs with failed SLA details in a table report. Report for Backupsucceeded but failed SLA requirements rule. Uses data from the Backup Job Details data source.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Alert - Identifier of the alert

Backup to Data Domain - Clients with Low Dedup RatioReturns clients ordered by worst dedup ratio value in a table. Uses data from the DeduplicationStatus data source.

l Client - Name of the Client

l Data Domain Name - Name of the Data Domain associated with the backup

l Pre Deduplication - Size before local compression for client

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 259

l Post Deduplication - Size after local compression for client

l Dedup Ratio - Deduplication ratio for client calculated as (Pre Deduplication/PostDeduplication)-1/(Pre Deduplication/Post Deduplication)

Backup Top 10 Largest ClientsReturns the ten clients that have backed up the most amount of data during the reporting period ina table report. Uses data from the Backup Statistics data source.

l Client - Name of the client backed up

l Backups - Number of backups that completed

l Size - Amount of data that was backed up (in GB)

l Files - Total number of files that were backed up (millions)

l Share of Total -

Backup Top 10 Least Successful ClientsReturns the backup top ten least successful clients in a table report. Uses data from the Num Jobsdata source.

l Client - Name of the client backed up

l Failures -

l Failure Rate -

Backup Top 10 Longest Running ClientsReturns the backup top ten longest running clients in a table report. Uses data from the BackupStatistics data source.

l Share of Total -

l Duration - Total duration of all backup Jobs (in seconds)

l Longest Run - Maximum duration of all backup Jobs (in seconds)

Backup Top 10 Most Unreliable ClientsReturns the top ten clients on a backup server or in a group that have failed most frequently duringthe reporting period in a table report. Uses data from the Num Jobs data source.

l Client - Name of the client backed up

l Failure -

l Share of Total -

Backup Top 10 Smallest ClientsReturns the top ten smallest clients based on the throughput of backup Jobs that have run on theclients in a table report. Uses data from the Backup Statistics data source.

l Client - Name of the client backed up

l Size - Amount of data that was backed up (in GB)

l Backups - Number of backups that completed

Reports by System Template

260 Dell EMC Data Protection Advisor Report Reference Guide

Backup VMs Not Backed UpReturns information on Virtual Machines (VMs) that have not been backed up in a table. Reportrelates to VMs being backed up by Networker VBA only. Uses data from the Successful BackupJob Details for Virtual Hosts and Virtual Hosts data sources.

l Client - Name of the VM not backed up

Clients with Low Dedup RatioReturns information on backup to Data Domain clients with low deduplication ratio in a tablereport. Uses data from the Deduplication Status data source.

Note that the dedup ratio field in this report are based on metrics at the time that the data wasingested on the Data Domain. It is not possible to report on the physical size of files being storedon the Data Domain. This is a current limitation within Data Domain.

l Client - Name of the Data Domain

l Pre-Deduplication - Size before local compression for client

l Post-Deduplication - Size after local compression for client

l Dedup Ratio - Deduplication ratio for client calculated as (Pre Deduplication/PostDeduplication)-1/(Pre Deduplication/Post Deduplication)

Clone AttemptsReturns the clone attempt details in a table report. Uses data from the Clone Attempts and CloneOperations data sources.

l Id - Identifier that uniquely identifies this clone

l Job Id - Identifier for the clone job

l Server - Name of the backup server on which the clone took place

l Sub Name - Name of TSM server instance

l Attempt - Attempt number. For example, first, second, and others

l Domain Name - Name of the domain associated with the group

l Client - Name of the client on which the clone took place

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the Media Server to which the Job was backed up

l PID - PID of the underlying system process

l Status - Status of the clone: Success, Failed

l Err Code - Error code associated with the clone

l Description - Status description

l Size - Amount of data cloned (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 261

l Size Offset - Number of bytes that must be added to the Size field to be able to view the totalnumber of bytes that have been cloned

l Num Files - Number of files cloned

l Clone Job Name - Name of the cloned Job

l Owner - Owner of the clone job

l Clone ID - Identifier for the cloned backup Job

l Size Scanned - Size of the files scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Job size in bytes

l Restarted Job - Indicates if the job is a restarted job

l Start Time - Time the Job started writing

l End Time - Time the cloned Job completed

l Backup Application - Name of the backup application that cloned the Job. For example,NetWorker, NetBackup

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Clone Attempts for Specific Clone OperationReturns the clone attempt for specific clone operation details in a table report. Uses data from theClone Attempts data source.

l Id - Identifier that uniquely identifies this clone

l Server - Name of the backup server on which the clone took place

l Sub Name - Name of TSM server instance

l Job Id - Identifier for the clone job

l Attempt - Attempt number. For example, first, second, and others

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the Media Server to which the Job was backed up

l PID - PID of the underlying system process

l Status - Status of the clone: Success, Failed

l Err Code - Error code associated with the clone

l Description - Status description

l Size - Amount of data cloned (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to view the totalnumber of bytes that have been cloned

l Num Files - Number of files cloned

l Start Time - Time the Job started

l End Time - Time the Job completed

Reports by System Template

262 Dell EMC Data Protection Advisor Report Reference Guide

Clone Job Media DetailsDrill down report for Clone Job Details that returns media details for a specific clone job in a tablereport. Uses data from the Clone Media data source.

l Server - Name of the backup server on which the clone occurred

l Volume ID - Identifier for the volume

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool in which the volume is located

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Expiry Date - Date the volume is due to expire

Clone Job Media Details for Clone OperationReturns details of the media used to back up jobs that have been cloned in a table report. Usesdata from the Clone Job Media data source.

l Server - Server which started the clone job

l Volume Id - Identifier for the volume on which the clone job took place

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool associated with the volume

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Expiry Date - Date the volume is due to expire

Clone OperationsReturns clone operation details in a table report. Uses data from the Clone Operations data source.

l Id - Identifier that uniquely identifies this clone

l Backup Application - Name of the backup application that cloned the Job. For example,NetWorker, NetBackup

l Server - Name of the backup server on which the clone took place

l Sub Name - Name of the TSM server instance

l Media Server - Name of the Media Server to which the Job was cloned

l Clone Job Name - Name of the cloned Job

l Client - Name of the client on which the clone took place

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 263

l Policy Type - The type of session that gave rise to the clone job; possible values are "Copy"and "Replication"

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the clone job

l Clone Id - Identifier for the cloned backup Job

l Session - Number of sessions simultaneously accessing the device

l Status - Status of the cloned Job: Success, Failed

l Error Code - Error code from the backup application, if available

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size in bytes

l Size Scanned - Size of the files scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Job size in bytes

l Restarted Job - Indicates if the job is a restarted job

l Start Time - Time the Job started writing

l End Time - Time the cloned Job completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Clone SummarySummary of all the cloning operations that have occurred on a server in a table report. Uses datafrom the Num Clones, Num Clone Jobs In Event State, Total Clone Size, and Total Size datasources.

l Completed- Number of cloning operations that were completed during the period specified.

l Successful - Number of cloning operations that were successful during the period specified.

l Failed - Number of cloning operations that failed during the period specified.

l Active - Number of active clone operations during the reporting period.

l Size - Total amount of data in megabytes that has been cloned during the period specified.Note that this data is not collected for NetBackup clones and duplications.

l Ratio of Data Backed Up - Percentage of backup jobs that were successfully cloned. Note novalue is returned for NetBackup.

Successful Clone OperationsDrill down report from the Clone Summary template that returns details on successful cloningoperations in a table report. Uses data from the Clone Operations data source.

l ID - Identifier that uniquely identifies this clone

l Backup Application - Name of the backup application that cloned the Job. For example,NetWorker, NetBackup

l Server - Name of the Media Server to which the Job was cloned

l Media Server - Name of the media server to which the backup was cloned

Reports by System Template

264 Dell EMC Data Protection Advisor Report Reference Guide

l Clone Job Name - Name of the cloned Job

l Client - Name of the client on which the clone took place

l Policy - Name of the protection policy

l Policy Type - The type of session that gave rise to the clone job; possible values are "Copy"and "Replication"

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Action - Name of the action

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the clone job

l Clone ID - Identifier for the cloned backup Job

l Session - Number of sessions simultaneously accessing the device

l Status - Status of the cloned Job: Success, Failed

l Error Code - Error code from the backup application, if available

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size in bytes

l Size Scanned - Size of the files scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Job size in bytes

l Restarted Job - Indicates if the job is a restarted job

l Start Time - Time the Job started writing

l End Time - Time the cloned Job completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Cloned Job DetailsReturns details on jobs that have been cloned in a table report. Uses data from the Clone JobDetails data source.

l Id - Identifier of the clone job

l Server - Name of the backup server on which the clone took place

l Media Server - Name of the Media Server to which the job was cloned

l Group - Name of the group or policy in which the cloned Job took place

l Schedule - Name of the schedule under which the clone ran

l Client - Name of the client on which the Jobs were cloned

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the cloned backup Job

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 265

l Backup Status - Status of the original backup job

l Level - Level of the cloned Job

l Size - Amount of data backed up (in MB)

l Num Files - Number of files cloned

l Start Time - Time the Job started writing

l End Time - Time the cloned Job completed

l App Job Id - Identifier that uniquely identifies the cloned Job on the backup server on whichthe Job ran

l Clone Status - Status of the cloned Job

l Clone Start Time - Time that the clone operation started

l Clone End Time - Time that the clone operation ended

l Clone Storage ID - Identifier of the NetWorker Clone

l Domain Name - Name of the domain associated with the group of the cloned job

l Backup Set - Name of the backup set associated with the backup job

l Session - Number of sessions that are simultaneously accessing the device of the cloned job

l Proxy - Proxy backup host of the backup job

Cloned Job Details For Clone OperationReturns cloned job details for clone operation in a table report. Uses data from the Clone JobDetails data source.

l Id - Identifier of the clone job

l Server - Name of the backup server on which the clone took place

l Media Server - Name of the Media Server to which the job was cloned

l Group - Name of the group or policy in which the cloned Job took place

l Schedule - Name of the schedule under which the clone ran

l Client - Name of the client on which the Jobs were cloned

l Policy - Name of the protection policy

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Action - Name of the action

l Job - Name of the cloned Job

l Backup Status - Status of the cloned Job: Success, Failed

l Level - Level of the cloned Job

l Size - Amount of data backed up (in MB)

l Num Files - Number of files cloned

l Start Time - Time the Job started writing

l End Time - Time the cloned Job completed

l App Job Id - Identifier that uniquely identifies the cloned Job on the backup server on whichthe Job ran

l Clone Status - Status of the cloned Job

Reports by System Template

266 Dell EMC Data Protection Advisor Report Reference Guide

l Clone Start Time - Time that the clone operation started

l Clone End Time - Time that the clone operation ended

l Clone Storage ID - Identifier of the NetWorker Clone

Exposure DetailsReturns information about the time since the last successful backup for the file systems of a clientin a table report. Uses data from the Application Exposure data source.

Run this report against a backup client, and not against the backup server itself. Run the reportagainst a group of client file systems or databases to calculate an exposure for an application,business unit, office, or other group of objects.

l Policy Used - The Data Protection Policy used in the calculation

l Current Backup Exposure - Amount of time for which the application has been exposed to dataloss, measured as the difference between the restore point and the report's end time

l Average Backup Exposure - Average amount of time for which the application is exposed todata loss, measured as the average difference between sequential backups of each componentof the application

l Estimated Backup Recovery Time - Estimate of the time that it would take to restore theapplication, measured as the total time taken to carry out the backups needed for a restore(calculated from historical data or as a percentage of backup time) plus a minute for eachindividual backup

l Backup Recovery Time Objective - As specified in the Protection Policy

l Backup Recovery Point Objective - As specified in the Protection Policy

l Storage Recovery Time Objective - As specified in the Protection Policy

l Off-Line Data Overhead - True if the offline overhead value was added to the calculation,otherwise False

l Restore Time Percentage - Restore time percentage

l No Est Restore Time Reason - List of reasons why the Estimated Restore Time could not becalculated, if any

Exposure Time Exceeds RPO for rulesetReturns details when exposure time exceeds RPO in a table report. Report for Backup exposuretime exceeds recovery point object rule. Uses data from the Application Exposure data source.

l Alert - Identifier of the alert

Failed Clone OperationsReturns failed clone operations details in a table report. Uses data from the Clone Operations datasource.

l ID - Identifier that uniquely identifies this clone

l Backup Application - Name of the backup application that cloned the Job. For example,NetWorker, NetBackup

l Server - Name of the Media Server to which the Job was cloned

l Media Server - Name of the media server to which the backup was cloned

l Clone Job Name - Name of the cloned Job

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 267

l Client - Name of the client on which the clone took place

l Policy - Name of the protection policy

l Policy Type - The type of session that gave rise to the clone job; possible values are "Copy"and "Replication"

l Workflow - Name of the workflow

l Workflow Job Id - Job Id associated with the workflow

l Action - Name of the action

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the clone job

l Clone ID - Identifier for the cloned backup Job

l Session - Number of sessions simultaneously accessing the device

l Status - Status of the cloned Job: Success, Failed

l Error Code - Error code from the backup application, if available

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size in bytes

l Size Scanned - Size of the files scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Job size in bytes

l Restarted Job - Indicates if the job is a restarted job

l Start Time - Time the Job started writing

l End Time - Time the cloned Job completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Failed Maintenance Job DetailsReturns the failed maintenance job details in a table report. Uses data from the Maintenance JobDetails data source.

l Id - Unique identifier of the maintenance job

l Backup Application - Application on which the maintenance job occurred

l Server - Name of the backup server on which the Job took place

l Client - Name of the client on which the maintenance job took place

l Schedule - Schedule used by the maintenance job

l Job - Name of the maintenance job

l Job Type - Category of maintenance jobs under which this job is grouped

l Object - Data selection or object operated on by the maintenance job

l Job Id - Unique identifier for the maintenance job

l Owner - Owner of the maintenance job

l Status - Indicates if the maintenance job was successful or not

l Err Code - Error code associated with the maintenance job

Reports by System Template

268 Dell EMC Data Protection Advisor Report Reference Guide

l Size - Size of data associated with the maintenance job, if any (in MB). For example, datareclaimed from database

l Queue Start - Time the maintenance job was scheduled to run

l Start Time - Time the job started

l End Time - Time the job completed

l Duration - Time the job took

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Failed Restore JobsReturns failed restore jobs in a table report. Uses data from the Restore Details data source.

l Id - Unique identifier for the restore

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server on which thejob ran

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Media Server - Name of the Media Server to which the Job was backed up

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the restore job

l Status - Status of the restore: Success, Failed, Missed (TSM only)

l Err Code - Error code associated with the restore

l Size - Amount of data restored (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to view the totalnumber of bytes that have been restored

l Num Files - Number of files restored

l Backup Time - Time at which the data being restored was originally backed up

l Size Scanned - Total size of the data scanned (in MB)

l Size Scanned Offset -Number of bytes that must be added to the Size Scanned field to be ableto view the total number of bytes that have been scanned

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieve operationand not a restore operation

l Backup Number - Number of the backup that is being restore

l Backup Label - Name of the backup that is being restored

l Recorded Date Time - Timestamp of the restore

l Number Of Files - Number of files restored

l Scanned - Size of the scanned and compressed file (in MB)

l Plugin Name - Plug-in name

l Backup Application - Name of the backup application on which the restore occurred

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 269

l Queued - Time the restore started queuing

l Started - Time the restore started reading

l Finished - Time the restore completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Failed Staging OperationsReturns details on the staging operations that have failed in a table report. Uses data from theStage Operations data source.

l ID - Identifier of the backup Job

l Backup Application - Backup application on which the staging operation occurred

l Server - Hostname of the backup server

l Process Id - Unique identifier used to identify the process

l Storage Pool - Name of the storage pool from which data has been staged

l Input Volumes - Name of the volume from which data has been staged

l Output Volumes - Name of the volume to which data has been staged

l Status - Completion status of the staging process: Success, Failed

l Size - Amount of data staged (in MB

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe amount of data in bytes

l Num Items - Number of items that were staged

l Errors - String that contains the errors that occurred

l Error Code - Error code associated with the error string

l Start Time - Time that the staging operation started

l End Time - Time that the staging operation ended

Filesystems Not Backed UpReturns a list of those file systems that have not had asuccessful backup during the reportingperiod in a table report. Uses data from the Backup Job Details and Filesystem ConfigurationConfiguration data sources.

l Host - Name of the host on which the file system is mounted

l Filesystem - Name of the file system

l Status - Status of the file system

Historical Successful JobsReturns details on historical successful jobs in a table report. Report for Slower than average andsmaller than average rule. Uses data from the Backup Job Details data sources.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

Reports by System Template

270 Dell EMC Data Protection Advisor Report Reference Guide

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (Symantec NetBackuponly)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Error Code - Error code from the backup application, if available

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Files Scanned - Number of files scanned

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 271

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Retention -

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (Symantec NetBackuponly)

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Number of Copies - Number of inline copies, if any

l Backup Set - Name of the backup set associated with the job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - - Indicates if the backup job is compliant with the data protection policy

l Policy Used - - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Is Snap - If job is a snapshot backup; field hidden by default

l Snap Target - Snap target/replication target; field hidden by default

l Snap Target Platform - Snap target platform type; field hidden by default

l Snap Policy - Snap replication policy name; field hidden by default

l Snap Creation Type - Snap creation type, either Managed or Discovered; field hidden bydefault

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

l Backup Set - Name of the backup set associated with the job

Reports by System Template

272 Dell EMC Data Protection Advisor Report Reference Guide

l Session - Number of sessions that are simultaneously accessing the device

Hosts Not Backed UpReturns the hosts not backed up in a table report. Uses data from the Backup Job Details, NodeDetails, and Virtual Hosts data sources.

l Client - Name of the client not backed up

l Scope - Virtualization server

Last 10 Failed BackupsReturns the last ten failed backups in a table report. Uses data from the Backup Job Details datasource.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up (Symantec NetBackuponly)

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Error Code Summary - Error code summary associated with the error message

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 273

l Num Files - Number of files backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Expiry Date - Date that a Job will expire

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l App Type - Name of the TDP that was used to perform the backup (TSM only)

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed (Symantec NetBackuponly)

l Number of Copies - Number of inline copies, if any

l Number of Secondary Copies - Number of successful secondary copies

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of all copies

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Restarted Job - Indicates if the job is a restarted job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

Reports by System Template

274 Dell EMC Data Protection Advisor Report Reference Guide

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Legato Networker Bootstrap ReportReturns the entries in the NetWorker bootstrap report in a table report. Uses data from theNetWorker Bootstrap data source.

l Server - Name of the backup server

l Saveset ID - ID of the bootstrap Job

l Level - Level of the bootstrap Job

l Volume - ID of the volume containing the bootstrap

l File - Volume file location of the bootstrap

l Record - Volume record location of the bootstrap

l Write Time - Time that the bootstrap record was written

Maintenance Job AttemptsReturns the maintenance job attempt details in a table report. Uses data from the MaintenanceJob Attempts and Maintenance Job Details data sources.

l Id - Unique identifier of the maintenance job

l Job Id - Identifier for the maintenance job

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM server instance

l Attempt - Attempt number. For example, first, second, and others

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the Media Server to which the Job was backed up

l Client - Name of the client on which the maintenance job took place

l Schedule - Schedule used by the maintenance job

l Job - Name of the maintenance job

l PID - PID of the underlying system process

l Status - Status of the maintenance job: Success, Failed

l Err Code - Error code associated with the maintenance job

l Description - Status description

l Size - Size of data associated with the maintenance job, if any (in MB). For example, datareclaimed from database

l Size Offset - Number of bytes that must be added to the Size field to be able to view the totalnumber of bytes that have been restored

l Num Files - Number of files

l Job Type - Category of maintenance jobs under which this job is grouped

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 275

l Object - Data selection or object operated on by the maintenance job

l Owner - Owner of the maintenance job

l Queue Start - Time the maintenance job was scheduled to run

l Start Time - Time the job started

l End Time - Time the job completed

l Backup Application - Application on which the maintenance job occurred

l Duration - Time the backup application took to complete the job

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Maintenance Job Attempts for Specific JobReturns the maintenance job attempts for specific job details in a table report. Uses data from theMaintenance Job Attempts data sources.

l Id - Unique identifier of the maintenance job

l Job Id - Identifier for the maintenance job

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM server instance

l Attempt - Attempt number. For example, first, second, and others

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the Media Server to which the Job was backed up

l PID - PID of the underlying system process

l Status - Status of the maintenance job: Success, Failed

l Err Code - Error code associated with the maintenance job

l Description - Status description

l Size - Size of data associated with the maintenance job, if any (in MB). For example, datareclaimed from database

l Size Offset - Number of bytes that must be added to the Size field to be able to view the totalnumber of bytes that have been restored

l Num Files - Number of files

l Start Time - Time the Job started

l End Time - Time the job completed

Maintenance Job DetailsReturns maintenance job details in a table report. Uses data from the Maintenance Job Detailsdata source.

l Id - Unique identifier of the maintenance job

l Job Id - Identifier for the maintenance job

l Server - Name of the backup server on which the Job took place

l Client - Name of the client on which the maintenance job took place

l Schedule - Schedule used by the maintenance job

Reports by System Template

276 Dell EMC Data Protection Advisor Report Reference Guide

l Job - Name of the maintenance job

l Status - Status of the maintenance job: Success, Failed

l Err Code - Error code associated with the maintenance job

l Description -

l Size - Size of data associated with the maintenance job, if any (in MB). For example, datareclaimed from database

l Job Type - Category of maintenance jobs under which this job is grouped

l Object - Data selection or object operated on by the maintenance job

l Owner - Owner of the maintenance job

l Queue Start - Time the maintenance job was scheduled to run

l Start Time - Time the job started

l End Time - Time the job completed

l Backup Application - Application on which the maintenance job occurred

l Duration - Time the backup application took to complete the job

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Maintenance Job ErrorsReturns details on individual errors that have occurred on a client in a table report. Uses data fromthe Maintenance Job Errors data source.

l Id - Unique identifier of the Maintenance job

l Server - Name of the backup server on which the Job took place

l Client - Name of the client on which the maintenance job took place

l Severity - Severity of the failure

l Error - Error code description associated with the maintenance job

l Err Code - Error code associated with the maintenance job

l Time - Time the failure took place

Maintenance Job SummarySummary of all the maintenance operations that have occurred in a table report. Uses data fromthe Num Maintenance Jobs data source.

l Succeeded - Number of maintenance operations that were successful during the periodspecified

l Failed - Number of maintenance operations that failed during the period specified

l Completed - Number of maintenance operations that were completed during the periodspecified

l Success Rate (%) Percentage of maintenance jobs that were successful

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 277

Missed Restore JobsReturns missed restore job details in a table report. Uses data from the Restore Details in a datasource.

l Id - Unique identifier for the restore

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server on which thejob ran

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Domain Name - Name of the domain associated with the group

l Session - Number of sessions simultaneously accessing the device

l Queued - Time the restore started queuing

l Start Time - Time the restore started reading

l End Time - Time the restore completed

l Owner - Owner of the restore job

l Status - Status of the restore: Success, Failed, Missed

l Err Code - Error code associated with the restore

l Media Server - Name of the Media Server to which the Job was backed up

l Backup Time - Time at which the data being restored was originally backed up

l Size - Amount of data restored (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to view the totalnumber of bytes that have been restored

l Size Scanned - Total size of the data scanned (in MB)

l Size Scanned Offset - Number of bytes that must be added to the Size Scanned field to beable to view the total number of bytes that have been scanned

l Num Files - Number of files restored

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieve operationand not a restore operation

l Backup Number - Number of the backup that is being restore

l Backup Label - Name of the backup that is being restored

l Recorded Date Time - Timestamp of the restore

l Number Of Files - Number of files restored

l Scanned - Size of the scanned and compressed file (in MB)

l Plugin Name - Plug-in name

l Backup Application - Name of the backup application on which the restore occurred

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Reports by System Template

278 Dell EMC Data Protection Advisor Report Reference Guide

NetBackup Backup Job Disk Media DetailsReturns NetBackup backup job disk media details in a table report. Uses data from the Backup JobDisk Media and NetBackup Disk Volume Status data sources.

l Server - Name of the NetBackup Server

l Volume Id - Identifier for the volume

l Path - Path to the volume

l Pool - Pool in which the volume belongs

l Disk Type - Type of underlying disk

l Capacity - Capacity of volume (in GB)

l Status - Active status of the volume

l Administrative State - Administrative state of the volume

l Internal State - Internal state of the volume: up, down

NetBackup Clone Job Disk Media DetailsReturns NetBackup clone job disk media details in a table report. Uses data from the Clone JobDisk Media and NetBackup Disk Volume Status data sources.

l Server - Name of the NetBackup Server

l Volume ID - Identifier for the volume

l Path - Path to the volume

l Pool - Pool associated with the volume

l Disk Type - Type of disk volume if a disk volume, or the type of underlying disk volume ifanother volume type

l Capacity - Capacity of volume (in GB)

l Status - Active status of the volume

l Adminsitrative State - Administrative state of the volume

l Internal State - Internal state of the volume: up, down

NetBackup Failed Restarted Clone OperationsReturns NetBackup failed restarted clone operations details in a table report. Uses data from theClone Operations data source.

l Id - Identifier that uniquely identifies this clone

l Backup Application - Name of the backup application that cloned the Job. For example,NetWorker, NetBackup

l Server - Name of the backup server on which the clone took place

l Media Server - Name of the Media Server to which the Job was cloned

l Clone Job Name - Name of the cloned Job

l Client - Name of the client on which the clone took place

l Action - Name of the action

l Workflow - Name of the workflow

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 279

l Policy - Name of the protection policy

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the clone job

l Clone ID - Identifier for the cloned backup Job

l Restarted Job - Indicates if the job is a restarted job

l Status - Status of the cloned Job: Success, Failed

l Error Code - Error code from the backup application, if available

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size in bytes

l Size Scanned - Size of the files scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Job size in bytes

l Restarted Job - Indicates if the job is a restarted job

l Start Time - Time the clone operation started writing

l End Time - Time the cloned operation completed

NetBackup Last Restarted Job for Specific Backup JobReturns NetBackup last restarted job for specific backup job details in table report. Uses data fromthe Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions simultaneously accessing the device

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

Reports by System Template

280 Dell EMC Data Protection Advisor Report Reference Guide

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplication - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Duration -

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Retention -

l Ran In Window -

l Started In Window -

l Finished In Window -

l Time In Window -

l Time Out Of Windows -

l Out Of Window Reason -

l Trailing Space In Window -

l Leading Space In Window -

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 281

l Valid Level -

l Valid Retention -

l Compliant -

l Policy Used -

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

NetBackup Last Restarted Job for Specific Clone OperationReturns NetBackup last restarted job for specific clone operation details in a table report. Usesdata from the Clone Operations and Restarted Jobs data sources.

l Server - Name of the backup server on which the clone took place

l Job Type - Type of job: Backup, Restore, Clone, Maintenance, Vault

l Job ID - Identifier for all job types

l Restarted Job - Original job ID for the last failed restore job

l Start Time - Start time of the last failed restarted job

l End Time - End time of the last failed restarted job

l Id - Identifier that uniquely identifies this clone

l Backup Application - Name of the backup application that cloned the Job. For example,NetWorker, NetBackup

l Media Server - Name of the Media Server to which the Job was cloned

l Clone Job Name - Name of the cloned Job

l Client - Name of the client on which the clone took place

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the clone job

l Status - Status of the cloned Job: Success, Failed

l Error Code - Error code from the backup application, if available

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size in bytes

l Size Scanned - Size of the files scanned (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Job size in bytes

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

NetBackup Last Restarted Job For Specific JobReturns NetBackup last restarted job for specific job details in a table report. Uses data from theBackup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server on which thejob ran

Reports by System Template

282 Dell EMC Data Protection Advisor Report Reference Guide

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain associated with the group

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Error Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size - Amount of data backed up (in MB)

l Files Scanned - Number of files scanned

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Ran In Window -

l Started In Window -

l Finished In Window -

l Time In Window -

l Time Out Of Window -

l Out Of Window Reason -

l Trailing Space In Window -

l Leading Space In Window -

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Duration - Time the backup application took to complete the job

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Retention -

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 283

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Restarted Job - Indicates if the job is a restarted job

l Owner - Owner of the backup job

l Valid Level -

l Valid Retention -

l Compliant -

l Policy Used -

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

NetBackup Last Restarted Job for Specific Maintenance JobReturns the NetBackup last restarted job for specific maintenance job details in a table report.Uses data from the Maintenance Job Details and Restarted Jobs data sources.

l Id - Unique identifier of the maintenance job

l Server - Name of the backup server on which the Job took place

l Job Type - Category of maintenance jobs under which this job is grouped

l Job Id - Identifier for the maintenance job

l Restarted Job - Original job ID for the last failed restore job

l Client - Name of the client on which the maintenance job took place

l Job - Name of the maintenance job

l Status - Status of the maintenance job: Success, Failed

l Err Code - Error code associated with the maintenance job

l Size - Size of data associated with the maintenance job, if any (in MB). For example, datareclaimed from database

l Owner - Owner of the maintenance job

l Schedule - Schedule used by the maintenance job

l Restore Job Type - Type of job: Backup, Restore, Clone, Maintenance, Vault

l Object - Data selection or object operated on by the maintenance job

l Queue Start - Time the maintenance job was scheduled to run

Reports by System Template

284 Dell EMC Data Protection Advisor Report Reference Guide

l Started - Time the job started

l Finished - Time the job completed

l Backup Application - Application on which the maintenance job occurred

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

NetBackup Last Restarted Job for Specific Restore JobReturns NetBackup last restarted job for specific restore job details in a table report. Uses datafrom the Restarted Jobs and Restore Details data sources.

l Id - Unique identifier for the restore

l Server - Name of the backup server on which the restore took place

l Job Type - Type of job: Backup, Restore, Clone, Maintenance, Vault

l Job ID - Identifier for all job types

l Restarted Job - Original job ID for the last failed restore job

l Media Server - Name of the Media Server to which the Job was backed up

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the restore job

l Status - Status of the restore: Success, Failed, Missed

l Err Code - Error code associated with the restore

l Size - Amount of data restored (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to view the totalnumber of bytes that have been restored

l Size Scanned - Total size of the data scanned (in MB)

l Size Scanned Offset - Number of bytes that must be added to the Size Scanned field to beable to view the total number of bytes that have been scanned

l Num Files - Number of files restored

l Backup Time - Time at which the data being restored was originally backed up

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieve operationand not a restore operation

l Backup Number - Number of the backup that is being restore

l Backup Label - Name of the backup that is being restored

l Recorded Date Time - Timestamp of the restore

l Number Of Files - Number of files restored

l Queue Start - Time the restore started queuing

l Started - Time the restore started reading

l Finished - Time the restore completed

l Plugin Name - Plug-in name

l Scanned - Size of the scanned and compressed file (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 285

l Backup Application - Name of the backup application on which the restore occurred

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

NetBackup Last Restarted Job for Specific Vault JobReturns NetBackup last restarted job for specific vault job details in a table report. Uses data fromthe NetBackup Vault Details and Restarted Jobs data sources.

l Id - Identifier that uniquely identifies this vault Job

l Server - Name of the NetBackup Server

l Job Type - Type of job: Backup, Restore, Clone, Maintenance, Vault

l Job ID - Identifier for all job types

l Restarted Job - Original job ID for the last failed restore job

l Media Server - Name of the NetBackup Media Server

l Group - Name of the Policy associated with the vault

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client

l Profile - Name of the vault profile

l Owner - Owner of the vault job

l Status - Status of the Job backed up: Success, Failed

l Err Code - Error code associated with the Job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Robot - Name of the robot

l Vault - Name of the vault

l Storage Unit - Name of the storage unit

l Expiry Date - Date that the Job will expire

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Job ID 2 - NetBackup Job ID in the activity log

NetBackup Restore Job Disk Media DetailsReturns NetBackup restore job disk media details in a table report. Uses data from the NetBackupDisk Volume Status and Restore Job Disk Media data sources.

l Server - Name of the server that started the restore job

l Volume ID - Identifier for the volume on which the restore took place

l Path - Path to the volume

l Pool - Pool in which the volume belongs

Reports by System Template

286 Dell EMC Data Protection Advisor Report Reference Guide

l Disk Type - Type of underlying disk

l Capacity - Capacity of volume (in GB)

l Status - Active status of the volume

l Adminsitrative State - Administrative state of the volume

l Internal State - Internal state of the volume: up, down

NetBackup Vault AttemptsReturns NetBackup vault attempt details in a table report. Uses data from the NetBackup VaultAttempts and NetBackup Vault Details data sources.

l Id - Identifier that uniquely identifies this vault Job

l Job Id - Identifier for the vault job

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server on which thejob ran

l Server - Name of the NetBackup Server

l Sub Name - Name of TSM server instance

l Attempt - Attempt number. For example, first, second, and others

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the NetBackup Media Server

l Group - Name of the Policy associated with the vault

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client

l Profile - Name of the vault profile

l PID - PID of the underlying system process

l Status - Status of the Job backed up: Success, Failed

l Err Code - Error code associated with the Job

l Description - Status description

l Size - Amount of data that was backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size

l Num Files - Number of files backed up

l Owner - Owner of the vault job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Robot - Name of the robot

l Vault - Name of the vault

l Session ID - Identifier of the session

l Num Ejected - Number ejected

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 287

l Expiry Date - Date that the Job will expire

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Job ID 2 - NetBackup Job ID in the activity log

NetBackup Vault Attempts for Specific JobReturns NetBackup vault attempts for specific job details in a table report. Uses data from theNetBackup Vault Attempts data source.

l Id - Identifier that uniquely identifies this vault Job

l Job Id - Identifier for the vault job

l Server - Name of the NetBackup Server

l Sub Name - Name of TSM server instance

l Attempt - Attempt number. For example, first, second, and others

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the NetBackup Media Server

l PID - PID of the underlying system process

l Status - Status of the Job backed up: Success, Failed

l Err Code - Error code associated with the Job

l Description - Status description

l Size - Amount of data that was backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size

l Num Files - Number of files backed up

l Start Time - Time the backup started to write to tape

l End Time - Time the backup finished writing to tape

NetBackup Vault EjectsReturns NetBackup vault eject details in a table report. Uses data from the NetBackup Vault Ejectsdata source.

l Server - Name of the NetBackup Server

l Sub Name - Name of TSM server instance

l Media Server - Name of the NetBackup Media Server

l Type - Type of vault

l Robot - Name of the robot

l Vault - Name of the vault

l Session - Vault job session

l Volume Group - Name of the volume group

l Volume - Name of the volume

Reports by System Template

288 Dell EMC Data Protection Advisor Report Reference Guide

NetBackup Vault Job Disk Media DetailsReturns NetBackup vault job disk media details in a table report. Uses data from the NetBackupVault Job Disk Media data source.

l Job Id - Identifier that uniquely identifies this vault Job

l Server - Name of the NetBackup Server

l Group - Name of the policy associated with the vault

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client

l Profile - Name of the vault profile

l Queue Start - Time the vault job entered the queue

l Start Time - Time the vault job started

l End Time - Time the vault job finished

l Volume Id - Unique identifier of the volume

l App Job Id - NetBackup Job Identifier

l Path - Path to the Volume

l Pool - Pool the volume belongs to

l Disk Type - Type of disk

l Capacity - Capacity of volume (in GB)

l Status - Status of the volume

l Adminsitrative State - Administrative state of the volume: up, down

l Internal State - Internal state of the volume: up, down

NetBackup Vault JobsReturns NetBackup vault job details in a table report. Uses data from the NetBackup Vault Detailsdata source.

l Id - Identifier that uniquely identifies this vault Job

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server on which thejob ran

l Server - Name of the NetBackup Server

l Media Server - Name of the NetBackup Media Server

l Group - Name of the Policy associated with the vault

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client

l Profile - Name of the vault profile

l Owner - Owner of the vault job

l Status - Status of the Job backed up: Success, Failed

l Err Code - Error code associated with the Job

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 289

l Robot - Name of the robot

l Vault - Name of the vault

l Storage Unit - Name of the storage unit

l Session ID - Identifier of the session

l Num Ejected - Number ejected

l Expiry Date - Date that the Job will expire

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Job ID 2 - NetBackup Job ID in the activity log

NetBackup Vault PreviewReturns NetBackup vault preview details in a table report. Uses data from the NetBackup VaultPreview data source.

l Server - Name of the NetBackup Server

l Sub Name - Name of TSM server instance

l Media Server - Name of the NetBackup Media Server

l Vault - Name of the vault

l Session - Number of sessions simultaneously accessing the device

l Policy - Name of the policy

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client

l Job Id - Identifier that uniquely identifies this vault Job

l Volume - Name of the volume

l Size - Amount of data (in MB)

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

Networker Data Domain Details for JobReturns NetWorker Data Domain details for job in a table report. Uses data from the BackupDevice Access Filesystem Details, Backup Device Status, Backup Device Config, Backup JobDetails with Volume, Data Domain Last Synch Time for Server, Filesystem Configuration, and PoolsOn Data Domain data sources.

l Server - Name of the backup server on which the Job took place

l Job - Name of the Job backed up

l End Time - Time the job completed

l Volume Id - Identifier for the volume

Reports by System Template

290 Dell EMC Data Protection Advisor Report Reference Guide

l Device Name - Name of the device on which the file system is located. For example, /dev/vol0

l Device Path - Device driver path for the device

l Device Type - Type of device. For example, DLT, Ultrium-2

l Data Domain Name - Name of the Data Domain

l Data Domain Pool - Pool to which the volume belongs

l Destination - Unique identifier for the destination of replication

l Synchronised - Indicates whether data is synchronized

l Replicated - Indicates whether data is replicated

Networker Data Domain Details for ServerReturns NetWorker Data Domain details for server in a table report. Uses data from the BackupDevice Access Filesystem Details, Backup Device Config, Backup Device Status, Backup JobDevice Mapping, Backup Job Details, Clone Job Media, Clone Operations, Data Domain Last SynchTime for Server, Filesystem Configuration, Pools On Data Domain data sources.

l Server - Name of the backup server on which the Job took place

l Device Name - Name of the device on which the file system is located. For example, /dev/vol0

l Client - Name of the client backed up

l Pool - Backup pool in which the backup Job belongs

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Dedupe Ratio - Difference between the Deduplication Ratio and the Total Compression Factor(as a percentage)

l End Time - Time the job completed

l Device Host - Name of the host to which the device is attached

l Device Path - Device driver path for the device

l Device Type - Type of device. For example, DLT, Ultrium-2

l Data Domain Name - Name of the Data Domain

l Export - Export name

l Destination - Unique identifier for the destination of replication

l Data Domain Pool - Pool to which the volume belongs

l Synchronised - Indicates whether data is synchronized

l Replicated - Indicates whether data is replicated

l Clones Replicated - Indicates if clone jobs were successfully replicated or not

Networker Job Size by Client for Data DomainReturns NetWorker job size by client for Data Domain details in a column chart. Uses data from theBackup Device Config, Backup Device Status, Backup Job Details with Volume, and Pools On DataDomain data sources.

l Device Access - Device access information

l Client - Name of the client backed up

l Size - Amount of data backed up (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 291

NetWorker Workflow Job StatusReturns workflow job status details in a table. Drilling down on the report returns details for all,successful and failed backup and clone operations associated with the workflow job. Uses datafrom the Workflow Jobs data source.

l Server - Name of the backup server

l Policy - Name of the protection policy

l Workflow - Name of the workflow

l Workflow Job Id -Job Id associated with the workflow

l Status -The status of the workflow

l Start Time -Start time data was gathered

l End Time -Time the data is valid until

l Status Details - Completion status for a job, if any

l Status Description - Status details for a job, if any

l Missed clients - The number of clients which has status 'missed'

l Disabled clients - The number of clients which has status 'disabled'

RecoverPoint Protected CapacityReturns the Protected Data per Recoverpoint server in a table. Uses data from RecoverPointProtected Capacity data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Data Protected - Total amount of data protected (in MB)

Restore Job AttemptsReturns the restore job attempt details in a table report. Uses data from the Restore Details andRestore Attempts data sources.

l Id - Identifier that uniquely identifies this restore

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server on which thejob ran

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Media Server - Name of the Media Server to which the Job was backed up

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Domain Name - Name of the domain associated with the group

l Owner - Owner of the restore job

l Status - Status of the restore: Success, Failed, Missed

l Err Code - Error code associated with the restore

l Size - Amount of data restored (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to view the totalnumber of bytes that have been restored

Reports by System Template

292 Dell EMC Data Protection Advisor Report Reference Guide

l Size Scanned - Total size of the data scanned (in MB)

l Size Scanned Offset - Number of bytes that must be added to the Size Scanned field to beable to view the total number of bytes that have been scanned

l Num Files - Number of files restored

l Backup Time - Time at which the data being restored was originally backed up

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieve operationand not a restore operation

l Backup Number - Number of the backup that is being restore

l Backup Label - Name of the backup that is being restored

l Recorded Date Time - Timestamp of the restore

l Number Of Files - Number of files restored

l Scanned - Size of the scanned and compressed file (in MB)

l Plugin Name - Plug-in name

l Backup Application - Name of the backup application on which the restore occurred

l Queued - Time the restore started queuing

l Started - Time the restore started reading

l Finished - Time the restore completed

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Restore Job Attempts for Specific JobReturns restore job attempts for specific job details in a table report. Uses data from the RestoreAttempts data source.

l Id - Identifier that uniquely identifies this restore

l Job Id - Identifier for the restore job

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Attempt - Attempt number. For example, first, second, and others

l Storage Unit - Storage unit the policy is configured to use

l Media Server - Name of the Media Server to which the Job was backed up

l PID - PID of the underlying system process

l Status - Status of the restore: Success, Failed, Missed

l Err Code - Error code associated with the restore

l Description - Status description

l Size - Amount of data restored (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to view the totalnumber of bytes that have been restored

l Num Files - Number of files restored

l Started - Time the restore started reading

l Started - Time the restore completed

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 293

Restore Job Error DetailsDrill down report from the Restore Details and Failed Restores templates that returns informationon restores that have not completed due to error in a table report. Uses data from the RestoreDetails and Restore Job Errors data sources.

l Id - Unique identifier for the restore

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Domain Name - Name of the domain associated with the group

l Client - Name of the client on which the restore took place

l Job - Name of the Job being restored

l Severity - Severity of the restore, if applicable

l Error - Error string associated with the restore

l Err Code - Error code of the restore

l Time - Time the error occurred

l Queue Start - Time the restore started queuing

Restore Job Error Details For Specific JobReturns specific restore jobs that have not completed due to error in a table report. Uses datafrom the Restore Job Errors data source.

l Id - Unique identifier for the restore

l Server - Name of the backup server on which the restore took place

l Sub Name - Not applicable

l Client - Name of the client on which the restore took place

l Severity - Severity of the restore, if applicable

l Error - Error string associated with the restore

l Err Code - Error code of the restore

l Time - Time the error occurred

Restore Job Media DetailsReturns a list of volumes that a backup was written to in a table report. Uses data from theRestore Job Media data source.

l Volume Id - Unique identifier of the volume to which the restore Job was written

l State - State of the restore: success, failed

l Pool - Backup pool in which the backup Job belongs

l Online - Indicates if the volume is online

l Jukebox - Jukebox in which the volume is located

l Slot - Slot in jukebox occupied by volume

l Expiry Date - Date the volume is due to expire

Reports by System Template

294 Dell EMC Data Protection Advisor Report Reference Guide

Restore Job SummarySummary of the restore job details in a table report. Uses data from the Restore Statistics datasource.

l Completed - Total number of jobs that have completed over the reporting period

l Size - Total size of restores that completed (in GB)

l Succeeded - Number of jobs that were successful over the reporting period

l Failed - Number of jobs that failed over the reporting period

l Missed - Number of jobs that were missed over the reporting period

l Success Rate - Success rate of backups over the reporting period

Restore Top 10 Largest ClientsReturns the restore top ten largest clients in a table report. Uses data from the Restore Statisticsdata source.

l Restores - Number of restores that completed

l Size - Total size of restores that completed (in GB)

l Files - Total number of files that were restored (millions)

l Share of Total -

Restore Top 10 Least Successful ClientsReturns the restore top ten least successful clients in a table report. Uses data from the RestoreStatistics data source.

l Failures - Total number of failures

l Failure Rate - Percentage of failures

RMAN Backup Pieces in SetDrill down report from RMAN backup sets. Returns list of backup pieces included into the selectedset. Uses data from "RMAN Backup Pieces by Backup Set" datasource.

l Server - Name of the Oracle server on which backup took place

l Sub Name - Name of the Oracle instance

l Backup Set RECID - Backup set record ID

l Backup Piece RECID - Backup piece record ID

l Piece Number - Backup piece number

l Handle - Backup piece handle identifies the backup piece on restore

l Media - Name of the media on which the backup piece resides

l Media Pool - The media pool in which the copy resides. This is the same value that was enteredin the POOL operand of the Recovery Manager backup command

l Tag - Backup piece tag. The tag is specified at backup set level, but stored at piece level

l Status - Indicates status of backup piece (on time of initial data collection)

l Deleted - Whether or not file still exists (on time of initial data collection)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 295

l Size - Size of the backup piece (in MB)

l Size Offset - Number of bytes that should be added to the Size field to calculate piece size inbytes

l Compressed - Indicates whether or not the backup piece compressed

l Encrypted - Indicates whether or not the backup piece was encrypted

l Backed by OSB - Indicates whether or not the file has been backed up by Oracle SecureBackup

l Backed by VSS - Indicates whether or not the file has been backed up by Volume ShadowCopy Service (VSS)

l For XTTS - Indicates whether or not this is a cross platform backup piece

l Same Endian - If the value of FOR_XTTS is True, then this column indicates whether thebackup piece has the same endianness as the current database or not; otherwise NULL

l Recovery Dest File - Indicates whether the file was created in the flash recovery area or not

l Container ID - The ID of the container to which the data pertains

l Concurrent Access - Indicates whether the piece on a media can be accessed concurrently

l Comments - Value returned by the operating system or storage subsystem. Set to NULL forbackup pieces on disk

RMAN Backup SetsReturns details of RMAN backup sets in a table report, based on the data from RMAN backup setsdatasource.

l Server - Name of the Oracle server on which backup took place

l Sub Name - Name of the Oracle instance

l DB Name - Name of the database backed up

l Backup Set RECID - REC_ID of the backup set, assigned by RMAN

l Pieces - Number of backup pieces in a set

l Num Copies - Number of copies

l Backup Type - Type of files in backup. If this is a datafile full backup, the value is D; if this isincremental backup, the value is I. If backup contains archived redo logs, the value is L

l Input Size - Amount of data backed up when the backup set was created (in MB)

l Input Size Offset - Number of bytes that should be added to the Size field to calculate backedup data size in bytes

l Input Rate - Number of bytes read per second when backup set was initially created (MB/sec)

l Input Rate Offset - Value that should be added to Input Rate value to calculate rate in bytesper second

l Output Size - Size of the backup set (in MB)

l Output Size Offset - Number of bytes that should be added to the Output Size field tocalculate output size in bytes

l Output Rate - Number of bytes written per second when the backup set was initially created(MB/sec)

l Output Rate Offset - Value that should be added to Output Rate value to calculate rate inbytes per second

Reports by System Template

296 Dell EMC Data Protection Advisor Report Reference Guide

l Compressed - Indicates whether or not the backup set compressed

l Compression Ratio - The ratio between the total blocks in the datafile and the blocks thatRMAN backed up

l Multi Section - Indicates whether or not this backup set is a multi-section backup

l Encrypted - Indicates whether or not this backup set is encrypted

l Backed By OSB - Indicates whether or not this backup was done to Oracle Secure Backup

l Keep - Indicates whether this backup set has a retention policy different then retention policy

l Keep Options - Lists additional retention options for this backup set

l Keep Until - Keep until time

l Control File Included - Indicates if there is a control file included in this backup set

l Control File Type - Control file type (NONE, BACKUP or STANDBY)

l Container ID - The ID of the container to which the data pertains

l Incremental Level - The level of the incremental backup

l Input File Scan Only - Indicates whether or not datafiles were only read without performingbackup

l Device Type - Type of device. If the backup set exists on more than one device type, an * isindicated here

l Block Size - Block size of the backup set

Snap Job DetailsReturns all snap job details in a table. Uses data from the Backup Job Details data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Domain Name - Name of the domain

l Media Server - Name of the Media Server on which the backup or archive occurred

l Storage Unit - Storage unit the policy is configured to use

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Session - session associated with the job

l Proxy - Proxy backup host

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 297

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Error Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Status Code Summary - Status code summary from the job

l Level - Level of the backup. This is hardcoded to full

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Files Scanned - Number of files scanned

l Num Files Not Backed Up - Number of files not backed up

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen In Window is false. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Started - Time the backup went into the backup applications started

l Finished - Time the backup went into the backup applications ended

l Duration - Time the backup application took to complete the job

l Expires - Date that a Job will expire

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Size Transferred - Size transferred to server (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted from the SizeTransferred field to return the Save Set size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

Reports by System Template

298 Dell EMC Data Protection Advisor Report Reference Guide

l Restarted Job - Indicates if the job is a restarted job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Snap Job SummaryReturns a summary of snap jobs in a table. Uses data from the Num Jobs in Event State andBackup Statistics data sources.

l Completed - Completed snap jobs

l Succeeded - Successful snap jobs

l Failed - Failed snap jobs

l Success Rate - Success rate of snap backups over the reporting period

l Active - Active snap jobs

Staging Media DetailsReturns staging media details in a table report. Uses data from the Staging Media data source.

l Server - Name of the server

l Volume Id - Identifier for the volume

l State - State of the media

l Pool - Pool to which the volume belongs

l Online - Indicates if the media is online or not

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 299

l Jukebox - Jukebox in which the volume resides

l Slot - Jukebox slot occupied by the volume

l Expiry Date - Date of expiry of the volume

Staging OperationsReturns staging operations details in a table report. Uses data from the NetWorker Storage NodeConfig and Stage Operations data sources.

l Id - Identifier of the backup Job

l Backup Application - Backup application on which the staging operation occurred

l Server - Name of the backup server

l Process Id - Unique identifier used to identify the process

l Storage Pool - Name of the storage pool from which data has been staged

l Input Volumes - Name of the volume from which data has been staged

l Output Volumes - Name of the volume to which data has been staged

l Status - Completion status of the staging process: Success, Failed

l Size - Amount of data staged (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe amount of data in bytes

l Num Items - Number of items that were staged

l Errors - String that contains the errors that occurred

l Error Code - Error code associated with the error string

l Start Time - Time that the staging operation started

l End Time - Time that the staging operation ended

Staging SummarySummary of all the staging operations that have occurred on a NetWorker server in a table report.Uses data from the NetWorker Storage Node Config, Num Stages, and Total Staging Size datasources.

l Completed - Number of staging operations that were completed during the period specified

l Num Stages - Number of staging operations that have occurred during the period specified

l Total Staging Size - Total amount of data that has been staged during the period specified (inGB)

Successful Maintenance Job DetailsReturns details on all maintenance Jobs that were successful on the PureDisk server during thespecified period in a table report. Uses data from the Maintenance Job Details data source.

l Id - Unique identifier of the maintenance job

l Backup Application - Application on which the maintenance job occurred

l Server - Name of the backup server on which the Job took place

l Client - Name of the client on which the maintenance job took place

l Schedule - Schedule used by the maintenance job

Reports by System Template

300 Dell EMC Data Protection Advisor Report Reference Guide

l Job - Name of the maintenance job

l Job Type - Category of maintenance jobs under which this job is grouped

l Object - Data selection or object operated on by the maintenance job

l Job Id - Identifier for the maintenance job

l Owner - Owner of the maintenance job

l Status - Status of the maintenance job: Success, Failed

l Err Code - Error code associated with the maintenance job

l Size - Size of data associated with the maintenance job, if any (in MB). For example, datareclaimed from database

l Queue Start - Time the maintenance job was scheduled to run

l Start Time - Time the job started

l End Time - Time the job completed

l Duration - Duration the job took

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Successful Restore JobsReturns successful restore job details in a table report. Uses data from the Restore Details datasource.

l Id - Unique identifier for the restore

l App Job Id - Identifier that uniquely identifies the cloned job on the backup server on which thejob ran

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of TSM server instance

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Domain Name - Name of the domain associated with the group

l Session - Number of sessions simultaneously accessing the device

l Queued - Time the restore started queuing

l Start Time - Time the restore started reading

l End Time - Time the restore completed

l Owner - Owner of the restore job

l Status - Status of the restore: Success, Failed, Missed

l Err Code - Error code associated with the restore

l Media Server - Name of the Media Server to which the Job was backed up

l Backup Time - Time at which the data being restored was originally backed up

l Size - Amount of data restored (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to view the totalnumber of bytes that have been restored

l Size Scanned - Total size of the data scanned (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 301

l Size Scanned Offset - Number of bytes that must be added to the Size Scanned field to beable to view the total number of bytes that have been scanned

l Num Files - Number of files restored

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieve operationand not a restore operation

l Backup Number - Number of the backup that is being restore

l Backup Label - Name of the backup that is being restored

l Recorded Date Time - Timestamp of the restore

l Number Of Files - Number of files restored

l Scanned - Size of the scanned and compressed file (in MB)

l Plugin Name - Plug-in name

l Backup Application - Name of the backup application on which the restore occurred

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

Successful Staging OperationsReturns successful staging operations details in a table report. Uses data from the StageOperations data source.

l Id - Identifier of the backup Job

l Backup Application - Backup application on which the staging operation occurred

l Server - Name of the backup server

l Process Id - Unique identifier used to identify the process

l Storage Pool - Name of the storage pool from which data has been staged

l Input Volumes - Name of the volume from which data has been staged

l Output Volumes - Name of the volume to which data has been staged

l Status - Completion status of the staging process: Success, Failed

l Size - Amount of data staged (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe amount of data in bytes

l Num Items - Number of items that were staged

l Errors - String that contains the errors that occurred

l Error Code - Error code associated with the error string

l Start Time - Time that the staging operation started

l End Time - Time that the staging operation ended

Top 10 Backup Clients By Avg Daily ChangeReturns the top ten backup client by average daily change in a table report. Uses data from theBackup Statistics, Last Backup Details, and Report Times data sources.

l Client - Name of the client that was backed up

Reports by System Template

302 Dell EMC Data Protection Advisor Report Reference Guide

l Protected - Amount of data on the backup client that is being protected. For applications suchas NetWorker and NetBackup, this is determined by looking at the last full backup of the client.For applications like Avamar, the statistics are derived directly from the application

l Daily Change - Amount of daily change

Top 10 Backup Clients with Best De-Dupe RateReturns the top ten backup clients with best deduplication rate in a table report. For NetBackup,this report works correctly with backups only for non-accelerator jobs. Uses data from the BackupJob Details and Last Backup Details data sources.

l Client - Name of the client that was backed up

l Avg Daily Change - Amount of daily change

l Protected - Amount of data on the backup client that is being protected. For applications suchas NetWorker and NetBackup, this is determined by looking at the last full backup of the client.For applications like Avamar, the statistics are derived directly from the application

l Change Rate - Change rate

l De-Dupe Rate - Deduplication rate

Top 10 Backup Clients with Worst De-Dupe RateReturns the top ten backup clients with worst deduplication rate in a table report. For NetBackup,this report works correctly with backups only for non-accelerator jobs. Uses data from the BackupJob Details and Last Backup Details data sources.

l Client - Name of the client that was backed up

l Daily Change - Amount of daily change

l Protected - Amount of data on the backup client that is being protected. For applications suchas NetWorker and NetBackup, this is determined by looking at the last full backup of the client.For applications like Avamar, the statistics are derived directly from the application

TSM Backup Set DetailsReturns TSM backup set details in a table report. A backup set is a collection of active files thatreside on a TSM server. Uses data from the TSM Backup Set data source.

l Name - Name of the backup set

l Client - Name of the client object

l Type - Type of data: file, image, application

l Create Time - Date and time the backup set was created

l Retention - Retention days

l Device Class - Name of the device class

l Description - User-defined description of the device class

l Has Table of Contents - Indicates if a table of contents is available. A value of 1 indicateswhether the table of contents is available

l Volumes - Volume names containing the data displayed in a comma-separated list

l Filespaces - Filespace names displayed in a comma-separated list

l Size - Size of the backup set (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 303

l Expiry - Expiration date

TSM Command Event DetailsReturns TSM command event details in a table report. Uses data from the TSM Command Eventsdata source.

l Server - Name of the TSM Server that generated the command

l Backup Server - Name of the backup server on which the command ran

l Media Server - Media server on which the command ran

l Group - Name of the group associated with the command event

l Schedule - Name of the schedule associated with the command event

l Client - Name of the client on which the command event ran

l Job - Name of the command that ran, or the names of the files backed up or restored (ifavailable

l Status - Indicates if the command ran successfully or not

l Error Code - Error code of the command

l Queue Start - Time the command started queueing

l Start Time - Time the command started

l End Time - Time the command completed

TSM Database Backup ErrorsReturns TSM database backup error details in a table report. Uses data from the TSM DatabaseBackup Errors data source.

l Id - Unique identifier of the database (catalog) process matching with the TSM DatabaseBackup data source

l Message ID - Message ID string corresponding to the error

l Error - Error message string

TSM Database BackupsReturns TSM database backup details in a table report. Uses data from the TSM Database Backupdata source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Level - Priority of the process

l Output Volume - Name of the volume to which data has been backed up

l Status - Completion status of the database (catalog) backup process: Success, Failed

l Size - Amount of data backed up (in MB)

l Num Items - Number of items backed up

l Error Flag - Indicates if the process returned any errors. Even if the process was successful, itcould have errors associated with it

Reports by System Template

304 Dell EMC Data Protection Advisor Report Reference Guide

l Throughput - Throughput of size to duration (MB/sec)

l Start Time - Time the process started

l End Time - Time the process completed

TSM Delete VolumesReturns delete volume process details on the TSM server in a table report. Uses data from theTSM Delete Volume data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - UniqUnique identifier used by TSM to identify the process

l Volume - Name of the volume to delete

l Storage Pool - Name of the storage pool in which the volume is located

l Status - Completion status of the delete volume process: Success, Failed

l Num Items - Number of items that were deleted

l Size - Amount of data deleted (in MB)

l Start Time - Time the process started

l End Time - Time the process completed

TSM Expiration ErrorsReturns errors related to a specific expiration job in a table report. Uses data from the TSMExpiration Errors data source.

l ID - Unique identifier of the database (catalog) process matching with the TSM Expiration datasource

l Message ID - Message ID string corresponding to the error

l Error - Error message string

TSM ExpirationsReturns the expiration processes running on the TSM server in a table report. Uses data from theTSM Expiration data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Status - Completion status of the expiration process: Success, Failed

l Node Details - Details of the TSM server objects on which expiration is occurring. This includesthe object name, filespace name, filespace ID, domain name, management class and type offiles being expired. For example, BACKUP and ARCHIVE

l Objects Examined - Objects that were scrutinized during the expiration process

l Backup Objects Deleted - Backup objects that were deleted during the expiration process

l Archive Objects Deleted - Archive objects that were deleted during the expiration process

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 305

l DB Volumes Deleted - Database volumes that were deleted during the expiration process

l Recovery Plans Deleted - Recovery plans that were deleted during the expiration process

l Num Errors - Number of errors during the expiration process

l Num Items - Number of items deleted

l Size - Amount of data deleted (in MB)

l Error Flag - Indicates if the process returned any errors. Even if the process was successful, itcould have errors associated with it

l Throughput - Throughput of size to duration (MB/sec)

l Start Time - Time the process started

l End Time - Time the process completed

TSM Failed Migration JobsReturns details of all failed TSM migration jobs in a table report. Uses data from the TSMMigration data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Storage Pool - Name of the storage pool from which data has been migrated

l Input Volume - Name of the volume from which data has been migrated

l Output Volume - Name of the volume to which data has been transferred

l Status - Completion status of the migration process: Success, Failed

l Size - Amount of data migrated (in MB)

l Num Items - Total number of items migrated from the storage pool

l Error Flag - Indicates if the process returned any errors. Even if the process was successful, itcould have errors associated with it

l Start Time - Time the process started

l End Time - Time the process completed

TSM Failed Reclamation JobsReturns details on failed TSM reclamation jobs that have occurred in the last day in a table report.Uses data from the TSM Reclamation data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Storage Pool - Name of the storage pool from which data has been reclaimed

l Input Volume - Name of the volume from which data has been reclaimed

l Output Volume - Name of the volume to which data has been transferred

l Status - Completion status of the reclamation process: Success, Failed

Reports by System Template

306 Dell EMC Data Protection Advisor Report Reference Guide

l Size - Amount of data reclaimed (in MB)

l Num Items - Number of items reclaimed

l Error Flag - Indicates if the process returned any errors. Even if the process was successful, itcould have errors associated with it

l Start Time - Time the process started

l End Time - Time the process completed

TSM Migrated Item Count by Storage PoolReturns the total number of items migrated by storage pool over the period specified in a columnchart. Uses data from the TSM Total Items Migrated By Storage Pool data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool from which data has been migrated

l Items - Total number of items migrated from the storage pool

l Input Volume - Name of the volume from which data has been migrated

TSM Migrated Size by Storage PoolReturns the total amount of data migrated by storage pool in a column chart. Uses data from theTSM Total Size Migrated By Storage Pool data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool

l Size - Total amount of data migrated from the storage pool (in MB)

TSM Migration Errors For Specific JobReturns information on the errors related to a specific migration job in a table report. Uses datafrom the TSM Migration Errors data source.

l Id - Unique identifier of the migration process matching with the Migration data source

l Message ID - Message ID string corresponding to the error

l Error - Error message string

TSM Migration JobsReturns details of all TSM migration jobs in a table report. Uses data from the TSM Backup Setand TSM Migration data sources.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Process Id - Unique identifier used by TSM to identify the process

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool from which data has been migrated

l Input Volume - Name of the volume from which data has been migrated

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 307

l Output Volume - Name of the volume to which data has been transferred

l Status - Completion status of the migration process: Success, Failed

l Size - Amount of data migrated (in MB)

l Num Items - Total number of items migrated from the storage pool

l Error Flag - Indicates if the process returned any errors. Even if the process was successful, itcould have errors associated with it

l Throughput - Throughput of size to duration (MB/sec)

l Start Time - Time the process started

l End Time - Time the process completed

TSM Migration SummarySummary of all the TSM Migration jobs that have occurred on a server in a table report. Uses datafrom the TSM Backup Set, TSM Num Migration Jobs By Storage Pool, TSM Total Items MigratedBy Storage Pool, and TSM Total Size Migrated By Storage Pool data sources.

l Completed - Number of migration jobs that have completed

l Succeeded - Number of migration jobs that have succeeded

l Failed - Number of migration jobs that have failed

l Size - Total size of the migration jobs

l Items - Total number of items migrated from the storage pool

TSM Move ErrorsReturns TSM move error details in a table report. Uses data from the TSM Move Errors datasource.

l ID - Unique identifier of the data move process matching with the TSM Move data source

l Message ID - Message ID string corresponding to the error

l Error - Error message string

TSM MovesReturns TSM move details in a table report. Uses data from the TSM Move data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Status - Completion status of the data move process: Success, Failed

l Input Volume - Name of the volume from which data has been moved

l Output Volume - Name of the volume to which data has been moved

l Storage Pool - Name of the storage pool from which data has been moved

l Num Items - Total number of items moved from the storage pool

l Size - Amount of data moved (in MB)

l Un-Readable Files - Files that were not moved because they cannot be read

Reports by System Template

308 Dell EMC Data Protection Advisor Report Reference Guide

l Un-Readable Bytes - Bytes that were not moved because they cannot be read

l Error Flag - Indicates if the process returned any errors. Even if the process was successful, itcould have errors associated with it

l Throughput - Throughput of size to duration (MB/sec)

l Start Time - Time the process started

l End Time - Time the process completed

TSM Reclaimed Item Count by Storage PoolReturns the total number of items reclaimed by storage pool in a column chart. Uses data from theTSM Total Items Reclaimed By Storage Pool data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool from which data has been reclaimed

l Items - Total number of items reclaimed from the storage pool

TSM Reclaimed Size by Storage PoolReturns the total amount of data reclaimed by storage pool in a column chart. Uses data from theTSM Total Size Reclaimed By Storage Pool data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool

l Size - Total amount of data reclaimed from the storage pool (in MB)

l Input Volume - Name of the volume from which data has been moved

l Start Time - Time the process started

TSM Reclamation Errors For Specific JobReturns errors for a specific reclamation job in a table report. Uses data from the TSMReclamation Errors data source.

l Server - Name of the TSM Server

l Id - Unique identifier of the migration process matching with the Reclamation data source

l Message ID - Message ID string corresponding to the error

l Error - Error message string

TSM Reclamation JobsReturns all TSM reclamation jobs that have occurred in the last day in a table report. Uses datafrom the TSM Reclamation data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 309

l Storage Pool - Name of the storage pool from which data has been reclaimed

l Input Volume - Name of the volume from which data has been reclaimed

l Output Volume - Name of the volume to which data has been transferred

l Status - Completion status of the reclamation process: Success, Failed

l Size - Amount of data reclaimed (in MB)

l Num Items - Number of items reclaimed

l Error Flag - Indicates if the process returned any errors. Even if the process was successful, itcould have errors associated with it

l Start Time - Time the process started

l End Time - Time the process completed

l Throughput - Throughput of size to duration (MB/sec)

TSM Reclamation SummarySummary of all the TSM Reclamation jobs that have occurred on a server in a table report. Usesdata from the TSM Num Reclamation Jobs By Storage Pool, TSM Total Items Reclaimed ByStorage Pool, TSM Total Size Reclaimed By Storage Pool data sources.

l Completed - Number of reclamation jobs that have completed

l Succeeded - Number of reclamation jobs that have succeeded

l Failed - Number of reclamation jobs that have failed

l Size - Total amount of data reclaimed from the storage pool (in MB)

l Items - Total number of items reclaimed

TSM Storage Pool CopiesReturns TSM storage pool copy details in a table report. Uses data from the TSM Storage PoolCopy data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Input Volume - Name of the volume from which the storage pool has been copied

l Output Volume - Name of the volume to which the storage pool has been copied

l Storage Pool - Name of the storage pool from which data has been copied

l Copy Storage Pool - Name of the storage pool to which data has been copied

l Status - Completion status of the storage pool copy process: Success, Failed

l Unreadable Bytes - Bytes that were not copied because they cannot be read

l Unreadable Files - Files that were not copied because they cannot be read

l Num Items - Number of items reclaimed from the storage pool

l Size - Amount of data reclaimed (in MB)

l Error Flag - Indicates if the process returned any errors. Even if the process was successful, itcould have errors associated with it

Reports by System Template

310 Dell EMC Data Protection Advisor Report Reference Guide

l Start Time - Time the process started

l End Time - Time the process completed

l Throughput - Throughput of size to duration (MB/sec)

TSM Storage Pool Copy ErrorsReturns the errors associated with specific storage pool copy jobs in a table report. Uses data fromthe TSM Storage Pool Copy Errors data source.

l Id - Unique identifier of the storage pool copy process matching with the TSM Storage PoolCopy data source

l Message ID - Message ID string corresponding to the error

l Error - Error message string

TSM Successful Migration JobsReturns details of all successful TSM migration jobs in a table report. Uses data from the TSMMigration data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Storage Pool - Name of the storage pool from which data has been migrated

l Input Volume - Name of the volume from which data has been migrated

l Output Volume - Name of the volume to which data has been transferred

l Status - Completion status of the migration process: Success, Failed

l Size - Amount of data migrated (in MB)

l Num Items - Total number of items migrated from the storage pool

l Error Flag - Indicates if the process returned any errors. Even if the process was successful, itcould have errors associated with it

l Start Time - Time the process started

l End Time - Time the process completed

l Throughput - Throughput of size to duration (MB/sec)

TSM Successful Reclamation JobsReturns details on successful TSM reclamation jobs that have occurred in the last day in a tablereport. Uses data from the TSM Reclamation data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process Id - Unique identifier used by TSM to identify the process

l Storage Pool - Name of the storage pool from which data has been reclaimed

l Input Volume - Name of the volume from which data has been reclaimed

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 311

l Output Volume - Name of the volume to which data has been transferred

l Status - Completion status of the reclamation process: Success, Failed

l Size - Amount of data reclaimed (in MB)

l Num Items - Number of items reclaimed

l Error Flag - Indicates if the process returned any errors. Even if the process was successful, itcould have errors associated with it

l Start Time - Time the process started

l End Time - Time the process completed

l Throughput - Throughput of size to duration (MB/sec)

TSM Top 10 Backups with Worst Idle Wait TimesReturns TSM top ten backups with worst idle wait times in a table report. Uses data from theBackup Job Details and TSM Reclamation data sources.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions simultaneously accessing the device

l Queue Start - Time the process started queuing

l Start Time - Time the process started

l End Time - Time the process completed

l Idle Wait Time - Time Server spent waiting for backup client

TSM Top 10 Backups with Worst Media Wait TimesReturns TSM top ten backups with worst media wait times in a table report. Uses data from theBackup Job Details and TSM Reclamation data sources.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

Reports by System Template

312 Dell EMC Data Protection Advisor Report Reference Guide

l Session - Number of sessions simultaneously accessing the device

l Queue Start - Time the process started queuing

l Start Time - Time the process started

l End Time - Time the process completed

l Media Wait Time - Time Server spent waiting for backup media

TSM Top 10 Clients with Worst Idle Wait TimesReturns TSM top ten clients with worst idle wait times in a table report. Uses data from theBackup Job Details and TSM Reclamation data sources.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Client - Name of the client backed up

l Idle Wait Time - Time Server spent waiting for backup client

TSM Top 10 Clients with Worst Media Wait TimesReturns TSM top ten clients with worst media wait times in a table report. Uses data from theBackup Job Details and TSM Reclamation data sources.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Client - Name of the client backed up

l Media Wait Time - Time Server spent waiting for backup media

Uncloned BackupsReturns details on backup jobs that have not been cloned in a table report. Uses data from theUncloned Backup Jobs data source.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Domain Name - Name of the domain

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 313

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l App Type - Name of the TDP that was used to perform the backup

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Storage Unit - Storage unit the policy is configured to use

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up

l Files Scanned - Number of files scanned

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Size Transferred - Total size of the data transferred (in MB)

l Size Transferred Offset - Number of bytes that should be added or subtracted from the SizeTransferred field to return the Job size (in bytes)

l Archive Flag - Flag indicating whether Job was an archive or a backup

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

Reports by System Template

314 Dell EMC Data Protection Advisor Report Reference Guide

l Effective Path - Effective path of the Backup

l Error Code Summary - Error code summary associated with the error message

l Status Code Summary - Status code summary from the job

l Plugin Name - Plug-in name

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Vault Job Media DetailsReturns a list of volumes that a vault job was written to in a table report. Uses data from theNetBackup Vault Job Media data source.

l Volume Id - Unique identifier of the volume

l State - State of the media

l Pool - Pool to which the volume belongs

l Online - Indicates if the media is online or not

l Jukebox - Jukebox in which the volume resides

l Slot - Jukebox slot occupied by the volume

l Expiry Date - Date of expiry of the volume

Virtual Hosts Not Backed UpReturns a list of virtual machines, for which there is no backup for the given time period or it hasexpired. It takes aliases into consideration.

Host Name - name of the virtual machine.

The report is available for vCenter scope.

VM ProtectionReturns information on virtual machine protection. Uses the VM Protection data source.

l ESX Server - Name of the ESX

l Vhost - Virtual Host Name

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 315

l Protected By - VMs are backed up by

l Last Successful Backup - Time of last successful backup

Database system templatesDPA gathers configuration and status information from a number of different databasecomponents, including the database server, databases, schemas, tables, indexes, and datafiles. Awide range of reports provide visibility into the configuration and status of the database andconfiguration changes that have occurred over time.

DPA provides reports that allow you to:

l Monitor the overall storage utilization of the database.

l Identify the largest tables and indexes within the database.

The DPA database can be monitored without any additional licensing required.

The architecture of database products and the terminology used by different database vendors isnot consistent. To provide a consistent reporting interface for a variety of database products, DPAuses standardized terminology to describe the database elements that are monitored.

To view reports for backup databases, right-click the database or database group objects in theconfiguration tree.

All Database ChangesReturns details about all changes made to the selected database objects in a table report. Usesdata from the Database Config, Database Params, Database Server Config, Database ServerParams, Database Server Status, Database Status, Datafile Config, Datafile Status, Index Config,Log File Configuration, Log File Status, Table Config, Tablespace Config, and Tablespace Statusdata sources.

l Server - Name of the server that hosts the database

l Type - Type of database component that was changed. For example, server, or tablespace

l Object - Name of the database object that was changed

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Connection StatusReturns connection status details in a table report. Uses data from the Connection Status datasource.

l Server - Name of the server

l Sub Name - Name of TSM server instance

l Connection ID - Connection database identifier

l Database Name - Name of the database

l Connect Time - Time connection was established

l Status - Status of the connection: Active, Inactive, Killed

l Command - Current or most recent command processed by the connection

l Client Host - Originating host name for the connection

Reports by System Template

316 Dell EMC Data Protection Advisor Report Reference Guide

l Client User - Originating user name (operating system login name) for the connection

l Client PID - Originating client process ID (operating system process ID) for the connection

l Client Application - Originating application for the connection

l Used CPU - Total used CPU runtime for this connection (in seconds)

l Used Memory - Total used memory for this connection (in MB)

l Number Logical Reads - Number of logical reads by this connection

l Number Reads - Number of physical reads made by this connection

Control File DetailsReturns control file details in a table report. Uses data from the Control File Configuration datasource.

l Server - Server identifier, usually of the type hostname-port

l Sub Name - Name of the Oracle instance

l Database Name - Name of the database

l Control File Name - Control file physical pathname

l Max Size - Maximum size of control file (in MB)

Database Change SummarySummary of all changes made to the selected database objects in a column chart. Uses data fromthe Database Config, Database Params, Database Server Config, Database Server Params,Database Server Status, Datafile Config, Datafile Status, Index Config, Log File Configuration, LogFile Status, Table Config, Tablespace Config, and Tablespace Status data sources.

l Change - Type of change: Added, Deleted, Modified

l Changes Count - Amount of changes made

l Type - Type of database component that was changed. For example, server or tablespace

Database Config Changes for rulesetReturns the database configuration changes in a table report. Report for Database configurationchanged rule. Uses data from the Database Server Status, Table Config, Database Params,Datafile Config, Index Config, Tablespace Status, Datafile Status, Database Server Params,Database Status, Database Server Config, Tablespace Config, Log File Status, Database Config,Log File Configuration data sources.

l Server - Name of the server

l Sub Name - Name of the Oracle instance

l Alert - Identifier of the alert

Database DetailsReturns database details in a table report. Uses data from the Database Config, Database Status,Datafile Config, Index Config, Table Config, Tablespace Config, and Partition Config data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 317

l Creation Date - Database creation date timestamp

l Status - Status of the database: Offline, Online, Restoring, Recovering, Recovery Pending,Suspect, Emergency

l Table Count - Total number of tables in the database

l Index Count - Total number of index tables in the database

l Tablespace Count - Total number of tablespaces in the database

l Datafile Count - Total number of datafiles in the database

l Num Partitions - Total number of partitions in the database

Database Details For ServerReturns database details for server in a table report. Uses data from the Database Config,Database Status, Datafile Config, Index Config, Table Config, Tablespace Config, and PartitionConfig data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Creation Date - Database creation date timestamp

l Status - Status of the database: Offline, Online, Restoring, Recovering, Recovery Pending,Suspect, Emergency

l Table Count - Total number of tables in the database

l Index Count - Total number of index tables in the database

l Tablespace Count - Total number of tablespaces in the database

l Datafile Count - Total number of datafiles in the database

l Num Partitions - Total number of partitions in the database

Database Last 10 ChangesReturns database last ten changes in a table report. Uses data from the Database Server Status,Table Config, Database Params, Datafile Config, Index Config, Tablespace Status, Datafile Status,Database Server Params, Database Status, Database Server Config, Tablespace Config, Log FileStatus, Database Config, Log File Configuration data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Type - Type of database component that was changed. For example, server or tablespace

l Object - Name of the database object that was changed

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp of the change

l Difference - Description of what changed if Modified was indicated

Reports by System Template

318 Dell EMC Data Protection Advisor Report Reference Guide

Database Parameter Change DetailsReturns database parameter change details in a table report. Uses data from the Database Paramsdata source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Value - Parameter value

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Database ParametersReturns database parameter details in a table report. Uses data from the Database Params datasource.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Parameter Name - Name of the parameter

l Value - Parameter value

Database Schema Details For ServerReturns database schema details for server in a table report. Uses data from the Index Config,Schema Config, and Table Config data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Count - Total number of tables in the tablespace

l Index Count - Number of indexes for the table

Database Server DetailsReturns database server details in a table report. Uses data from the Database Config, DatabaseServer Config, Database Server Status, and Schema Config data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Vendor - Name of the database vendor. For example, Oracle

l Product - Name of the database product. For example, PostgreSQL

l Version - Version of the database product

l Max Connections - Maximum number of simultaneous connections allowed

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 319

l Status - Status of the server: Started, Mounted, Open, Open Migrate

l Status Time - Time of the last status change

l Database Count - Total number of databases of that product and version

l Schema Count - Total number of schemas belonging to database of that product and version

Database Server Parameter Change DetailsReturns database server parameter change details in a table report. Uses data from the DatabaseServer Params data source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Name - Name of the parameter

l Value - Value of the parameter

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp of the change

Database Server ParametersReturns database server parameters in a table report. Uses data from the Database Server Paramsdata source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Name - Name of the parameter

l Value - Value of the parameter

Datafile Configuration Change DetailsReturns datafile configuration change details in a table report. Uses data from the Datafile Configdata source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

l Physical Name - Physical location (file system path) of the datafile

l Max Size - Maximum size of data store (in MB)

l Size Increment - Size by which the data store will grow (in MB)

l Percent Increment - Percentage by which the data store will grow

l Increment Type - Indicates if the data store will grow by incremental size or percentage

l Auto Increment - Indicates if the logfile is set to grow automatically

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp of the change

l Difference - Description of what changed if Modified was indicated

Reports by System Template

320 Dell EMC Data Protection Advisor Report Reference Guide

Datafile DetailsReturns datafile details in a table report. Uses data from the Datafile Config and Datafile Statusdata sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

l Physical Name - Physical location (file system path) of the datafile

l Max Size - Maximum size of data store (in MB)

l Size Increment - Size by which the data store will grow (in MB)

l Percent Increment - Percentage by which the data store will grow

l Increment Type - Indicates if the data store will grow by incremental size or percentage

l Auto Increment - Indicates if the logfile is set to grow automatically

l Size - Current size of the datafile (in MB)

l Size Used - Amount of space used in the datafile (in MB)

l State - Current state of datafile: Offline, Online, Recovery, Recovery Pending, Suspect,Defunct, System

Datafile Details for DatabaseReturns datafile details for database in a table report. Uses data from the Datafile Config andDatafile Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

l Physical Name - Physical location (file system path) of the datafile

l Size Increment - Size by which the data store will grow (in MB)

l Percent Increment - Percentage by which the data store will grow

l Increment Type - Indicates if the data store will grow by incremental size or percentage

l Size Used - Amount of space used in the datafile (in MB)

l Size - Current size of the datafile (in MB)

l Max Size - Maximum size of data store (in MB)

l Auto Increment - Indicates if the logfile is set to grow automatically

l State - Current state of datafile: Offline, Online, Recovery, Recovery Pending, Suspect,Defunct, System

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 321

Datafile Details for TablespaceReturns datafile details for tablespace in a table report. Uses data from the Datafile Config andDatafile Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

l Physical Name - Physical location (file system path) of the datafile

l Size Increment - Size by which the data store will grow (in MB)

l Percent Increment - Percentage by which the data store will grow

l Increment Type - Indicates if the data store will grow by incremental size or percentage

l Size Used - Amount of space used in the datafile (in MB)

l Size - Current size of the datafile (in MB)

l Max Size - Maximum size of data store (in MB)

l Auto Increment - Indicates if the logfile is set to grow automatically

l State - Current state of datafile: Offline, Online, Recovery, Recovery Pending, Suspect,Defunct, System

Datafile UtilizationReturns the logical and actual utilization of datafile storage space in a table report. Uses data fromthe Datafile Config and Datafile Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

l Size - Current size of the datafile (in MB)

l Size Used - Amount of space used in the datafile (in MB)

l Current Utilization - Current usage of the datafile (as a percentage) (SQL Server and Oracleonly)

l Max Size - Maximum size of data store (in MB)

l Logical Utilization - Logical usage of the datafile as a percentage of the maximum permitteddatafile size (Oracle only)

Datafile Utilization Trend ChartReturns the logical and actual utilization trend of datafile storage space in a line chart. Uses datafrom the Datafile Config and Datafile Status data sources.

l Server - Name of the server that hosts the database

Reports by System Template

322 Dell EMC Data Protection Advisor Report Reference Guide

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

l Current Utilization - Current usage of the datafile (as a percentage) (SQL Server and Oracleonly)

l Logical Utilization - Logical usage of the datafile as a percentage of the maximum permitteddatafile size (Oracle only)

Datafile Utilization for TablespaceReturns the logical and actual utilization trend of datafile storage space in a table report. Uses datafrom the Datafile Config and Datafile Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Datafile Name - Name of the datafile

l Size - Current size of the datafile (in MB)

l Size Used - Amount of space used in the datafile (in MB)

l Current Utilization - Current usage of the datafile (as a percentage) (SQL Server and Oracleonly)

l Max Size - Maximum size of data store (in MB)

l Logical Utilization - Logical usage of the datafile as a percentage of the maximum permitteddatafile size (Oracle only)

Index Configuration Change DetailsReturns index configuration change details in a table report. Uses data from the Index Config datasource.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Index Name - Name of the table Index

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Change - Type of change: Added, Deleted, Modified

l Noted - Timestamp of the change

l Difference - Description of what changed if Modified was indicated

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 323

Index Details For DatabaseReturns index details for database in a table report. Uses data from the Index Config and IndexStatus data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Index Name - Name of the table Index

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Size - Total size of data held in index (in MB)

Index Details For SchemaReturns index details for schema in a table report. Uses data from the Index Config and IndexStatus data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Index Name - Name of the table Index

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Size - Total size of data held in index (in MB)

Index Details For TablespaceReturns index details for tablespace in a table report. Uses data from the Index Config and IndexStatus data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Index Name - Name of the table Index

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Size - Total size of data held in index (in MB)

Reports by System Template

324 Dell EMC Data Protection Advisor Report Reference Guide

Index Details for TableReturns index details for table in a table report. Uses data from the Index Config and Index Statusdata sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Index Name - Name of the table Index

l Index Size - Total size of the table index

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

Logfile Configuration Change DetailsReturns logfile configuration change details in a table report. Uses data from the Log FileConfiguration data source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Logfile Name - Name of the log file

l Group Number - Group number associated with the log file (Oracle only)

l Physical Name - Path and filename of the log file

l Creation Time - Database creation time

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Logfile DetailsReturns log file details in a table report. Uses data from the Log File Configuration and Log FileStatus data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Logfile Name - Name of the log file

l Group Number - Group number associated with the log file (Oracle only)

l Physical Name - Path and filename of the log file

l Creation Time - Database creation time

l Size - Maximum size of log file (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 325

l Size Used - Amount of space used in the log file (in MB)

l State - Status of the logfile: Offline, Online, Recovering, Recovery Pending, Suspect, Defunct,System, Active, Inactive, Unused, Current, Clearing, Clearing Current, Invalidated

Partition Details for DatabaseReturns partition details for database in a table report. Uses data from the Partition Config datasource.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Name - Name of the partition

l Table Name - Name of the database table

l Index Name - Name of the table index

l Tablespace Name - Name of the tablespace

Partition Details for IndexReturns partition details for index in a table report. Uses data from the Partition Config datasource.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Name - Name of the partition

l Table Name - Name of the database table

l Index Name - Name of the table index

l Tablespace Name - Name of the tablespace

Partition Details for TableReturns partition details for table in a table report. Uses data from the Partition Config datasource.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Name - Name of the partition

l Table Name - Name of the database table

l Index Name - Name of the table Index

l Tablespace Name - Name of the tablespace

Reports by System Template

326 Dell EMC Data Protection Advisor Report Reference Guide

Table Configuration Change DetailsReturns table configuration change details in a table report. Uses data from the Table Config datasource.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Table Details for DatabaseReturns table details for database in a table report. Uses data from the Index Config, Index Status,Table Config, and Table Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Name - Name of database table

l Table Size - Total size of data in the table (in MB)

l Number Rows - Total rows in the table

l Is Partitioned - Indicates if this table is partitioned

l Tablespace Name - Name of the tablespace

l Index Size - Total size of data held in index (in MB)

l Index Count - Number of indexes for the table

l Total Size - Total size of the table and index (in MB)

Table Details for SchemaReturns table details for schema in a table report. Uses data from the Index Config, Index Status,Table Config, and Table Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Name - Name of the database table

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 327

l Table Size - Total size of data in the table (in MB)

l Number Rows - Total rows in the table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Index Size - Total size of data held in index (in MB)

l Index Count - Number of indexes for the table

l Total Size - Total size of the table and index (in MB)

Table Details for TablespaceReturns table details for tablespace in a table report. Uses data from the Index Config, IndexStatus, Table Config, and Table Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Name - Name of the database table

l Is Partitioned - Indicates if this table is partitioned

l TableSpace Name - Name of the tablespace

l Number Rows - Total rows in the table

l Table Size - Total size of data in the table (in MB)

l Index Count - Number of indexes for the table

l Index Size - Total size of data held in index (in MB)

l Total Size - Total size of the table and index (in MB)

Tablespace Configuration Change DetailsReturns tablespace configuration change details in table report. Uses data from the TablespaceConfig and Tablespace Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Type - Type of tablespace: Undo, Temporary, Permanent

l State - Current state of the tablespace: Offline, Online, Read Only

l Change - Type of change: Added, Deleted, Modified

l Difference - Description of what changed if Modified was indicated

l Noted - Timestamp of the change

Reports by System Template

328 Dell EMC Data Protection Advisor Report Reference Guide

Tablespace DetailsReturns tablespace details in a table report. Uses data from the Datafile Config, Datafile Status,Index Config, Table Config, Tablespace Config, and Tablespace Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l TableSpace Name - Name of the tablespace

l Type - Type of tablespace: Undo, Temporary, Permanent

l State - Current state of the tablespace: Offline, Online, Read Only

l Is Read Only - Indicates whether the tablespace is read only

l Table Count - Total number of tables in the tablespace

l Index Count - Number of indexes for the table

l Datafile Count - Total number of datafiles in the tablespace

l Datafile Size - Total size of datafiles in the tablespace (in MB)

l Datafile Size Used - Total size used in datafiles in the tablespace (in MB)

Tablespace Details for DatabaseReturns tablespace for database details in a table report. Uses data from the Datafile Config,Datafile Status, Index Config, Table Config, Tablespace Config, and Tablespace Status datasources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Tablespace Name - Name of the tablespace

l Type - Type of tablespace: Undo, Temporary, Permanent

l State - Current state of the tablespace: Offline, Online, Read Only

l Is Read Only - Indicates whether the tablespace is read only

l Table Count - Total number of tables in the tablespace

l Index Count - Number of indexes for the table

l Datafile Count - Total number of datafiles in the tablespace

l Datafile Size - Total size of datafiles in the tablespace (in MB)

l Datafile Size Used - Total size used in datafiles in the tablespace (in MB)

Tablespace UtilizationReturns tablespace utilization details in a table report. Uses data from the Datafile Config andDatafile Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 329

l Tablespace Name - Name of the tablespace

l Size - Current size of the datafile (in MB)

l Size Used - Amount of space used in the datafile (in MB)

l Current Utilization - Current usage of the datafile (as a percentage) (SQL Server and Oracleonly)

l Max Size - Maximum size of data store (in MB)

l Logical Utilization - Logical usage of the datafile as a percentage of the maximum permitteddatafile size (Oracle only)

Top 10 Growing Tables by RowsReturns the top ten growing tables by rows in a table report. Uses data from the Table Status datasource.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Name - Name of the database table

l Number Rows After - Number of rows in the table at the start of the time period

l Number Rows Before - Number of rows in the table at the end of the time period

l Num Rows Grown By - Percentage increase in number of rows

Top 10 Largest Database Tables By Row CountReturns the top ten largest database tables by row count in a table report. Uses data from theTable Status data source.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Name - Name of the database table

l Number Rows - Total number of rows in table

Top 10 Largest Database Tables By SizeReturns the top ten database tables by size in a table report. Uses data from the Index Config,Index Status, Table Config, and Table Status data sources.

l Server - Name of the server that hosts the database

l Sub Name - Instance name

l Database Name - Name of the database

l Schema Name - Name of the schema

l Table Name - Name of the database table

l Number Rows - Total number of rows in table

Reports by System Template

330 Dell EMC Data Protection Advisor Report Reference Guide

l Table Size - Total size of the table

l Index Size - Total size of the table index (in MB)

l Total Size - Total size of the table and index (in MB)

DPA system templatesThe following are descriptions of system templates in DPA:

Agent ErrorsReturns information about errors that have occurred on the agent in a table report. Uses data fromthe Request History data source.

l Module - Name of the module that generated the error

l Error Message - String describing the error

l Agent - Hostname or IP Address of the DPA Data Collection Agent that is gathering the data

l Function - Name of the function that generated the error

l Target - Name of the target machine monitored

l Count - Number of times the error occurred

l First Occurrence - First time the error occurred

l Last Occurrence - Last time the error occurred

Agent Reports Processing RateReturns on processing rate of messages for the period in bytes per second of the processedreports from agent for the period in a line chart. Uses data from the Request Statistic data source.

l Processing rate - processing rate of messages for the period in bytes per second

DPA Client License Details for rulesetReturns DPA client license details in a table report. Report for Running out of backup clientlicenses rule. Uses data from the DPA Enabler Activity, License Configuration, and User Input datasources.

l Alert - Identifier of the alert

DPA Collector LogReturns information about messages that have been logged by the collector process in a tablereport. Uses data from the Process Log data source.

l Server - Name of the server that is running the agent: DPA

l Level - Severity of message: Fatal, Warn, Error, Info, Debug, Debug low, Trace

l Host Name - Name of the host from which the message was generated

l Process - Server process that generated the message: controller, reporter, listener, publisher,ae (analysis engine), webapp, agent, gui, tool, installer

l Process Id - Identifier of the process that generated the message

l Thread Id - Identifier of the thread from which the message generated

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 331

l Context - Any additional information about the message source

l Location - Code location that was the source of the error message (for C this is the modulename, for Java this is the class name)

l Function - Function in the code that was the source of the error message (relative to theLocation field)

l Message - First 2000 characters of the message

l Timestamp - Timestamp of the message

DPA Database Export HistoryProvides DPA Database export history details in a table. Uses data from the Database ExportStatistics data source.

l Export Command - Export command

l Export Command Output - Output of the export command

l Export Files Path - Path of export files

l Export Size - Total size of export files in bytes

l Start Time - Time the export started

l End Time - Time the export finished

l Status - Status of the export: started, success, failed, terminated

DPA Listener QueuesReturns DPA server queue size over time in a line chart. Uses data from the DPA Metrics datasource.

l Server - Name of the Server running the agent: DPA

l Metric -

l Count -

DPA Server LogsReturns information about messages that have been logged by the DPA server process in a tablereport. Uses data from the Process Log data source.

l Server - Name of the Server running the agent: DPA

l Level - Severity of message: Fatal, Warn, Error, Info, Debug, Debug low, Trace

l Host Name - Name of the host from which the message was generated

l Process - Server process that generated the message: controller, reporter, listener, publisher,ae (analysis engine), webapp, agent, gui, tool, installer

l Process Id - Identifier of the process that generated the message

l Thread Id - Identifier of the thread from which the message generated

l Context - Any additional information about the message source

l Location - Code location that was the source of the error message (for C this is the modulename, for Java this is the class name)

l Function - Function in the code that was the source of the error message (relative to theLocation field)

Reports by System Template

332 Dell EMC Data Protection Advisor Report Reference Guide

l Message - First 2000 characters of the message

l Timestamp - Timestamp of the message

HTTP Request Performance StatisticsReturns HTTP request performance statistics in a table report. Uses data from the HTTP RequestPerformance Statistics data source.

l Server - Name of the Server running the agent: DPA

l Client Host -

l Request Method -

l Response Code -

l Time Taken in Milliseconds -

l URL -

l Request ID -

l Start Time -

l End Time -

Listener PerformanceReturns listener performance details in a table report. Uses data from the Listener Status datasource.

l Server - Name of the server on which the listener is installed

l Queue Length - Length of the queue inside the Listener

l Queries - Number of database queries performed (/second

l Preprocessing Errors - Number of errors the listener encountered while parsing data receivedfrom Data Collection Agents

l Processing Errors - Number of SQL errors the listener encountered while inserting data intothe database

l Listener Busy Errors - TNumber of times the listener has sent a busy message back to a DataCollection Agent to tell it that it has reached the Listener’s maximum queue size

Node ListReturns a list of objects in a table report. Uses data from the Node Details data source.

l Node - Name of the object

Node TopologyReturns object topology details in a topology report. Uses data from the Node Topology Reportdatasource.

l Source - Source name

l Name -

l Parameters - Parameters names

l Target - Target name

l Node - Node name

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 333

l Type - Type of array

l Label - Name of the field returned

l ReportObject -

l ToolTip -

l Group - Name of the group

Objects with Replication ExposuresReturns objects with replication alerts in a table report. Uses data from the Objects withReplication Exposures data source.

l Node Name - Name of the object

l Number of replication alerts - Number of replication alerts

Processed Agent ReportReturns performance quantity and the size of the processed reports from agent for the period in aline chart. Uses data from the Request Statistic data source.

l Processed count - The quantity of the messages processed from the agent for the period

l Processed size - The amount in bytes of all messages processed from the agent for the period

Publisher PerformanceReturns details about the number of reports scheduled and running on the DPA server in a columnchart. Uses data from the Publisher Status data source.

l Server - Server on which the scheduled reports are running

l Running - Number of scheduled reports that are currently running

l Waiting - Number of scheduled reports that are queued to run

l Assigned - Number of scheduled reports that are assigned to run

Received Agent ReportReturns performance quantity and the size of the received reports from agent for the period in aline chart. Uses data from the Request Statistic data source.

l Received count - The quantity of the messages received from the agent for the period

l Received size - The amount in bytes of all messages received from the agent for the period

Replication Alerts by Age by GroupReturns alerts exposure by age by group in a table report. Uses data from the Replication Alerts byGroup by Age data source.

l Group Name - Name of the group

l Over 3 Weeks - Alerts over three weeks old

l 1-3 Weeks - Alerts one to three weeks old

l 1-6 days - Alerts one to six days old

Reports by System Template

334 Dell EMC Data Protection Advisor Report Reference Guide

Replication Alerts by GroupReturns alerts by group in a table report. Uses data from the Replication Alerts by Group datasource.

l Group Name - Name of the group

l Critical Alerts - List of critical alerts

l Other Alerts - List non-critical alerts

Report HistoryReturns details about reports that have been run from the Analysis Engine and the Publisher in atable report. Uses data from the Report History data source.

l Id - Unique identifier for the report

l Server - Server on which the report was run

l Report - Name of the report or control panel

l User - Name of the user that ran the report

l Object - Name of the objects that the report was ran against

l Status - Indicates whether the report was successful

l Period - Duration of the time window selected for the report (in seconds)

l Total Time - Total time that the report took to run

l Datasource Time - Total time that was spent processing data sources (in seconds)

l Num Datasource Values - Total number of rows and fields returned from all data sources)

l Num Result Values - Total number of rows and fields returned from the report after processingby any operators

l Start Time - Time the report started

l End Time - Time the report finished

l Run Origin - Identifies the origin

Request HistoryReturns details about requests that have run for an object in a table report. Uses data from theRequest History data source.

l Module - Name of the module that is performing the data collection. For example, EMCRecoverPoint

l Error Message - Messages associated with request

l Agent - Hostname or IP Address of the DPA Data Collection Agent that is gathering the data

l End Time - Time the request completed

l Start Time - Time the request started

l Function - Name of the function that is performing the data collection

l Target - Name of the target machine monitored

l Status - Status of the last run of the request

l Run ID - An internal field for replication analysis

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 335

l Report Size - Size of the report returned

Scheduled Report HistoryReturns details of scheduled reports that have been run from the Publisher in a table report. Usesdata from the Report History and Scheduled Report Forecast data sources.

l Server - Server on which the scheduled reports were run

l Report Name - Name of the report or control panel used by the scheduled report

l Scheduler Start Time - Time that the scheduled report is expected to run

l Object - Name of the object that the report will be ran against

l User - Name of the user that ran the report

l Status - Indicates whether the report was successful

l Total Time - Total time that the report took to run

l Start Time - Time the report started

l End Time - Time the report finished

Unsupported AgentsReturns information on unsupported DPA Data Collection Agents in a table. Uses data from theAgent Configuration data source.

l Agent Name - Name of the DPA data collection agent

l Version - Version of the agent

Licensing system templatesLicensing reports display information on the licenses configured on the backup servers.

Expired Licenses for rulesetReturns expired license details in a table report. Report for Expired Licenses rule. Uses data fromthe License Configuration data source.

l Node - Name of the object

l Sub Name - Name of TSM server instance

l Alert - Identifier of the alert

License ConformanceReturns license conformance details in a table report. Uses data from the License Conformancedata source.

l Node - Name of the object

l Sub Name - Name of TSM server instance

l License Name - Name of the license

l Num Licensed - Number of licenses bought

l Num Used - Number of licenses used

Reports by System Template

336 Dell EMC Data Protection Advisor Report Reference Guide

l Conformance - Conformance rating percentage

l Notes - License notes

License DetailsReturns the total and used number of DPA client and capacity type licenses in a table report. Usesdata from the License Configuration data source.

l Node - Name of the object

l Sub Name - Name of TSM server instance

l Product - Product on which the license acts

l Identifier - Text which identifies the license function

l Code - Internal code which identifies the license function

l Instance - Instance of this license on this object

l Tier - Tier to which this license applies, if any

l Platform - Platform to which this license is restricted, if any

l Description - Informative description of the license function

l Instances - How many instances of the function is provided by this license

l Valid - Indicates if the license is currently valid

l Expires - Indicates when this license expires, if ever

License Details - ExpiredReturns the licenses that have expired details in a table report. Uses data from the LicenseConfiguration data source.

l Node - Name of the object

l Sub Name - Name of TSM server instance

l Product - Product on which the license acts

l Identifier - Text which identifies the license function

l Code - Internal code which identifies the license function

l Instance - Instance of this license on this object

l Tier - Tier to which this license applies, if any

l Platform - Platform to which this license is restricted, if any

l Description - Informative description of the license function

l Instances - How many instances of the function is provided by this license

l Valid - Indicates if the license is currently valid

l Expires - Indicates when this license expires, if ever

License SummarySummary of the licenses configured in a table report. Uses data from the License Configurationdata source.

l Identifier - Text which identifies the license function

l Instances - How many instances of the function is provided by this license

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 337

License UsageReport returns the capacity usage per backup server for Avamar and NetWorker. Uses data fromthe License Usage data source.

l Server - Name of the backup server

l Usage - Capacity usage (in TB)

Nearly Expired Licenses for rulesetReturns nearly expired licenses in a table report. Report for Licenses Nearing Expiration rule. Usesdata from the License Configuration, Report Times, and User Input data sources.

l Node - Name of the object

l Alert - Identifier of the alert

Media management system templatesMedia Management reports display information on the media configured on the backup application.

The two types of Media Management reports include:

l Overviews, which are high level reports that summarize media utilization.

l Detailed Media reports, which are detailed reports about individual volumes.

For more specific details on the various reports, select one of the reports described in thefollowing sections.

Backup Device Number Of Volumes Mounted By DeviceReturns the number of volumes mounted on each device in a column chart. Uses data from theNumber of Volumes by Device data source.

l Device Host - Host to which the backup device is assigned

l Device Name - Name of the backup device

l Number of Volumes - Number of volumes that have been mounted in the device over thespecified period

Backup Device Number Of Volumes Mounted By NodeReturns the number of volumes mounted on each object in a column chart. Uses data from theNumber of Volumes by Device data source.

l Device Host - Host to which the backup device is assigned

l Number of Volumes - Number of volumes that have been mounted in the device over thespecified period

Backup Device Number Of Volumes Mounted Daily By DeviceReturns the number of volumes mounted each day on each device in a column chart. Uses datafrom the Number of Volumes by Device data source.

l Device Host - Host to which the backup device is assigned

l Device Name - Name of the backup device

Reports by System Template

338 Dell EMC Data Protection Advisor Report Reference Guide

l Number of Volumes - Number of volumes that have been mounted in the device over thespecified period

Backup Jukebox Number Of Volumes Mounted DailyReturns the number of volumes mounted each day on each jukebox in a column chart. Uses datafrom the Number of Volumes by Jukebox data source.

l Jukebox - Name of the jukebox

l Number of Volumes - Number of volumes that have been mounted in the jukebox over thespecified period

Empty Media By JukeboxReturns empty media by jukebox details in a table report. Uses data from the Media Count ByLocation data source.

l Server - Name of the backup server

l Jukebox - Name of the jukebox in which the media is located

l Media Count - Total number of volumes configured on each backup server

Empty Media By Jukebox RAGReturns empty media by jukebox Red, Amber, Green (RAG) traffic-light style report in a healthstatus chart. Uses data from the Media Count By Location data source.

l Server - Name of the backup server

l Media Count - Total number of volumes configured on each backup server

Empty Media by Pool and JukeboxReturns empty media by pool and jukebox details in a table report. Uses data from the MediaCount By Pool and Location data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l Pool - Pool to which the volume belongs

l Media Count - Total number of volumes configured on each backup server

Media Age DistributionReturns all the media configured on a backup server in a column chart. It identifies how old eachtape is based on the last time to which the tape was written. Uses data from the Media Detailsdata source.

l Range -

l Items -

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 339

Media ContentsReturns the contents of jobs on a tape in a table report. Uses data from the Media Contents datasource.

l Id - Unique identifier for a backup Job stored on the volume

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of the TSM server instance

l Media Server - Name of the Media Server to which the Job was backed up

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Policy - Name of the protection policy

l Job - Name of the Job backed up

l Status - Status of the Job backed up: Success, Failed

l Err Code - Error code from the backup application, if available

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Queue Start - Time the Job started queuing

l Files Scanned - Number of files scanned. This value is not available from all backup applications

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Expiry Date - Date that a Job will expire

Media CountReturns the total number of volumes configured on each backup server in a column chart. Usesdata from the Media Count data source.

l Media Count - Total number of volumes configured on each backup server

Media Count Available Volumes By JukeboxReturns media count available volumes by jukebox in a column chart. Uses data from the MediaCount By Location and Media Count By State and Location data sources.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

Reports by System Template

340 Dell EMC Data Protection Advisor Report Reference Guide

l Jukebox - Name of the jukebox in which the media is located

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count By Jukebox and StateReturns media count by jukebox and state in a column chart. Uses data from the Media Count ByState and Location data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count By PoolReturns the number of volumes managed by the backup servers selected broken down by poolover time in a column chart. Uses data from the Media Count By Pool data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Pool - Name of the pool to which the volume belongs

l Media Count - Total number of volumes configured on each backup server

Media Count By Pool and StateReturns the number of volumes in a specific state in each individual pool trended over time in acolumn chart. Uses data from the Media Count By Pool and State data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Pool - Name of the pool to which the volume belongs

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count By Pool and State for rulesetReturns the media count by pool and state in a table report. Report for Empty tapes running lowrule. Uses data from the Media Count By Pool and State and User Input data sources.

l Server - Name of the backup server

l Alert - Identifier of the alert

Media Count By ServerReturns the media count by server in a column chart. Uses data from the Media Count datasource.

l Server - Name of the backup server

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 341

l Sub Name - Name of TSM server instance

l Media Count - Total number of volumes configured on each backup server

Media Count By StateReturns the number of volumes managed by the backup servers calculated by state over time in acolumn chart. Uses data from the Media Count By State data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count of Offline Expired VolumesReturns the total number of expired volumes that are offline in a column chart. This report enablesbringing them back from offline for reuse. Uses data from the Media Count data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Media Count - Total number of volumes configured on each backup server

Media Count of Online/Offline VolumesReturns media count of online and offline volumes in a column chart. Uses data from the MediaCount data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l State - State of the media: Empty, Partial, Full, Frozen, Suspended, Pending

l Media Count - Total number of volumes configured on each backup server

Media Count Volumes Used By JukeboxReturns the total number of volumes used in each jukebox over the reporting period to enableplanning future tape usage based on historical usage in a column chart. Uses data from the MediaCount By Location data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Jukebox - Name of the jukebox in which the media is located

l Media Count - Total number of volumes configured on each backup server

Media DetailsReturns details of all voumes on a server in a table report. Uses data from the Media Details datasource.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

Reports by System Template

342 Dell EMC Data Protection Advisor Report Reference Guide

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage) (TSMonly)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE, OFFSITE,DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

l Encryption Manager - The name of the encryption key manager (TSM only)

l Encrypted - Whether the volume is encrypted or not (TSM only)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 343

Media Details For Cleaning TapesReturns details of all cleaning tapes on a server in a table report. Uses data from the Media Detailsdata source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage) (TSMonly)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

Reports by System Template

344 Dell EMC Data Protection Advisor Report Reference Guide

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE, OFFSITE,DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Empty VolumesReturns details of all empty volumes on a server in a table report. Uses data from the Media Detailsdata source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage) (TSMonly)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 345

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE, OFFSITE,DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Frozen VolumesReturns details of all frozen volumes on a server in a table report. Uses data from the Media Detailsdata source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage) (TSMonly)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

Reports by System Template

346 Dell EMC Data Protection Advisor Report Reference Guide

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE, OFFSITE,DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Full VolumesReturns details of all volumes that are full in a table report. Uses data from the Media Details datasource.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage) (TSMonly)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 347

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE, OFFSITE,DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Offline Expired VolumesReturns details of all offline volumes that have expired in a table report. Uses data from the MediaDetails data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage) (TSMonly)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

Reports by System Template

348 Dell EMC Data Protection Advisor Report Reference Guide

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE, OFFSITE,DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details for Offline VolumesReturns details of all volumes that are not online in table reports. Uses data from the Media Detailsdata source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage) (TSMonly)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 349

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE, OFFSITE,DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Online VolumesReturns details of all volumes that are online in a table report. Uses data from the Media Detailsdata source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage) (TSMonly)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

Reports by System Template

350 Dell EMC Data Protection Advisor Report Reference Guide

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE, OFFSITE,DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Partial VolumesReturns details of all partially full volumes in a table report. Uses data from the Media Details datasource.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 351

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage) (TSMonly)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE, OFFSITE,DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details For Used VolumesReturns information on all tapes that have been written to during the reporting period in a tablereport. Uses data from the Media Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

Reports by System Template

352 Dell EMC Data Protection Advisor Report Reference Guide

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage) (TSMonly)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE, OFFSITE,DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 353

Media Details of Available VolumesReturns information on all tapes that are either Empty or Partially Full or that have expired and areavailable for reuse in a table report. Uses data from the Media Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage) (TSMonly)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

Reports by System Template

354 Dell EMC Data Protection Advisor Report Reference Guide

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE, OFFSITE,DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details Top 10 Oldest VolumesReturns media details top ten oldest volumes in a table report. Uses data from the Media Detailsdata source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage) (TSMonly)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 355

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE, OFFSITE,DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

Media Details With Retention Over 8 YearsReturns media details with retention greater than or equal to eight years in a table report. Usesdata from the Media Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Volume Group - Group to which the volume belongs

l State - State of the volume: Used, Full, Partial, Frozen

l Pool - Pool the in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

l Pct Reclaimable - Amount of data on the volume that is reclaimable (as a percentage) (TSMonly)

l Online - Indicates if the volume is online

l Jukebox - Name of the jukebox in which the volume is located

l Slot - Slot in the jukebox in which the tape is located

l Retention Period - Retention period of the volume (in seconds)

l First Labelled - First time that a volume was labelled

l First Written - Time at which the volume was first written

l Last Written - Last time at which the volume was written

l Expiry Flag - Indicates if the volume has expired

l Expiry Date - Date the volume is due to expire

l Num Mounts - Number of times the volume has been mounted in a device

l Num Relabelled - Number of times the volume has been relabelled

l Cleanings Left - For cleaning tapes, number of cleanings that are left

l Barcode - Barcode of the volume

l Cartridge Type - Type of cartridge tape

l Capacity - Estimated capacity of the tape (in MB)

l Owner - Server that owns the volume

l Created - Date and time that the volume was created

l Assigned - Date and time that the volume was assigned

Reports by System Template

356 Dell EMC Data Protection Advisor Report Reference Guide

l First Mount - Time that the volume was first mounted

l Last Mount - Time that the volume was last mounted

l Status - Status of the volume

l Vault Name - Name of the NetBackup vault the volume is in

l Vault Sent Date - Date the volume was sent to the vault

l Vault Return Date - Data the volume is to be returned from the vault

l Vault Slot - Slot the volume occupies in the vault

l Vault Session - Vault session ID

l Number Write Errors - Number of write errors

l Number Read Errors - Number of read errors

l Access - Access mode for the volume: READWRITE, READONLY, UNAVAILABLE, OFFSITE,DESTROYED

l Condition - Condition of the volume: good, fair, poor (HP Data Protector only)

l Encryption Manager - The name of the encryption key manager (TSM only)

l Encrypted - Whether the volume is encrypted or not (TSM only)

Media Retention DistributionReturns media retention distribution, when retention data is available, in a column chart, Uses datafrom the Media Details data source.

l Range -

l Items -

Media Size DistributionReturns distribution of how much media is stored on each tape in a column chart. Uses data fromthe Media Details data source.

l Range Volumes -

Media SummaryReturns the number of volumes and usage broken by several statistics in a table report. Uses datafrom the Media Count and Media Usage data sources.

l Media Count - Total number of volumes configured on each backup server

l Media Usage - Total amount of data stored on all media (in MB)

Media UsageReturns the amount of data that is stored on media in a column chart. Uses data from the MediaUsage data source.

l Media Usage - Total amount of data stored on all media (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 357

Media Usage By PoolReturn the total amount of data stored on media calculated by pool in a line chart. Uses data fromthe Media Details data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Pool - Pool in which the volume is located

l Used - Amount of data that has been written to volume (in MB)

Media Usage By ServerReturn the total amount of data stored on media calculated by server in a column chart. Uses datafrom the Media Usage data source.

l Server - Name of the backup server

l Sub Name - Name of TSM server instance

l Media Usage - Total amount of data stored on all media (in MB)

Media Reclamation DistributionReturns media reclamation distribution details in a column chart. Uses data from the Media Detailsdata source.

l Range -

l Items -

RPO Violation DetailsReturns RPO violation details in a table. Uses data from the RPO Violation Details data source.

l Recover point name -

l CG copy name -

l Policy name -

l Description -

l Severity -

l Category -

Root CauseReturns root cause for protection processes errors in a table. Uses data from the Root CauseReport data source.

l Root Cause - Name of the event that exists on the object in the data path. For example,Backup agent is down on backup client

l Object (Type) - Name of the object where the event exists

l #Affected Objects - Number of objects the event affected in the duration of the failed backupjob

l #Affected Alerts - Number of times the event occurred in the duration of the failed backup job

Reports by System Template

358 Dell EMC Data Protection Advisor Report Reference Guide

l First Occurrence - First time the event occurred in the duration of the failed backup job

l Last Occurrence - Last time the event occurred in the duration of the failed backup job

Root Cause for CG DetailsReturns root cause consistency group error details in a table. Uses data from the Root Cause ForCG Details data source.

l Server - Name of the RecoverPoint management server

l CG - Name of consistency group

l Source Site - Name of the source site/cluster of the replication

l Source CG Copy - Name of the source CG copy of the replication

l Target Site - Name of the target site/cluster of the replication

l Target CG Copy - Name of the target CG copy of the replication

l Replication Type - Type of replication technology

l Replication State - State of the replication

l Peak Time Lag - Peak time lag in replication of the copy over the last polling period

l Required RPO - RPO defined in the data protection policy for the protected object

Root Cause for Job DetailsReturns root cause for job error details in a table. Uses data from the Root Cause For Job Detailsdata source.

l Job Name - Name of the job

l Group - Name of the group in which the job occurred

l Client - Name of the client on which the job took place

l Status - Status of the job: Success, Failed

l Started - Time the job started writing

l Finished - Time the job completed

l Error Code - Error code associated with the job

TSM DR MediaReturns TSM disaster recovery media details in a table report. Uses data from the TSM DisasterRecovery Media data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Volume Id - Identifier for the volume

l Location - Location of the host, if any

l State - State of the media: MOUNTABLE, NOTMOUNTABLE, COURIER, VAULT,VAULTRETRIEVE, COURIERRETRIEVE, REMOTE

l Pool - Pool in which the volume is located

l Library Name - Name of the library in which the volume is located

l Volume Type - Type of volume

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 359

l Last Update - Date the volume was last updated

Volume Expiration ReportReturns a distribution report showing when media is expected to expire in a column chart. Usesdata from the Media Details data source.

l Count - Number of volumes due to expire

l

Operations system templates

Backup Device AvailabilityReturns backup device availability details in a table report. Uses data from the Backup DeviceStatus data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Host - Name of the host to which the device is attached

l Total - Amount of backup devices

l Up -

l Available - Backup devices that are available

Backup Device Availability By ServerReturns backup device availability by server in a column chart. Uses data from the Backup DeviceStatus data source.

l Server - Name of the backup server

l Status - Status of the drive: Up, Down, Service

l Value -

Backup Device Availability RAGReturns backup device availability Red, Amber, Green (RAG) traffic-light style report in a tablereport. Uses data from the Backup Device Status data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Available - Backup devices that are available

Backup Mount RequestsReturns any mounts for which a device is waiting in a table report. Uses data from the BackupPending Mounts data source.

l Server - Name of the backup server for the outstanding request

l Type - Indicates if the tape is required for backup or restore

l Volume - Volume label of the tape required, if known

Reports by System Template

360 Dell EMC Data Protection Advisor Report Reference Guide

l Pool - Pool of the volume that is required

l Number Outstanding - Number of tapes that are being waited on

l Since - Amount of time that the server has been waiting for the tapes

l Severity - Severity of the failure

Empty Media plus Device AvailabilityReturns empty media plus device availability in a table report. Uses data from the Backup DeviceStatus and Media Count By Location data sources.

l Server - Name of the backup server

l Available - Available devices

l Empty Media - Empty media

Performance system templatesPerformance reports provide you with information to analyze the performance of backup clientsand devices. There are two types of performance reports:

l Backup Client Performance

l Device Performance

Rather than just success or failure, the DPA user now has the time to look for largest clients,slowest clients, most unreliable clients and make efforts to identify and address any issues.

A list of the slowest clients within a backup environment is key to improving the overall efficiencyof the backup system. By focusing on the slowest backup clients in a large backup environmentthe overall throughput of the system can be raised significantly, often with no extra purchasesbeyond some minor infrastructure upgrades. It can act as a targeted work list for a backup systemadministrator to fix problems and suggest upgrades; improving the backup system in the most costeffective manner.

Aggregate Disk ActivityReturns information on disk drive activity in a line chart. Uses data from the Disk Activity datasource.

l Busy - Average activity level for the disks (as a percentage)

Aggregate Disk OperationsReturns information on aggregate disk operations in a line chart. Uses data from the DiskPerformance data source.

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

l Sectors Read - Number of sectors read

l Sectors Written - Number of sectors written to

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 361

Aggregate Disk PerformanceReturns information on disk drive performance in a line chart. Uses data from the DiskPerformance data source.

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Bytes Transferred - Number of kilobytes transferred from disk

Aggregate Fibre Channel Device PerformanceReturns information on Fibre Channel device performance in a line chart. Uses data from the FibreChannel Device Performance From Switch data source.

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

Aggregate Fibre Channel Port PerformanceReturns information on Fibre Channel performance in a line chart. Uses data from the FibreChannel Performance data source.

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

l Frame In - Number of frames received (1000s/second)

l Frames Out - Number of frames sent (1000s/second)

Aggregate LUN PerformanceReturns performance information for all LUNs in a line chart. Uses data from the LUN Performancedata source.

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

Aggregate Processor UtilizationReturns information on the average CPU utilization for a group of hosts in a line chart. Uses datafrom the Processor Utilization data source.

l Processor Utilization - Utilization on the processor (as a percentage)

Aggregate Tape Drive PerformanceReturns information on tape drive performance in a line chart. Uses data from the Tape DrivePerformance data source.

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Total Throughput - Data throughput for reads and writes (KB/second)

Reports by System Template

362 Dell EMC Data Protection Advisor Report Reference Guide

Aggregate Tape Library Drive PerformanceReturns information on tape drive performance broken down by switch in a line chart. Uses datafrom the Tape Drive Performance From Switch data source.

l Data Out - Data out of the switch (KB/second)

Aggregate Virtual Fibre Channel Port PerformanceReturns the virtual Fibre Channel port performance in line chart. Uses data from the Fibre ChannelPerformance data source.

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

l Frame In - Number of frames received (1000s/second)

l Frames Out - Number of frames sent (1000s/second)

Backup Client Performance DistributionReturns the average spread of client performance across all clients in a column chart. Uses datafrom the Backup Job Details data source.

l Range -

l Items -

Backup Client Slowest/Fastest Jobs for ClientReturns the slowest and fastest clients based on the throughput of backup jobs that have run onthe clients in a table report. Uses data from the Backup Job Details data source.

In order to calculate the throughput of a client, only full backups that are more than 1 GB in sizeare considered. Incremental backups can spend a long time scanning a file system before sendingdata which can lead to an incorrect calculation of the overall throughput. Backups of less than 1GB usually complete so quickly that the throughput calculated may not be accurate. If required,either of these parameters can be modified in the Report Editor.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Policy - Name of the protection policy

l Workflow - Name of the workflow

l Action - Name of the action

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 363

l Workflow Job Id - Job Id associated with the workflow

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Proxy - Proxy backup host

l Session - Number of sessions simultaneously accessing the device

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l App Type - Name of the TDP that was used to perform the backup

l Size Offset - Number of bytes that should be added or subtracted from the Size field to returnthe Job size (in bytes)

l Size Scanned Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Size Transferred Offset - Number of bytes that should be added or subtracted from the SizeScanned field to return the Save Set size in bytes

l Archive Flag - Indicates whether Job was an archive or a backup

l Owner - Owner of the backup job

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Plugin Name - Plug-in name

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Duration - Duration of a Job

l Retention - Retention days

l Average File Size - Average size of each file

Reports by System Template

364 Dell EMC Data Protection Advisor Report Reference Guide

l Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Files Scanned - Number of files scanned

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Expires - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Transferred - Total size of the data transferred (in MB)

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Job ID 2 - NetBackup Job ID in the activity log

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size -

l Is Snap - If job is a snapshot backup

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Storage Id - Holds the job ID used for storage device identification (hidden field)

Backup Device Avg/Max Throughput by DeviceReturns backup device average and maximum throughput by device in a column chart. Uses datafrom the Tape Drive Performance From Best Source data source.

l Device Host - Name of the host that the device is connected to

l Device Name - Name of the device

l Average Throughput - Average of the write and read throughput (KB/second)

l Maximum Throughput - Maximum of the write and read throughput (KB/second)

Backup Device Performance SummarySummary of backup device performance in a table report. Uses data from the Tape DrivePerformance From Best Source data source.

l Read Throughput - Throughput of the device when performing read operations (KB/second)

l Write Throughput - Throughput of the device when performing write operations (KB/second)

l Write Activity - Time that the drive has spent performing write operations (as a percentage)

l Read Activity - Time that the drive has spent performing read operations (as a percentage)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 365

l Total Activity - Time that the drive has spent performing read and write operations (as apercentage)

Backup Device Performance Summary By DeviceSummary of backup device performance by device in a table report. Uses data from the Tape DrivePerformance From Best Source data source.

l Device Host - Name of the host that the device is connected to

l Device Name - Name of the device

l Average Read Throughput - Average throughput of the drive during the reporting window,when performing read operations (KB/second)

l Average Write Throughput - Average throughput of the drive during the reporting window,when performing write operations (KB/second)

l Write Activity - Time that the drive has spent performing write operations (as a percentage)

l Read Activity - Time that the drive has spent performing read operations (as a percentage)

l Max Read Throughput - Throughput of the device when performing read operations (KB/second)

l Max Write Throughput - Throughput of the device when performing write operations (KB/second)

l Total Activity - Time that the drive has spent performing read and write operations (as apercentage)

Backup Device Throughput AggregateReturns backup device throughput aggregate details in a line chart. Uses data from the Tape DrivePerformance From Best Source data source.

l Throughput - Average of the write and read throughput (KB/second)

Backup Device Throughput by DeviceReturns backup device throughput by device details in a line chart. Uses data from the Tape DrivePerformance From Best Source data source.

l Device Host - Name of the host that the device is connected to

l Device Name - Name of the device

l Throughput - Average of the write and read throughput (KB/second)

Backup Device Throughput for DeviceReturns backup device throughput for device details in a line chart. Uses data from the Tape DrivePerformance From Best Source data source.

l Device Host - Name of the host that the device is connected to

l Device Name - Name of the device

l Read Throughput - Throughput of the device when performing read operations (KB/second)

l Write Throughput - Throughput of the device when performing write operations (KB/second)

Reports by System Template

366 Dell EMC Data Protection Advisor Report Reference Guide

Backup Top 10 Fastest ClientsReturns the top ten fastest clients based on the throughput of backup jobs that have run on theclients in a table report. Uses data from the Backup Job Details data source.

In order to calculate the throughput of a client, only full backups that are more than 1 GB in sizeare considered. Incremental backups can spend a long time scanning a file system before sendingdata which can lead to an incorrect calculation of the overall throughput. Backups of less than 1GB usually complete so quickly that the throughput calculated may not be accurate. If required,either of these parameters can be modified in the Report Editor.

The Backup Top 10 Fastest Clients report can be used to identify the Fastest machines in theenvironment to benchmark how fast backups are running.

l Client - Name of the client backed up

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Cumulative Time Active - The sum of each of the job durations for the reporting period

l Throughput - Average of the write and read throughput (MB/second)

l Scanned Throughput - Scanned throughput (MB/second)

l Jobs -

l Act Thruput - (MB/second)

Backup Top 10 Slowest ClientsReturns the top ten slowest clients based on the throughput of backup jobs that have run on theclients in a table report. Uses data from the Backup Job Details data source.

l Client - Name of the client backed up

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

l Cumulative Time Active - The sum of each of the job durations for the reporting period

l Throughput - Average of the write and read throughput (MB/second)

l Scanned Throughput - Scanned throughput (MB/second)

l Jobs -

l Act Thruput - (MB/second)

Celerra Replication PerformanceReturns Celerra replication performance details in a line chart. Uses data from the CelerraReplication Performance data source.

l Server - Hostname or IP address of the Celerra being monitored

l Name - Name of the replication set

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 367

l Current Transfer Rate - Total amount of data being read and written to the replication link(KB/second)

l Current Read Rate - Amount of data being read from the replication link (KB/second)

l Current Write Rate - Amount of data being written to the replication link (KB/second)

Celerra Replication Performance SummarySummary for Celerra replication performance details in table report. Uses data from the CelerraReplication Performance data source.

l Server - Hostname or IP address of the Celerra being monitored

l Name - Name of the replication set

l Average Transfer Rate - Average amount of data being read and written to the replication link(KB/second)

l Average Read Rate - Average amount of data that has been read from the replication link (KB/second)

l Average Write Rate - Average amount of data that has been written to the replication link (KB/second)

Data Domain Average Replicated CapacityReturns Data Domain average replicated capacity details in a line chart. Uses data from theAverage Replicated Capacity data source.

l Hostname - Name of the host

l Destination Host - Unique identifier for the destination of replication

l Average Capacity - Average replicated capacity (in MB)

Data Domain Data Transfer RateReturns Data Domain data transfer rate in a line chart. Uses data from the Replication DataTransfer Statistics data source.

l Hostname - Hostname of replicating server

l Source - Identifier for replication source

l Destination - Identifier for replication destination

l Destination Host - Unique identifier for the destination of replication

l Transfer Rate - Transfer Difference divided by Time Difference, where:

n Transfer Difference is the difference in value of the field f_sentcompressed between twoconsecutive rows

n Time Difference is the difference in value of field f_endtime values between twoconsecutive rows, where:

– f_sent_compressed and f_endtime are fields taken from the table repl_perf

Data Domain Replication Time LagReturns the replication time lag value over time as a graph. Uses data from the ReplicationPerformance data source.

l Hostname - Hostname of replicating server

Reports by System Template

368 Dell EMC Data Protection Advisor Report Reference Guide

l Source - Identifier for replication source

l Destination - Identifier for replication destination

l Time Lag - Calculated as the difference between the Date Gathered and Synchronized

Disk Activity By DiskReturns disk activity by disk in a line chart. Uses data from the Disk Activity By Device datasource.

l Hostname - Name of the host to which the disk is attached

l Device - Name of the disk

l Busy - Activity level for the disk (as a percentage)

Disk Activity By HostReturns disk activity by host in a line chart. Uses data from the Disk Activity By Node data source.

l Hostname - Name of the object to which the disks are attached

l Busy - Average activity level for the object's disks (as a percentage)

Disk Operations by DiskReturns disk operations by disk in a line chart. Uses data from the Disk Performance By Devicedata source.

l Hostname - Name of the host to which the disk is attached

l Device - Name of the disk

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

l Sectors Read - Number of sectors read

l Sectors Written - Number of sectors written to

Disk Operations by HostReturns disk operations by host in a line chart. Uses data from the Disk Performance By Node datasource.

l Hostname - Name of the object to which the disk is attached

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

l Sectors Read - Number of sectors read

l Sectors Written - Number of sectors written to

Disk Performance By DiskReturns disk performance by disk in a line chart. Uses data from the Disk Performance By Devicedata source.

l Hostname - Name of the host to which the disk is attached

l Device - Name of the disk

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 369

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Bytes Transferred - Number of kilobytes transferred from disk

Disk Performance By HostReturns disk performance by disk in a line chart. Uses data from the Disk Performance By Nodedata source.

l Hostname - Name of the object to which the disk is attached

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Bytes Transferred - Number of kilobytes transferred from disk

DPA Reporter Median Report Run TimeDisplays the median time taken to run a report over time in a line chart. Uses data from the DPAMetrics data source.

l Server - Name of the DPA Server

l Median - The median time taken to run a report

Fibre Channel Device PerformanceReturns Fibre Channel device performance details in a line chart. Uses data from the Fibre ChannelDevice Performance From Switch data source.

l Hostname - Name of the host in which the HBAs are installed

l Device - Name of the device on the host. For example, /dev/rmt/1n

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

Fibre Channel Device Performance By NodeReturns Fibre Channel device performance by object details in a line chart. Uses data from theFibre Channel Device Performance From Switch data source.

l Hostname - Name of the host in which the HBAs are installed

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

Fibre Channel Device Performance SummarySummary of the Fibre Channel device performance in a table report. Uses data from the FibreChannel Device Performance From Switch data source.

l Hostname - Name of the host in which the HBAs are installed

l Device - Name of the device on the host. For example, /dev/rmt/1n

l Avg Write - Amount of data sent

l Max Write - Max data sent

Reports by System Template

370 Dell EMC Data Protection Advisor Report Reference Guide

l Write Activity - Average write activity (as a percentage)

l Avg Read - Amount of data received

l Max Read - Max data received

l Read Activity - Average read activity (as a percentage)

Fibre Channel Port PerformanceReturns Fibre Channel port performance information in a line chart. Uses data from the FibreChannel Performance By Node data source.

l Hostname - Name of the object

l Data - The sum of the Data In and Data Out displayed by the object(KB/second)

l Frames - The sum of Frames In and Frames Outdisplayed by the object (1000s/second)

Fibre Channel Port Performance By NodeReturns Fibre Channel port performance by object details in a line chart. Uses data from the FibreChannel Performance By Node data source.

l Hostname - Name of the object

l Data In - Amount of data received by the object (KB/second)

l Data Out - Amount of data sent from the object (KB/second)

l Frames In - Number of frames received by the object (1000s/second)

l Frames Out - Number of frames sent from the object (1000s/second)

Fibre Channel Port Performance By PortReturns Fibre Channel port performance by port details in a line chart. Uses data from the FibreChannel Performance By Port data source.

l Hostname - Name of the object

l Sub Name - Name of TSM server instance

l Port - Name of the port

l Data In - Amount of data received by the port (KB/second)

l Data Out - Amount of data sent from the port (KB/second)

l Frames In - Number of frames received by the port (1000s/second)

l Frames Out - Number of frames sent from the port (1000s/second)

Fileserver Average Response TimesReturns the average read and write response times over time for NFS and CIFS operations in a linechart. Uses data from the File server performance data source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l CIFS Average Read Operation Duration - Average duration of CIFS reads (microsecond/call)

l CIFS Average Write Operation Duration - Average duration of CIFS writes (microsecond/call)

l NFS Average Read Operation Duration - Average duration of NFS reads (microsecond/call)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 371

l NFS Average Write Operation Duration - Average duration of NFS writes (microsecond/call)

Fileserver Cache Hit RatesReturns file server cache hit rate details in a line chart. Uses data from the Inode Cache Hit Rateand Name Cache Hit Rate data sources.

l Node - Name of the object

l Inode Cache Hit Rate - Percentage of successful cache lookups when attempting to map aninode to a block on a file system

l Name Cache Hit Rate - Percentage of successful cache lookups when attempting to map afilename to an inode on a file system

Fileserver Cache Hit Rates By NodeReturns file server cache hit rate by object details in a line chart. Uses data from the Inode CacheHit Rate and Name Cache Hit Rate data sources.

l Node - Name of the object

l Inode Cache Hit Rate - Percentage of successful cache lookups when attempting to map aninode to a block on a file system

l Name Cache Hit Rate - Percentage of successful cache lookups when attempting to map afilename to an inode on a file system

Fileserver Client PerformanceReturns file server client performance details in a line chart. Uses data from the File server clientperformance data source.

l Node - Name of the file server

l Client - Name of the file server client

l Total Operations - Total number of client operations (/second)

Fileserver Data ThroughputReturns file server data throughput in a line chart. Uses data from the File server performancedata source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l Total Throughput - Total throughput of CIFS and NFS data (KB/second)

Fileserver Data Throughput By ProtocolReturns file server data throughput by protocol in a line chart. Uses data from the File serverperformance data source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l Total CIFS - Total of CIFS data in and data out (KB/second)

l Total NFS - Total of NFS data in and data out (KB/second)

Reports by System Template

372 Dell EMC Data Protection Advisor Report Reference Guide

Fileserver Filesystem PerformanceReturns file server file system performance details in a line chart. Uses data from the File ServerFilesystem Performance data source.

l Node - Name of the file server

l Mountpoint - Name of the file server file system

l Protocol - Name of the file server protocol: CIFS, NFS

l Total Operations - Total number of file system operations (/second)

l Read Operations - Number of file system read operations (/second)

l Write Operations - Number of file system write operations (/second)

l Other Operations - Number of file system lookup, locking and similar operations (/second)

Fileserver OperationsReturns file server operations in a line chart. Uses data from the File server performance datasource.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l Operations - Total of operations (/second)

Fileserver Operations By ProtocolReturns file server operations by protocol in a line chart. Uses data from the File serverperformance data source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l NFS operations - Number of NFS operations per second (/second)

l CIFS operations - Number of CIFS operations per second (/second)

l DAFS operations - Number of DAFS operations per second (/second)

l HTTP operations - Number of HTTP operations per second (/second)

l iSCSI operations - Number of iSCSI operations per second (/second)

l FCP operations - Number of FCP operations per second (/second)

l Idle - Percentage of time NFS was idle

l Preoccupied - Percentage of time NFS was processing

l Send - Percentage of time NFS was sending data

l Receive - Percentage of time NFS was receiving data

Fileserver Operations with DirectionReturns file server operations with direction in a line chart. Uses data from the File serverperformance data source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 373

l CIFS Read operations - Number of CIFS read operations (/second)

l CIFS Write operations - Number of CIFS write operations (/second)

l NFS Read operations - Number of NFS read operations (/second)

l NFS Write operations - Number of NFS write operations (/second)

Fileserver Performance SummarySummary of file server performance details in a table report. Uses data from the File serverperformance data source.

l Node - Name of the file server

l Sub Name - Identifier for the Storage Array

l Read Operations - Number of CIFS and NFS read operations (/second)

l Write Operations - Number of CIFS and NFS write operations (/second)

l Data In - Amount of CIFS and NFS data received (KB/second)

l Data Out - Amount of CIFS and NFS data sent (KB/second)

l Average Read Size - Average size of CIFS and NFS data read (in KB)

l Average Write Size - Average size of CIFS and NFS data written (in KB)

l Protocol - Type of protocol: CIFS, NFS

Filesystem Disk PerformanceReturns file system disk performance details in a line chart. Uses data from the Filesystem DiskPerformance data source.

l Filesystem node - Name of the object to which the file system is attached

l Filesystem - Name of the file system

l Filesystem Sub Name - Identifier for the storage array on which the file system resides

l Disk node - Name of the object to which the disk is attached

l Disk - Name of the disk

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

Filesystem Operations By PartitionReturns file system operations by partition in a line chart. Uses data from the FilesystemPerformance By Filesystem data source.

l Hostname - Name of the object on which the file systems reside

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Ops - Total of the Read and Write operations (/second)

Reports by System Template

374 Dell EMC Data Protection Advisor Report Reference Guide

Filesystem Operations by DirectionReturns file system operations by direction in a line chart. Uses data from the FilesystemPerformance By Filesystem data source. This report shows the type of operations that occur oneach file system over time.

l Hostname - Name of the object on which the file systems reside

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

Filesystem Performance SummarySummary of the file system performance in a table report. Uses data from the FilesystemPerformance By Filesystem data source.

l Hostname - Name of the object on which the file systems reside

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

l Average Read Size - Average size of read operations to the disk (in bytes)

l Average Write Size - Average size of write operations to the disk (in bytes)

Filesystem Throughput by PartitionReturns file system throughput by partition in a line chart. Uses data from the FilesystemPerformance By Filesystem data source.

l Hostname - Name of the object on which the file systems reside

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Throughput - Total of throughput of read and write (KB/second)

Filesystem Throughput with DirectionReturns file system throughput with direction in a line chart. Uses data from the FilesystemPerformance By Filesystem data source.

l Hostname - Name of the object on which the file systems reside

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 375

Host PerformanceReturns host performance in a line chart. Uses data from the Filesystem Utilization, MemoryConfiguration, Memory Status, Network Interface Performance By Interface, and ProcessorUtilization data sources.

l Memory Utilization - Average memory utilization of Used and Total memory

l Processor Utilization - Utilization on the processor (as a percentage)

l Filesystem Utilization - Average file system utilization for all hosts (as a percentage)

l Hostname - Name of the host

l Sub Name - Name of the storage array

l Interface - Interface name

l Data Out - Amount of data leaving the interface (KB/second)

l Data In - Amount of data coming into the interface (KB/second)

Host Performance During BackupReturns host performance during backup in a line chart. Uses data from the Disk performance ByDevice, Memory Configuration, Memory Status, Network Interface Performance By Interface, andProcessor Utilization data sources.

l Processor Utilization - Utilization on the processor (as a percentage)

l Utilization - Utilization of Used and Total memory

l Hostname - Name of the host on which the network interface is located

l Interface - Interface name

l Data In - Amount of data coming into the interface (KB/second)

l Data Out - Amount of data leaving the interface (KB/second)

l Device - Name of the disk

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

Host Performance For ClientReturns host performance for client in a line chart. Uses data from the Filesystem Utilization,Memory Configuration, Memory Status, Network Interface Performance By Interface, andProcessor Utilization data sources.

l Utilization - Utilization of Used and Total memory

l Processor Utilization - Utilization on the processor (as a percentage)

l Filesystem Utilization - Average file system utilization for all hosts (as a percentage)

l Data Out - Amount of data leaving the interface (KB/second)

l Data In - Amount of data coming into the interface (KB/second)

Reports by System Template

376 Dell EMC Data Protection Advisor Report Reference Guide

LUN OperationsReturns LUN operation details in a line chart. Uses data from the LUN Performance By LUN datasource.

l Node - Name of the array on which the LUN is configured

l Sub Name - Name of the storage array

l Name - Name of the LUN

l Ops - Total of the Read and Write operations (/second)

LUN Operations By LUNReturns LUN operation by LUN details in a line chart. Uses data from the LUN Performance ByLUN data source.

l Node - Name of the array on which the LUN is configured

l Sub Name - Name of the storage array

l Name - Name of the LUN

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

LUN PerformanceReturns LUN performance in a line chart. Uses data from the LUN Performance By LUN datasource.

l Node - Name of the array on which the LUN is configured

l Sub Name - Name of the storage array

l Name - Name of the LUN

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

LUN Performance By NodeReturns LUN performance by object in a line chart. Uses data from the LUN Performance By Nodedata source.

l Node - Name of the array on which the LUNs are configured

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 377

LUN ThroughputReturns LUN throughput in a line chart. Uses data from the LUN Performance By LUN datasource.

l Node - Name of the array on which the LUN is configured

l Sub Name - Name of the storage array

l Name - Name of the LUN

l Throughput - Total of throughput of read and write (KB/second)

LUN Throughput By LUNReturns LUN throughput by LUN in a line chart. Uses data from the LUN Performance By LUNdata source.

l Node - Name of the array on which the LUN is configured

l Sub Name - Name of the storage array

l Name - Name of the LUN

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

Mirror PerformanceReturns mirror performance in a line chart. Uses data from the Mirror Performance data source.

l Node - Name of the object on which the mirror resides

l Path - Path to the mirror

l Update Speed - Speed at which the mirror is updating (KB/second)

Process Memory Usage For Specific ProcessReturns the CPU utilization and memory usage of processes that run on a host in a line chart. Usesdata from the Process Status data source. Use this report to identify processes that areconsuming too much memory and CPU on a machine.

l Hostname - Name on which the process is running

l PID - Identifier of the process

l Process Name - Name of the process

l Memory - Amount of memory used by the process (in MB)

Processor Utilization By CPUReturns the utilization of each individual CPU on a host or group of hosts over time in a line chart.Uses data from the Processor Utilization By CPU data source.

l Hostname - Hostname in which the processors are running

l Sub Name - Name of site in which RecoverPoint Appliance is located

l Sub Name 2 - Name of RecoverPoint Appliance

l Num - Processor number

Reports by System Template

378 Dell EMC Data Protection Advisor Report Reference Guide

l CPU Utilization - Utilization on the processor (as a percentage)

Processor Utilization By NodeReturns the average CPU utilization on a host over time by averaging the utilization across allprocessors on that host in a line chart. Uses data from the Processor Utilization By Client datasource.

l Hostname - Name of the host

l Processor Utilization - Utilization on the processor (as a percentage)

RecoverPoint Consistency Group Data LagReturns RecoverPoint consistency group data lag details in a line chart. Uses data from theConsistency Group Copy Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

l Peak Data Lag - Peak data amount of data that was queued for replication over the pollingperiod (in MB)

RecoverPoint Consistency Group High Load RatioReturns RecoverPoint consistency group high load ration in a line chart. Uses data from ReportTimes and the Consistency Group Copy CS Performance data sources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

l High Load Time - Percentage time of High load

RecoverPoint Consistency Group Incoming Write RatesReturns RecoverPoint consistency group incoming write rate in a line chart. Uses data from theConsistency Group Copy Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

l Average Peak Incoming Writes - Average peak amount of data that changed per second overthe polling period (MB/second)

l Average Peak Total Output Rate - Average peak amount of data transferred on the link to thetarget per second (MB/second). This value includes the amount of data transferred duringboth initialization and replication phases. It does not include any time in which the link washalted

l Maximum Peak Incoming Writes - Maximum peak amount of data that changed per secondover the polling period (MB/second)

l Maximum Peak Total Output Rate - Maximum peak amount of data transferred on the link tothe target per second (MB/second). This value includes the amount of data transferred during

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 379

both initialization and replication phases. It does not include any time in which the link washalted

RecoverPoint Consistency Group Incoming Write Rates for Last DayReturns RecoverPoint consistency group incoming write rate for last day in a table. Uses data fromthe Consistency Group Copy Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

l Average Peak Incoming Writes - Average amount of data changed per second over the pollingperiod (MB/second)

l Average Peak Total Output Rate - Average peak amount of data transferred on the link to thetarget per second (MB/second)

l Maximum Peak Incoming Writes - Maximum amount of data changed per second over thepolling period (MB/second)

l Maximum Peak Total Output Rate- Maximum peak amount of data transferred on the link tothe target per second (MB/second)

l Start time-Start time for the period over which performance statistics are gathered

l End time- End time for the period over which performance statistics are gathered

RecoverPoint Consistency Group Journal LagReturns RecoverPoint consistency group journal lag details in a line chart. Uses data from theConsistency Group Copy Status data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the Copy

l Journal Lag - Size of the journal lag (in MB)

RecoverPoint Consistency Group ThroughputReturns RecoverPoint consistency group throughput details in a line chart. Uses data from theConsistency Group Copy Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

l Peak Total Output Rate - Peak amount of data transferred on the link to the target per second(MB/second). This value includes the amount of data transferred during both initialization andreplication phases. It does not include any time in which the link was halted

RecoverPoint Consistency Group Time LagReturns RecoverPoint consistency group time lag details in a line chart. Uses data from theConsistency Group Copy Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

Reports by System Template

380 Dell EMC Data Protection Advisor Report Reference Guide

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

l Average Time Lag - Average time lag in replication of the copy over the last polling period (inseconds)

l Peak Time Lag - Peak time lag in replication of the copy over the last polling period (inseconds)

RecoverPoint Consistency Group Transaction LagReturns RecoverPoint consistency group transaction lag details in a line chart. Uses data from theConsistency Group Copy Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the copy within the consistency group

l Peak Writes Lag - Peak number of IO transactions that were queued for replication over thepolling period

RecoverPoint RPA CompressionShows two different graphs over time, and they are superimposed on top of each other in thedisplay to be able to see the correlation between the two:

l Compression Data over Time — This is the ratio of the total size of the data on storage andthe amount of data that was transferred across the network.

l CPU Utilization Data over Time —This is the average CPU utilization over time.

Uses data from the RPA Performance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located

l Name - Name of the RecoverPoint Appliance

l Compression - Level of compression achieved (as a percentage)

l CPU Utilization - Utilization of the CPU due to compression. This field is populated only ifcompression is enabled

RecoverPoint RPA LatencyReturns RecoverPoint RPA latency details in a line chart. Uses data from the RPA Performancedata source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located

l Name - Name of the RecoverPoint Appliance

l Latency - Latency of network writes (in milliseconds)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 381

RecoverPoint RPA ThroughputReturns RecoverPoint RPA throughput details in a line chart. Uses data from the RPAPerformance data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located

l Name - Name of the RecoverPoint Appliance

l Latency - Latency of network writes (in milliseconds)

RecoverPoint RPA WritesReturns RecoverPoint RPA Write details in a line chart. Uses data from the RPA Performance datasource.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located

l Name - Name of the RecoverPoint Appliance

l Writes - Total number of writes performed by the application

RecoverPoint RPA Site CompressionReturns RecoverPoint RPA site compression details in a line chart report. Uses data from the RPASite Performance datasource.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located. Production site

l Name - Name of the RecoverPoint Appliance

l To Site - Name of the remote site

l Compression - Level of compression achieved (as a percentage)

RecoverPoint RPA Site LatencyReturns RecoverPoint RPA site latency details in a line chart report. Uses data from the RPA SitePerformance datasource.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located. Production site

l Name - Name of the RecoverPoint Appliance

l To Site - Name of the remote site

l Latency - Latency of network writes from Site to To Site (in milliseconds)

RecoverPoint RPA Site Packet LossReturns RecoverPoint RPA site packet loss details in a line chart report. Uses data from the RPASite Performance datasource.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located. Production site

Reports by System Template

382 Dell EMC Data Protection Advisor Report Reference Guide

l Name - Name of the RecoverPoint Appliance

l To Site - Name of the remote site

l Packet Loss - Packet loss on the network (as a percentage)

RecoverPoint RPA Site ThroughputReturns RecoverPoint RPA site throughput details in a line chart report. Uses data from the RPASite Performance datasource.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located. Production site

l Name - Name of the RecoverPoint Appliance

l To Site - Name of the remote site

l WAN Throughput - Total throughput of WAN traffic from Site to To Site (KB/second)

l WAN Initial Throughput - Throughput of WAN initialization traffic from site to site (KB/second)

RecoverPoint RPA WAN ThroughputReturns RecoverPoint RPA site throughput details in a line chart report. Uses data from theReport Times and RPA CS Performance datasources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located. Production site

l Name - Name of the RecoverPoint Appliance

l Average WAN Throughput - Average WAN throughput (bytes/second)

l Maximum WAN Throughput - Maximum of WAN initialization traffic (bytes/second)

l Result Duration -

RecoverPoint RPA WAN Throughput for Last DayReturns RecoverPoint RPA site throughput for last day details in a table report. Uses data fromthe RPA Throughput Statistics datasource.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located. Production site

l Name - Name of the RecoverPoint Appliance

l Average WAN Throughput - Average throughput of WAN traffic (KB/second)

l Maximum WAN Throughput - Maximum of WAN initialization traffic (KB/second)

l Start Time- Start time for the period over which performance statistics are gathered

l End Time- End time for the period over which performance statistics are gathered

Remote Mirror PerformanceReturns remote mirror performance details in a line chart. Uses data from Remote MirrorPerformance data source.

l Source node - Name of the object on which the source mirror resides

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 383

l Source path - Path to the mirror source

l Mirror node - Name of the object on which the remote mirror resides

l Mirror path - Path to the remote mirror

l Update speed - Speed at which the remote mirror is updating (KB/second)

Server Performance During BackupReturns server performance during backup details in a line chart. Uses data from the MemoryConfiguration, Memory Status, Network Interface Performance By Interface, and ProcessorUtilization data sources.

l Processor Utilization - Utilization on the processor (as a percentage)

l Utilization - Average memory utilization of Used and Total memory

l Data In - Amount of data coming into the interface (KB/second)

l Data Out - Amount of data leaving the interface (KB/second)

l Errors In - Number of errors coming in to the interface (/second)

l Errors Out - Number of errors leaving the interface (/second)

l Packets In - Number of packets coming in to the interface (1000s/second)

l Packets Out - Number of packets leaving the interface (1000s/second)

Solid State Storage PerformanceReturns solid state storage performance details in a line chart. Uses data from the Solid StateStorage Performance data source.

l Hostname - Name of machine hosting solid state storage device

l Read Throughput - Amount of data moved into NVRAM (KB/second)

l Write Throughput - Amount of data moved out of NVRAM (KB/second)

Tape Drive Performance By DriveReturns tape drive performance by drive details in a line chart. Uses data from the Tape DrivePerformance By Device data source.

l Hostname - Object to which the drive is attached

l Device Name - Name of the device

l Port - Port used to access the device

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

l Total Throughput - Total of Read and Write throughput (KB/second)

Tape Drive Performance By NodeReturns tape drive performance by object details in a line chart. Uses data from the Tape DrivePerformance By Node data source.

l Hostname - Object to which the drives are attached

l Read Throughput - Data throughput for reads (KB/second)

Reports by System Template

384 Dell EMC Data Protection Advisor Report Reference Guide

l Write Throughput - Data throughput for writes (KB/second)

l Total Throughput - Total of Read and Write throughput (KB/second)

Tape Drive Performance SummarySummary of the tape drive performance in a table report. Uses data from the Tape DrivePerformance By Device data source.

l Hostname - Node to which the drive is attached

l Device Name - Name of the device

l Port - Port used to access the device

l Avg. Write Throughput - Average data throughput for writes (KB/second)

l Max Write Throughput - Maximum data throughput for writes (KB/second)

l Write Activity - Data throughput for writes (as a percentage)

l Avg. Read Throughput - Average data throughput for reads (KB/second)

l Max Read Throughput - Maximum data throughput for reads (KB/second)

l Read Activity - Data throughput for reads (as a percentage)

Tape Drive Throughput on Server During BackupReturns tape drive throughput on server during backup in a line chart. Uses data from the TapeDrive Performance By Device data source.

l Hostname - Node to which the drive is attached

l Library Name - Name of the tape library to which the drive belongs. Physical tape drives do notreturn information on the tape library in which they are a member

l Device Name - Name of the device

l Port - Port used to access the device

l Read Throughput - Data throughput for reads (KB/second)

l Write Throughput - Data throughput for writes (KB/second)

Tape Library Drive PerformanceReturns tape library drive performance details in a line chart. Uses data from the Tape DrivePerformance From Switch data source.

l Library - Library on which the tape drive is located

l Drive - Name of the tape drive

l Data Out - Data out of the switch (KB/second)

Tape Library Drive Performance By NodeReturns tape library drive performance by object in a line chart. Uses data from the Tape DrivePerformance From Switch data source.

l Library - Library on which the tape drive is located

l Data Out - Data out of the switch (KB/second)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 385

Tape Library Drive Performance SummarySummary of tape library drive performance details in a line chart. Uses data from the Tape DrivePerformance From Switch data source.

l Library - Library on which the tape drive is located

l Drive - Name of the tape drive

l Avg Write - Average data out of the switch (KB/second)

l Max Write - Maximum data out of the switch (KB/second)

l Write Activity - Data out of the switch (as a percentage)

l Avg Read - Average data into the switch (KB/second)

l Max Read - Maximum data into the switch (KB/second)

l Read Activity - Data into the switch (as a percentage)

Total ThroughputReturns total throughput for the host in a line chart. Uses data from the Network InterfacePerformance by Node and Fibre Channel Performance by Node data sources.

l Hostname - Name of the host on which the network interface is located

l Total Throughput - Sum of the Data In and Data Out fields for Network Interface and FibreChannel Port Performance

Virtual Fibre Channel Port Performance By NodeReturns virtual fibre channel port performance by object in a line chart. Uses data from the FibreChannel Performance By Node data source.

l Hostname - Name of the object

l Data In - Amount of data received by the object (KB/second)

l Data Out - Amount of data sent from the object (KB/second)

l Frames In - Number of frames received by the object (1000s/second)

l Frames Out - Number of frames sent from the object (1000s/second)

Virtual Fibre Channel Port Performance By PortReturns virtual fibre channel port performance by port in a line chart. Uses data from the FibreChannel Performance By Port data source.

l Hostname - Name of the object

l Sub Name - Name of server instance, if applicable

l Port - Name of the port

l Data In - Amount of data received by the port (KB/second)

l Data Out - Amount of data sent from the port (KB/second)

l Frames In - Number of frames received by the port (1000s/second)

l Frames Out - Number of frames sent from the port (1000s/second)

Reports by System Template

386 Dell EMC Data Protection Advisor Report Reference Guide

Virtual Host Disk PerformanceReturns virtual host disk performance details in a line chart. Uses data from the Virtual Host DiskPerformance data source.

l Virtual Host - Name of the Virtual Centre server

l Virtualization Server - Hostname of a Virtualization Server managed by Virtual Centre

l Device - Identifier for the disk

l Read Throughput - Data read throughput (KB/second)

l Write Throughput - Data write throughput (KB/second)

l Read Operations - Number of read operations (/second)

l Write Operations - Number of write operations (/second)

Virtual Host Network Interface PerformanceReturns the network interface performance of virtual machines in a line chart. Uses data from theVirtual Host Network Interface Performance data source.

l Virtual Host - Name of the Virtual Centre server

l Virtualization Server - Name of the virtual machine

l Interface - Identifier for the network interface

l Data In - Data incoming (KB/second)

l Data Out - Data outgoing (KB/second)

l Packets In - Number of packets incoming (thousands/second)

l Packets Out - Number of packets outgoing (thousands/second)

Virtual Host Processor UtilizationReturns the processor percentage utilization of virtual machines in a line chart. Uses data from theVirtual Host Configuration and Virtual Host Status data sources.

l Virtual Host - Name of the Virtual Centre server

l Utilization - CPU utilization of the virtual machine (in MHz)

Webserver Response TimeReturns information on the response of a test on a web page in a line chart. Uses data from theWebserver Response data source.

l Hostname - Name of the web server

l Page Requested - Page being requested

l Response Time - Response time (in seconds)

l Valid Response - Indicates if the response from the web server was valid

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 387

Xsigo Aggregate Infiniband Port PerformanceReturns the percentage utilization of the Infiniband port, aggregated over the selected objects in aline chart. Uses data from the Infiniband Port Performance data source.

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

l Packets In - Number of packets received (/second)

l Packets Out - Number of packets sent (/second)

Xsigo Infiniband Port Performance by NodeReturns the percentage utilization of the Infiniband port, displayed by object, in a line chart. Usesdata from the Infiniband Port Performance data source.

l Hostname - Name of the Xsigo Director object

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

l Packets In - Number of packets received (/second)

l Packets Out - Number of packets sent (/second)

Xsigo Infiniband Port Performance by PortReturns performance information on the InfiniBand ports on Xsigo switches in a line chart. Usesdata from the Infiniband Port Performance data source.

l Hostname - Name of the Xsigo Director object

l Sub Name - Identifier for the switch

l Name - Identifier for the InfiniBand port

l Data In - Amount of data received (KB/second)

l Data Out - Amount of data sent (KB/second)

l Packets In - Number of packets received (/second)

l Packets Out - Number of packets sent (/second)

Xsigo Virtual Port Queue Depth SummarySummary of the queue activity for virtual ports on a Xsigo appliance in a table report. Uses datafrom the Fibre Channel Performance By Port and Network Interface Performance By Interfacedata sources.

l Hostname - Name of the object

l Port - Name of the port

l Port Type - Type of port

l Average Queue Depth - Average length of the I/O queue

l Maximum Queue Depth - Maximum length of the I/O queue

l Minimum Queue Depth - Minimum length of the I/O queue

Reports by System Template

388 Dell EMC Data Protection Advisor Report Reference Guide

Provisioning system templatesThe following section describes provisioning system templates.

Fileserver Top 10 Most Available AggregatesReturns fileserver top ten most available aggregate details in a table report. Uses data from theAggregate Configuration, Aggregate Status, Disk Configuration, and Disk Status data sources.

l Node - Name of the filer on which this aggregate exists

l Name - Name of the aggregate

l Aggregate Capacity - (in MB)

l Used Space - Space on the aggregate used for volumes (in MB)

l Available Space - (in MB)

l Available FS Capacity - (in MB)

l Unallocated Space - (in MB)

l Potential Available FS Capacity - (in MB)

Recoverability system templatesRecoverability analysis is available as DPA reports available from the reporting area.

All Nodes Of Type Symmatrix CGReturns all objects of type Symmetrix consistency group details in a Table report. Uses data fromthe All Nodes Of Type data source.

l Node Name - Name of the object

l Host Name - Name of the host

l Type - Type of object

Masking Configuration for Storage ArrayReturns information for masking, masking views and storage groups for Symmetrix and CLARiiONin a table report. Uses data from the Masking Configuration data source.

l Module - Name of the module executed

l Data Source - Name of the data source executed

l Sub - Name of storage array

l Name - Name of the storage array where the object is located

l Initiator - Initiator of the session

l Storage Array - Name of the storage array for the object

l Device - Name of the device on the storage array where the object is located

l Director - Identifier for the Symmetrix Director

l Port - Port identifier

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 389

l Lun - Logical unit number (LUN) through which the disk can be accessed by the source

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running or has neverrun before

Masking Configuration for InitiatorReturns masking configuration for initiator details in a table report. Uses data from the MaskingConfiguration data source.

l Module - Name of the module executed

l Data Source - Name of the data source executed

l Sub - Name of storage array

l Name - Name of the storage array where the object is located

l Initiator - Initiator of the session

l Storage Array- Name of the storage array for the object

l Device - Name of the device on the storage array where the object is located

l Director - Identifier for the Symmetrix Director

l Port - Port identifier

l Lun - Logical unit number (LUN) through which the disk can be accessed by the source

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running or has neverrun before

MirrorView ConfigurationReturns MirrorView/A configuration details in a table report. Uses data from the MirrorviewConfiguration data source.

l Data Source - Name of the data source executed

l Name - Name of the file system or application being replicated

l Source Storage Array - Name of the storage array for the source object

l Source Storage Array UID - Unique identifier of the storage array for the source object

l Source Device - Name of the device on the storage array where the source object is located

l Target Storage Array - Name of storage array where the source is being replicated

l Target Storage Array UID - Unique identifier of the storage array for the target object

l Target Device - Name of the device where the source is being replicated

l Mirrorview Type - Type of MirrorView

l Mirrorview UID - Identifier for MirrorView

l Update Type - Type of update

l Update Interval - Update interval

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running or has neverrun before

Reports by System Template

390 Dell EMC Data Protection Advisor Report Reference Guide

l MV Group Name - MirrorView group name

MirrorView/A PerformanceReturns performance data for MirrorView/A sessions in a table report. Uses data from theMirrorview Performance and System Variable data sources.

l Id - Identifier that uniquely identifies this Job

l Module - Name of the module executed

l Storage Array - Name of the storage array for the object

l Name - Name of the file system or application being replicated

l Mirrorview UID - Unique identifier for MirrorView

l Replication Method - Method by which the object has been replicated

l Started - Identifies when the job started

l Completed - Identifies when the job completed

l Duration - Total duration of all jobs (in seconds)

l Defined RPO - As specified in the Protection Policy (in seconds)

l MB Transferred - Amount of MB transferred

l Peer Storage Array - the Remote Storage Array. It can be the source or the target, dependingon whether the MirrorView on the selected array is the source or the target.

l Peer Mirrorview Name - Target MirrorView session

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running or has neverrun before

l RPO Time - Time of the RPO

MirrorView/A Performance for CGReturns performance data for MirrorView/A sessions for consistency groups in a table report.Uses data from the Mirrorview CG Performance and System Variable data sources.

l Storage Array - Name of the storage array for the object

l CG - Name of the consistency group

l Replication Method - Method by which the object has been replicated

l Started - Identifies when the job started

l Completed - Identifies when the job completed

l Duration - Total duration of all jobs (in seconds)

l Defined RPO - As specified in the Protection Policy (in seconds)

l MB Transferred - Amount of MB transferred

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running or has neverrun before

l RPO Time - Time of the RPO

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 391

RDF ConfigurationReturns RDF configuration for storage array in a table report. Uses data from the RDFConfiguration by Destination, RDF Configuration by Source, and RDFG Configuration over timedata sources.

l Id - Identifier that uniquely identifies this Job

l Data Source - Name of the data source executed

l Source Storage Array - Name of the storage array for the source object

l Source Device - Name of the device on the storage array where the source object is located

l Source RDFG Number - Number of the source RDFG

l Target Storage Array - Name of storage array where the source is being replicated

l Target Device - Name of the device where the source is being replicated

l RDFG Name - Name of the RDFG

l Target RDFG Number - Number of the target RDFG

l Mode -

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running or has neverrun before

l Device Type - Type of device. For example, DLT, Ultrium-2

l Cycle Time - Cycle time (in seconds)

RDF Configuration for CGReturns RDF configuration for consistenct group details in a table report. Uses data from the CGConfiguration, RDF Configuration by Source, and RDFG Configuration over time data sources.

l Agent Name - Name of the agent

l Solutions Enabler Host - Name of the Solutions Enabler Host

l CG Name - Name of the consistency group

l Source Storage Array - Name of the storage array for the source object

l Source Device - Name of the device on the storage array where the source object is located

l Target Storage Array - Name of storage array where the source is being replicated

l Target Device - Name of the device where the source is being replicated

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running or has neverrun before

l Id - Identifier that uniquely identifies this Job

l Data Source - Name of the data source executed

l Source RDFG Number - Number of the source RDFG

l RDFG Name - Name of the RDFG

l Target RDFG Number - Number of the target RDFG

l Mode -

Reports by System Template

392 Dell EMC Data Protection Advisor Report Reference Guide

l Cycle Time - Cycle time (in seconds)

RDF Configuration for DGReturns RDF configuration for DG details in a table report. Uses data from the DG Configuration,RDF Configuration by Destination, RDF Configuration by Source, and RDFG Configuration overtime data sources.

l Source Storage Array - Name of the storage array for the source object

l Source Device - Name of the device on the storage array where the source object is located

l Source RDFG Number - Number of the source RDFG

l Target Storage Array - Name of storage array where the source is being replicated

l Target Device - Name of the device where the source is being replicated

l RDFG Name - Name of the RDFG

l Target RDFG Number - Number of the target RDFG

l Mode -

l Device Type - Type of device. For example, DLT, Ultrium-2

l DG Name - Name of DG

l Cycle Time - Cycle time (in seconds)

RDFG ConfigurationReturns RDFG configuration details in a table report. Uses data from the RDFG Configuration overtime data source.

l Storage Array - Name of the storage array where the object is located

l RDFG - Name of the RDFG

l Cycle Time - Cycle time (in seconds)

l RDFG Type - Type of the RDFG

l Remote Storage Array - Name of storage array where the source is being replicated

l Remote RDFG - Name of the remote RDFG

RDFG PerformanceReturns performance data for RDF/A groups in a table report. Uses data from the RDFAPerformance data source.

l Id - Identifier that uniquely identifies this Job

l Module - Name of the module executed

l Target Storage Array - Target storage array of the RDF group

l Target RDFG Number - Number of the target RDFG

l RDFG Name - Name of the RDFG

l Replication Method - Method by which the object has been replicated

l Duration - Total duration of all jobs to complete (in seconds)

l RPO Time - Time of the RPO

l MB Transferred - Amount of MB transferred

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 393

l Cycle Time - Cycle time (in seconds)

l Source Storage Array - Source storage array of the RDF group

l Source RDFG Number - Number of the source RDFG

l Start Time - Last start time of the group. This value is not set if the group has not run

l End Time - Last end time of the group. This value is not set if the group is running or has neverrun

Recoverability Detailed ExposuresReturns details recoverability exposures in a table report. Uses data from the Recoverability Gapsdata source. Run this report against a backup host, and not against the backup server itself. Runthe report against a group of host file systems or databases to calculate an exposure for anapplication, business unit, office, or other group of objects.

l Category - Category of exposure

l Gap - Reason why the gap was triggered

l Group - DPA group, if applicable

l Host - Host for the replicated object

l Path - Path to the replicated object. The path will depend on the replicated object type (forexample, a directory path for a file system, or an application storage object)

l Protected Object - Name of the protected object

l Issued - Indicates when the gap was issued

l Storage Array - Source storage array for the replicated object

l Replication Method - Method by which the object is replicated

l Severity - Severity of the exposure

l Gap Details - Additional details on the gap

l Replication Time - Time the gap was triggered

l GAP_REPORT_RP_ID

l GAP_REPORT_Storage Array_ID

l GAP_REPORT_GAP_ID

l GAP_REPORT_Replication Method_ID

l GAP_REASON_ID

l GAP_REPORT_NODE_ID

l GAP_REPORT_ACTUAL_PATH

Recoverability Detailed Exposures for rulesetReturns details for recoverability detailed exposures in a table report. Report for RecoverabilityExposure rule. Uses data from the Recoverability Gaps data source.

l Host - Host for the replicated object

l Alert - Identifier of the alert

Reports by System Template

394 Dell EMC Data Protection Advisor Report Reference Guide

Recoverability Replicated Object Process ViewReturns a visualization of the recoverability of one or more backup objects in a topology report.Uses data from the Recoverability Replicated Object Process View data source.

l Type - Type of backup object. For example, filesystem, database, application

l ToolTip -

l Parameters -

l Node - Name of the object

l ReportObject -

l Source - Source of the view

l Label - Name of the field returned

l Name - Name of the object

l Target - Name of the target

l Group - Name of the backup group

Recoverability Replicated Object Storage MappingReturns recoverability replicated object storage mapping details in a table report. Uses data fromthe Recoverability Replicated Object Storage Mapping data source.

l Node Initiator - Node initiator

l Primary Storage Array - Name of the primary storage array

l Primary Device ID - Identifier of the device in storage array

l Primary Device Name - Name of the device in storage array

l Source RDF Group - Source RDF Group name

l Source MV Session - Source MV session identifier

l Replication Method - Method by which the object has been replicated

l Target Storage Array - Name of the storage array where the source is being replicated

l Target Device ID - Identifier of the storage array where the source is being replicated

l Target Device Name - Name of the device where the source is being replicated

l Target RDF Group - Target RDF Group name

l Target MV Session - Target MV session identifier

l Storage Group - Name of storage group

l Vendor Status - Status as retrieved from the storage array

l Execution Time - Time that replication was executed

l Last Recovery Time - Last recovery time

l Relevant - Indicates whether relevant

l Alert - Recoverability alert

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 395

Recoverability ExcludesReturns the gaps that have been excluded from recoverability reporting by client in a table report.Uses data from the Recoverability Excludes data source.

l Client - Client for the managed object

l Path - Path to the managed object

l Storage Array - Name of the storage array where the object is located

l Replication Method - Method by which the object is replicated

l Gap - Type of gap excluded

l exclude id - Exclude identifier

l Replication Method Ed - Replication method identifier

l reason id - Reason identifier

l User - User who created the exclusion

l Date - Date of exclusion

l Approver - DPA user who approved the exclusion

l Expiration - Timestamp on which the exclusion expires

l Comments - User comments

Recoverability Exposures SummarySummary of recoverability exposures in a table report. Uses data from the Recoverability Gapsdata source.

l Category - Category of exposure

l Gap - Reason why the gap was triggered

l Group - DPA group, if applicable

l Host - Host for the replicated object

l Path - Path to the replicated object. The path will depend on the replicated object type (forexample, a directory path for a file system, or an application storage object)

l Replicated Object - Identifier for the replicated object

l Replication Method - Method by which the object is replicated

l Issued - Indicates when the gap was issued

l RP Time - Time the gap was triggered

l Storage Array - Source storage array for the replicated object

l Severity - Severity of the exposure

l Gap Details - Additional details on the gap

l GAP_REPORT_RP_ID -

l GAP_REPORT_storage array_ID -

l GAP_REPORT_GAP_ID -

l GAP_REPORT_replication method_ID -

l GAP_REASON_ID -

Reports by System Template

396 Dell EMC Data Protection Advisor Report Reference Guide

l GAP_REPORT_ACTUAL_PATH -

l GAP_REPORT_NODE_ID -

Recoverability GapsReturns recoverability gap details in a table report. Uses data from the Recoverability Gaps datasource.

l Category - Category of exposure

l Gap - Reason why the gap was triggered

l Group - DPA group, if applicable

l Host - Host for the replicated object

l Path - Path to the replicated object. The path will depend on the replicated object type (forexample, a directory path for a file system, or an application storage object)

l Replicated Object - Identifier for the replicated object

l Replication Method - Method by which the object is replicated

l Issued - Indicates when the gap was issued

l Replication Time - Time the gap was triggered

l Storage Array - Source storage array for the replicated object

l Severity - Severity of the exposure

l Gap Details - Additional details on the gap

l GAP_REPORT_RP_ID -

l GAP_REPORT_storage array_ID -

l GAP_REPORT_GAP_ID -

l GAP_REPORT_Replication Method_ID -

l GAP_REASON_ID -

l GAP_REPORT_ACTUAL_PATH -

l GAP_REPORT_NODE_ID -

Recoverability Host Analysis StatusReturns recoverability host analysis status details in a table report. Uses data form theRecoverability Host Analysis Tasks data source.

l task id - Identifier for the task

l Node - DPA object on which the task is run

l Task Name - Name for the task

l Start Date - Date task began

l End Date - Date task completed

l Status - Completion status of the task

l Run Id - Run identifier

l Ret Code - Return code

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 397

Recoverability Obsolete Recovery PointsReturns the recovery points that have been rendered out of date by changes in the source in atable report. Uses data from the Recoverability Obsolete Recovery Points data source.

l Service - DPA group in the view

l Client - Client for the managed object

l Replicated Object - Identifier for the object being replicated

l Storage Array - Identifier for the engine source of the object

l Storage Array Type - Type of engine. For example, Symmetrix

l Replication Method - Method by which object was replicated

l Status - Status of the recovery point. For example, valid, invalid

l Time - Timestamp of the recovery point

l RP_ID - Recovery point identifier

Recoverability Replication ConfigurationReturns recoverability replication configuration details in a table report. Uses data from theRecoverability Replication Configuration data source.

l Server - Name of the server on which the managed object is located

l Protected Object - Name of the file system or application being replicated

l Type - Type of backup object. For example, file system, database, application

l Source Storage Array - Name of the engine for the source object

l Source Device - Name of the device on the engine where the source object is located

l Replication Method - Method by which object is replicated

l Target Storage Array- Name of engine where the source is being replicated

l Target Device - Name of the device where the source is being replicated

l Hop - Number for the hop associated with the replication

Server to Storage ConfigurationReturns recoverability server to storage mappings details in a table report. Uses data from theRecoverability Server To Storage Mappings Tabular data source.

l Server - Name of the server containing the backup object

l Type - Type of backup object. For example, file system, database, application

l Protected Location - Name of the object

l Disk - Physical name of the device on the server containing the object

l VG - Name of the Volume Group on the host associated with the object

l LV - Name of the Logical Volume associated with the object

l Storage Array - Name of the storage array containing the physical device. For example, astorage array

l Storage Array Device - Name of the device on the storage array used by the object

Reports by System Template

398 Dell EMC Data Protection Advisor Report Reference Guide

Recoverability Server To Storage Mappings TopologyReturns recoverability server to storage mappings details in a topology report. Uses data from theRecoverability Server To Storage Mappings Topology data source.

l Type -

l ToolTip -

l Node - Name of the object

l Source - Source of the view

l Label - Name of the field returned

l Name - Name of the object

l Target - Name of the target

l Group - Name of the backup group

Recoverability StatusReturns recoverability status details in a health status report. Uses data from the RecoverabilityRecovery Points data source.

l Host - Server on which the replicated object is located

l Status - Status of the recovery point: valid, invalid

Recoverability Status By ObjectReturns recoverability status by object, which is the scope selected, in a health status report. Usesdata from the Recoverability Recovery Points data source.

l Status - Status of the scope selected. Taken from the worst status of the Recovery Point thatis part of the scope's decedents. The status can be valid, invalid

l Object - Name of the Scope

Recoverability Status Monitor By ClientReturns recoverability status monitor by client in a health status report. Uses data from the NodeDetails and Recoverability Gaps data sources.

l Client - Host for the replicated object

l Num Gaps - Number of gaps

Recoverability Storage To Server Mappings TopologyReturns recoverability storage to server mappings in a topology report. Uses data from theRecoverability Storage To Server Mappings Topology data source.

l Type -

l ToolTip -

l Node - Name of the object

l Source - Source of the view

l Label - Name of the field returned

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 399

l Name - Name of the object

l Target - Name of the target

l Group - Name of the backup group

Recoverability TasksReturns recoverability task request information in DPA. Uses data from the Recoverability Tasksdata source.

l Node - The node the task runs on

l Task Name - The task name

l Start Date - Start of task

l Status - status of task

Recoverability Unprotected NodesReturns all of the objects that are not fully recoverable in a table report. Uses data from theRecoverability Unprotected File Systems data source.

l Service - DPA group in the view

l Host - Name of the server that the object is on

l Replicated Object - Name of the object without a recovery point

Recoverability VisualizationReturns recoverability visualization in a topology chart. Uses data from the RecoverabilityVisualization data source.

l Protected Object Name - Name of the protected object

l Content -An xml representing the topology that is rendered to the UI

l Managed Object Type -Type of the replicated object

l Protected_Object_Parent_Name - hidden by default

l Protected Object Inspected Object Id - hidden by default

Recoverability Visualization DetailsReturns an overview for each Recovery Point in the system in a table chart. Uses data from theRecoverability Visualization Details data source.

l Replication Status - In_Progress, Valid, SLA, Invalid, Deleted, Missing, Unknown

l Status - Icon for the status of the Recovery Point (red, yellow, green)

l Replicated Object - Name of the replicated object

l Type - Type of the replicated object

l Hop - Number for the hop associated with the replication

l Storage Array - Storage array that contains this Recovery Point

l Replication Method - Method of replication used

l Recoverability Type - The type of the Recovery Point. Could be Crash Consistent orRecoverable. Applicable only to valid application based Recovery Points

Reports by System Template

400 Dell EMC Data Protection Advisor Report Reference Guide

l Base Time - Time this Recovery Point can roll back to in respect to the protected object

l Recovery-Point Name - name of the Recovery Point image (if exists)

l RP-ID - (Hidden field)

Remote Replication RPO for MV/AReturns remote replication RPO for MirrorView in a line chart. Uses data from the ConditionalReport, Mirrorview Replication Lag, and System Variable data sources.

l Storage Array - Name of the storage array for the object

l Name - Name of the file system or application being replicated

l Duration - Total duration of the replication (in seconds)

l RPO - Recovery point objective (in seconds)

l User-defined max RPO -

l RPO Heuristic Threshold -

Remote Replication RPO for SRDF/AReturns remote replication RPO for SRDF/A in a line chart. Uses data from the ConditionalReport, SRDF/A Replication Lag, and System Variable data sources.

l Storage Array - Name of the storage array where the object is located

l RDFG Number - Number of the RDFG

l Duration - Total duration of the replication (in seconds)

l R2_behind_R1 - Replication lag (in seconds)

l Default max RPO -

l user-defined max RPO -

Remote Replication RPO forecast for MV/AReturns trended forecast for remote replication for MirrorView objects in a line chart. Uses datafrom the Conditional Report, Mirrorview Replication Lag, and System Variable data sources.

l Storage Array - Name of the storage array for the object

l Name - Name of the file system or application being replicated

l Duration - Total duration of the replication (in seconds)

l RPO - Recovery point objective (in seconds)

l User-defined max RPO - As specified in the Protection Policy

l RPO Heuristic Threshold -

Remote Replication RPO forecast for SRDF/AReturns trended forecast for remote replication for SRDF/A objects in a line chart. Uses data fromthe Conditional Report, SRDF/A Replication Lag, and System Variable data sources.

l Storage Array - Name of the storage array where the object is located

l RDFG Number - Number of the RDFG

l Duration - Total duration of the replication (in seconds)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 401

l R2_behind_R1 - Replication lag (in seconds)

l Default max RPO -

l user-defined max RPO - As specified in the Protection Policy

Replication RPO ComplianceReturns an overview for compliance status for each Recovery Point in the system in a table. Usesdata from the Replication RPO Compliance data source.

l Compliance Status - Status of the compliance of the Recovery Point; for example, valid,invalid, N/A

l Host - Host the Recovery Point resides on

l Protected Object - Name of the protected object

l Copy Type - Type of the replication method

l Type - Type of the protected object; for example, file system, application

l Target Copy -

l Replication Method -

l Replication Alerts - Number of alerts that are are associated to the Recovery Point

l Compliance - (as a percentage) - Calculated by the formula: ((Current time minus the Time ofthe Recovery Point) divided by (RPO defined in the protection policy)) multiplied by 100

l Actual RPO - Calculated by the formula: Current time minus the Time of the Recovery Point

l Required RPO - RPO defined in the protection policy

l Target Copy Node ID - hidden by default

l Target Copy Node Type - hidden by default

Storage Replication StatusReturns all storage replication and their status in a table. Uses data from the Storage ReplicationStatus data source.

l Source Storage Array - Name of the storage array for the source object

l Source Device - Name of the device on the storage array where the source object islocated

l Replication Method - Method by which the object has been replicated

l Target Storage Array - Name of storage array where the source is being replicated

l Target Device - Name of the device where the source is being replicated

l Creation Time - Database creation time

l Deletion Time - Time that the replication was overridden

l Status - Replication status

Resource Utilization system templatesResource Utilization reports display information on the utilization of devices managed by thebackup server.

DPA provides two methods of measuring utilization:

l Current utilization is a measure of the percentage of the existing data file that is occupied.

Reports by System Template

402 Dell EMC Data Protection Advisor Report Reference Guide

l Logical utilization is a measure of the percentage that the existing contents of the maximumsize to which the datafile can grow.

Aggregate Network Interface PerformanceReturns information on the performance of a network in a line chart. Uses data from the NetworkInterface Performance data source.

l Packets - Number of packets leaving the interface (thousands/second)

Aggregate Virtual Network Interface PerformanceReturns information on the performance of a virtual network interface in a line chart. Uses datafrom the Network Interface Performance data source.

l Packets - Number of packets leaving the interface (thousands/second)

BTD Storage Utilization By NodeReturns information on storage utilization by object in a line chart. Uses data from the VTLConfiguration and VTL Status data sources.

l Hostname - Hostname of the VTL

l Utilization - Amount of disk capacity used by the VTL (in GB)

Backup Client OccupancyReturns backup client occupancy in a table report. Uses data from the Backup Client OccupancyBy Client - Logical and Backup Client Occupancy By Client - Physical data sources.

l Client - Name of the backup client

l Physical - Amount of physical storage used (in MB). Physical space is the total space taken upby data for the filespace including space that is no longer active in itself but part of a set ofdata that is still active

l Logical - Amount of logical storage used (in MB). Logical space is purely the space taken up byactive data

Backup Client Occupancy by PoolReturns the amount of physical and logical storage used over a period of time for each client in atable report. Uses data from the Backup Client Occupancy data source.

l Pool - Storage pool which contains the client filespace

l Physical - Amount of physical storage used (in MB). Physical space is the total space taken upby data for the filespace including space that is no longer active in itself but part of a set ofdata that is still active

l Logical - Amount of logical storage used (in MB). Logical space is purely the space taken up byactive data

Backup Device Utilization by DeviceReturns the percentage of time that a tape drive is in used over time in a column chart. Uses datafrom the Tape Drive Performance From Best Source data source.

l Device Host - Name of the host that the device is connected to

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 403

l Device Name - Name of the device

l Active - Throughput of the device when performing write operations (as a percentage)

Backup Server UtilizationReturns the percentage utilization of a backup server in a line chart. Uses data from the BackupServer Utilization data source.

l Server - Name of the backup server

l Utilization - Percentage that the server is being utilized

CG UtilizationReturns information on Consistency Group utilization in a line chart. Uses data from ConsistencyGroup Copy Performance.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the Consistency Group

l Name - Name of the copy within the consistency group

l Transfer Time - Percentage of time that the link was up

l Initialization Time - Percentage of time that the link was initializing

l High Load Time - Percentage time of High load

Client Occupancy SummarySummary of the client occupancy details in a table report. Uses data from the Backup ClientOccupancy By Client - Logical and Backup Client Occupancy By Client - Physical data sources.

l Client - Name of the backup client

l Physical - Amount of physical storage used (in MB). Physical space is the total space taken upby data for the filespace including space that is no longer active in itself but part of a set ofdata that is still active

l Logical - Amount of logical storage used (in MB). Logical space is purely the space taken up byactive data

Client Occupancy TrendReturns the client occupancy trend in a line chart. Uses data from the Backup Client OccupancyBy Client - Logical and Backup Client Occupancy By Client - Physical data sources.

l Client - Name of the backup client

l Physical - Amount of physical storage used (in MB). Physical space is the total space taken upby data for the filespace including space that is no longer active in itself but part of a set ofdata that is still active

l Logical - Amount of logical storage used (in MB). Logical space is purely the space taken up byactive data

Reports by System Template

404 Dell EMC Data Protection Advisor Report Reference Guide

Current Memory Usage By NodeReturns current memory usage by object in a column chart. Uses data from the MemoryConfiguration and Memory Status data sources.

l Hostname - Name of the host

l Sub Name - Name of the storage array

l Total Memory - Total of the physical and virtual memory (in MB)

l Used - Amount of memory in use on the machine (in MB)

Data Domain Average Hourly Data IngestedReturns Data Domain average hourly data ingested in a line chart. Uses data from the Tape DrivePerformance Write Throughput (MB) data source.

l Hostname - Name of the client

l Library Name - Name of the tape library to which the drive belongs

l Avg. Data Ingested - Amount Count and Write Throughput (MB/second)

Data Domain Boost StatisticsReturns current data domain boost information in a table report. Uses data from the Data DomainBoost Statistics data source.

l Hostname - Name or IP address of the Data Domain server

l Pre Compression Received - Number of pre-compression KB/second received

l Post Compression Received - Number of local compression KB/second received

l Num Bytes Received - Number of physical network bytes/second received

l Num Bytes Read - Number of bytes/second read

Data Domain Boost Storage Unit StatisticsReturns information on Data Domain Boost Storage Unit statistics in a table. Uses data from theData Domain Boost Storage Unit Statistics.

l Hostname - Name or IP address of the Data Domain server

l Name - Storage unit name

l Original Size - Storage unit original size (in MB)

l Post Global Dedupe Size - Size after global deduplication (in MB)

l Post Local Compression Size - Size after deduplication + local compression (in MB)

l Metadata Size - Size of metadata (in MB)

Data Domain Client Deduplication RatioReturns information on Data Domain cilent deduplication ratios in a table. Uses data from theDeduplication Status data source.

Note that the dedup ratio field in this report are based on metrics at the time that the data wasingested on the Data Domain. It is not possible to report on the physical size of files being storedon the Data Domain. This is a current limitation within Data Domain.

The deduplication value is multiplier of how many times smaller the post-dedup size is andcalculates as pre-dedup divided by post-dedup. Note that in many cases exact numbers may not

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 405

match between calculations and reports in a table because the size columns are auto-scaled androunded to 3 decimal places.

l Data Domain Name - Name of the Data Domain

l Client - Name of the client

l Dedup Ratio - The percentage of data that has been de-duped; Deduplication ratio for clientcalculated as (Pre Deduplication/Post<p>Deduplication)-1/(Pre Deduplication/PostDeduplication

l Post-Deduplication - Size after compression and deduplication

l Pre-Deduplication- Size before compression and deduplication

l Backup Application - the backup application associated with the backups

Data Domain Compression FactorReturns the ratio for the size of data compressed against the original data size over time in a linechart. Uses data from the Access Group Configuration and VTL Status data sources.

l Hostname - Name or IP address of the Data Domain server

l Compression Factor - Ratio of compressed data size to data backed up

Data Domain Compression OverviewReturns information on Data Domain compression overview in a table.

The report includes information about the following:

l Pre Compression - Uncompressed data backed up by the system

l Post Compression - Used space of file system "data"

l Global Compression Factor - Size after deduplication (in MB)

l Local Compression Factor - Size after deduplication + local compression (in MB)

l Total Compression Factor (without Reduction %) - Ratio between the Pre Compression Sizeand the Post Local Compression Size (in MB)

l Currently Used - The current information about the complete system

l Written in last 24 hours - Information about the last 24 hours

Result values in the report can differ from results in DD System Manager because data in thereport comes from SNMP values and it might differ from the command line output. SNMP cache isupdated every hour.

The report start time does not affect the results because only the end time is used.

The Pre Compression and Post Compression values are scaled to MB by default.

Note: The agent collects data from Data Domain as it is reported and converts it to bytes.Therefore, if Data Domain reports the size as 0 GiB, the agent also reports it as 0.Thecompression factors are calculated based on the size and can be 0.

Data Domain Compression Ratio CountReturns a count per Compression Ratio threshold in a column chart report. Thresholds areCompression Ratio of below 5; between 5 and 10; and greater than 10. Uses data from the VTLStatus data source.

l <5x - Count of occurrences of Compression Ratio value below 5.

Reports by System Template

406 Dell EMC Data Protection Advisor Report Reference Guide

l 5x–10x - Count of occurrences of Compression Ratio value between 5 and 10.

l >10x - Count of occurrences of Compression Ratio value above 10.

Data Domain Daily Compression StatisticsReturns Data Domain daily compression statistics in a line chart. Uses data from the DailyCompression Statistics data source.

l Hostname - Name or IP address of the Data Domain server

l Total Compression Factor - Difference between the Pre Compression Size and the Post LocalCompression Size (in MB)

l Dedupe Ratio - Difference between the Deduplication Ratio and the Total Compression Factor(as a percentage)

l Global Compression Factor - Size after deduplication (in MB)

l Local Compression Factor - Size after deduplication + local compression (in MB)

l Reduction - (as a percentage)

Data Domain Data IngestedReturns information on Data Domain data ingested in a line chart over time. Uses data from theData Ingested Usage data source.

l Hostname - Name of the Data Domain

l Pre Compression - Uncompressed data backed up by the system

l Post Compression - Used space of file system "data"

Data Domain Data Written ToReturns data on the statistics of Data Domain daily compression in a table. Uses data from theDaily Compression Statistics data source.

l Pre Compression Size - Size before compression (in MB)

l Post Global Compression Size - Size after deduplication (in MB)

l Post Local Compression Size - Size after deduplication + local compression (in MB)

Data Domain DeDuplication RatioReturns the ratio for the size of data deduplicated against the original data size over time in a linechart. Uses data from the Access Group Configuration and VTL Status data sources.

l Hostname - Name or IP address of Data Domain

l Dedupe Ratio - Difference between the Deduplication Ratio and the Total Compression Factor(as a percentage)

Data Domain File Distribution By CountReturns Data Domain file distribution by count.

l DataDomain name - Data Domain host

l Less than day - Number of files on the Data Domain with an age of less than a day

l 1 day-1week - Number of files on the Data Domain with an age of more than a day but less thana week

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 407

l 1-2 weeks - Number of files on the Data Domain with an age of more than a week but less than2 weeks

l 2 weeks-1 month - Number of files on the Data Domain with an age of more than 2 weeks butless than a month

l 1-2 months - Number of files on the Data Domain with an age of more than a month but lessthan 2 months

l 2-3 months - Number of files on the Data Domain with an age of more than 2 months but lessthan 3 months

l 3-6 months - Number of files on the Data Domain with an age of more than 3 months but lessthan 6 months

l 6 months-1 year - Number of files on the Data Domain with an age of more than 6 months butless than a year

l Greater than year - Number of files on the Data Domain with an age of more than a year

Data Domain File Distribution By Count per MTreeReturns Data Domain file distribution by count per MTree in a table view. Uses the Data DomainFile Age and Size data source.

l Data Domain name - Data Domain host

l MTree Name - Name of MTree in Data Domain

l Less than day - Number of files on theMTree with an age of less than a day

l 1 day-1week - Number of files on the MTree with an age of more than a day but less than aweek

l 1-2 weeks - Number of files on the MTree with an age of more than a week but less than 2weeks

l 2 weeks-1 month - Number of files on the MTree with an age of more than 2 weeks but lessthan a month

l 1-2 months - Number of files on the MTree with an age of more than a month but less than 2months

l 2-3 months - Number of files on the MTree with an age of more than 2 months but less than 3months

l 3-6 months - Number of files on the MTree with an age of more than 3 months but less than 6months

l 6 months-1 year - Number of files on the MTree with an age of more than 6 months but lessthan a year

l Greater than year - Number of files on the MTree with an age of more than a year

Data Domain File Distribution By SizeReturns Data Domain file distribution by size.

l DataDomain name - Data Domain host

l Less than day - Total size files on the Data Domain with an age of less than a day

l 1 day-1 week - Total size files on the Data Domain with an age of more than a day but less thana week

l 1-2 weeks - Total size files on the Data Domain with an age of more than a week but less than 2weeks

Reports by System Template

408 Dell EMC Data Protection Advisor Report Reference Guide

l 2 weeks-1 month - Total size files on the Data Domain with an age of more than 2 weeks butless than a month

l 1-2 months - Total size files on the Data Domain with an age of more than a month but lessthan 2 months

l 2-3 months - Total size files on the Data Domain with an age of more than 2 months but lessthan 3 months

l 3-6 months - Total size files on the Data Domain with an age of more than 3 months but lessthan 6 months

l 6 months-1 year - Total size files on the Data Domain with an age of more than 6 months butless than a year

l Greater than year - Total size files on the DataDomain with an age of more than a year

Data Domain File Distribution By Size per MTreeReturns Data Domain file distribution by size per MTree in a table view. Uses data from the DataDomain File Age and Size data source.

l Data Domain name - Data Domain host

l MTree Name - Name of MTree in Data Domain

l Less than day - Total size files on the MTree with an age of less than a day

l 1 day-1 week - Total size files on the MTree with an age of more than a day but less than aweek

l 1-2 weeks - Total size files on the MTree with an age of more than a week but less than 2weeks

l 2 weeks-1 month - Total size files on the MTree with an age of more than 2 weeks but lessthan a month

l 1-2 months - Total size files on the MTree with an age of more than a month but less than 2months

l 2-3 months - Total size files on the MTree with an age of more than 2 months but less than 3months

l 3-6 months - Total size files on the MTree with an age of more than 3 months but less than 6months

l 6 months-1 year - Total size files on the MTree with an age of more than 6 months but lessthan a year

l Greater than year - Total size files on the MTree with an age of more than a year

Data Domain Filesystem UtilizationReturns Data Domain utilization trend values over time in a line chart report. Uses data from theFilesystem Capacity by Client and Filesystem Status data sources.

l Utilization- Data Domain filesystem utilization value (as a percentage)

Data Domain Filesystem Utilization for Warning/Critical SystemsReturns utilization values over time for Data Domains with high utilization in a trend report. Autilization value over 80% is considered as high. Uses data from the Filesystem Capacity by Clientand Filesystem Status data sources.

l Utilization - Utilization trend value for Data Domain over time.

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 409

Data Domain Filesystem Utilization Status CountReturns an overall count for utilization status of Normal, Warning, or Critical in a column chartreport. Uses data from the Filesystem Capacity by Client and Filesystem Status data sources.

l Normal - Count of occurrences of normal utilization values. A normal utilization value isconsidered as anything below 80%.

l Warning - Count of occurrences of warning utilization values. Warning utilization value isconsidered as anything between 80%–90%.

l Critical - Count of occurrences of critical utilization values. Critical utilization value isconsidered as anything over 90%.

Data Domain Group Deduplication RatioReturns deduplication ratio information for a Data Domain Group. Uses the Data Domain ClientGroup Configuration, Data Domain Client Group Statistic, and Data Domain Clients per ClientGroup data sources.

l Data Domain name - Data Domain host

l Client Name - Name of the client

l Group Name - Name of the client group

l Sub Name - <database instance>.<schema name>; Only for Oracle RMAN

l Start Time - The start of the period for which the information is valid

l End Time - The end of the period for which the information is valid

l Pre-Deduplication - The size before deduplication and local compression

l Post-Deduplication - The size after deduplication and local compression

l Dedup Value - ((dedupe value - 1) / dedupe value) * 100

l Dedup Ratio - The percentage of data that has been de-duped; Deduplication ratio for clientcalculated as (Pre Deduplication/Post<p>Deduplication)-1/(Pre Deduplication/PostDeduplication

Data Domain Low System Compression Ratio TrendReturns compression ratio values over time for Data Domains with low compression ratio in a trendreport. A low Compression ratio is considered anything below 5. Uses data from the VTL Statusdata source.

l Compression Ratio - Compression Ratio trend value for Data Domain over time.

Data Domain Reduction RatiosReturns information on Data Domain reduction ratios in a line chart over time. Uses data from theVTL Status and Daily Compression Statistics data sources.

l Hostname - Name of the Data Domain

l Daily Backup Volume - Daily size before compression (in MB)

l Daily Reduction - he daily reduction ratio achieved

l Total Reduction - The total reduction ratio achieved

Reports by System Template

410 Dell EMC Data Protection Advisor Report Reference Guide

Data Domain System UtilizationReturns information on Data Domain system utilization in a line chart. Uses data from the DataIngested Usage and Filesystem Capacity by Client data sources.

l Hostname - Name of the Data Domain

l Capacity - Total capacity of the file system "data" (in MB)

l Pre Compression - Uncompressed data backed up by the system

l Post Compression - Used space of file system "data"

Data Domain UtilizationReturns information on Data Domain utilization in a table. Uses data from Data Domain Modes,Filesystem Status, Filesystem Utilization by Client, and Filestystem Capacity by Client.

l Hostname - Name of the host on which the file system is mounted

l Capacity - Total capacity on the host (in MB)

l Sub name - Identifier for the storage array

l Filesystem - Name of the file system

l Used Capacity - Amount of space used on the file system (in MB)

l Utilization - Average utilization for all hosts (as a percentage)

l Free Capacity - Amount of free space on the file system (in MB)

l Dedup Ratio - The dedup ratio that Data Domain is achieving

l Last Days Change (GB)- The amount of space used per Data Domain in the 24 hours

l Cleanable Space - Amount of space that can be cleaned (in MB)

Data Domain Tier UtilizationReturns information on Data Domain system tier capacity and utilization in a table report. Usesdata from the Data Domain Tier Status data source.

l Hostname - Name of the Data Domain

l Tier - Name of the tier

l Capacity - Total storage space in MB

l Used Capacity - Post compression size in MB

l Available Capacity - Available storage space in MB

l Pre Compression Size - Pre compression size in MB

l Cleanable Space - Amount of cleanable space in MB

l Utilization - Capacity utilization on the tier (%)

DataProtector Database UsageReturns Data Protector database usage in a line chart. Uses data from the Database Usage datasource.

l Server - Name of the Data Protector Server

l Database Name - Name of the internal database

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 411

l Table Name - Name of the database table

l Size - Size of the table (in MB)

l Used Records - Number of records used in the table

l Total Records - Number of total records allocated in the table

DataProtector System DynamicsReturns Data Protector system dynamic details in a table report. Uses data from the SystemDynamics data source.

l Server - Name of the Data Protector server

l Client - Name of the Data Protector client

l Num Filenames - Total number of filenames in the internal database

l Num Active Filenames - Number of active filenames in the internal database

l Num Created Per Day - Average number of files created per day (as a percentage)

l Num Deleted Per Day - Average number of files deleted per day (as a percentage)

l Active Growth Per Year - Growth in active filenames over the year (as a percentage)

l Total Growth Per Year - Total growth in files over the year (as a percentage)

l Dynamics - One of: Low, Medium, High, Critical

EDL 3D Compression RatioReturns the ratio for the size of data compressed against the original data size over time in a linechart. Uses data from the VTL Status data source.

l Hostname - Hostname of the VTL

l Data Compression Ratio - Ratio of compressed data size to data backed up

EDL 3D DeDupe QueueReturns the EDL 3D deduplication queue in a line chart. Uses data from the VTL Status datasource.

l Hostname - Hostname of the VTL

l Waiting for Dedup - VTL is waiting for deduplication to begin (in MB)

l Wont be Deduped - VTL will not be deduplicated (in MB)

EDL 3D Total Reduction RatioReturns EDL 3D total reduction ratio in a line chart. Uses data from the VTL Status data source.

l Hostname - Hostname of the VTL

l Total Reduction Ratio - Ratio of data protected to data backed up

Fabric UtilizationReturns fabric utilization in a pie chart. Uses data from the Fibre Channel Port Status data source.

l Count - Port count

Reports by System Template

412 Dell EMC Data Protection Advisor Report Reference Guide

Fibre Channel Port UtilizationReturns the utilization of Fibre Channel ports in a line chart. Uses data from the Fibre ChannelPerformance By Port and Fibre Channel Port Status data sources.

l Hostname - Name of the object

l Sub Name - Name of server instance, if applicable

l Port - Port identifier. For example, Port 1

l Data Out Utilization - Amount of data sent from the port (as a percentage)

l Data In Utilization - Amount of data received by the port (as a percentage)

Filesystem Aggregate UtilizationReturns file system aggregate utilization details in a line chart. Uses data from the FilesystemUtilization data source.

l Filesystem Utilization - Average file system utilization for all hosts (as a percentage)

Filesystem Average Disk ActivityReturns the average percentage of time that the disks are busy across all file servers from whichthe report has been run in a line chart. Uses data form the Filesystem Disk Activity and FilesystemDisk Status data sources.

l Filesystem node - Name of the object to which the file system is attached

l Filesystem - Name of the file system

l Data Disks -

l Data busy - (as a percentage)

l Parity Disks -

l Parity Busy - (as a percentage)

Filesystem Average Disk Activity for rulesetReturns details filesystem average disk activity in a table report. Report for NetApp volume wouldbenefit from more disks rule. Uses data from the Filesystem Disk Activity, Filesystem Disk Status,and User Input data sources.

l Filesystem node - Name of the object to which the file system is attached

l Alert - Identifier of the alert

Filesystem Disk ActivityReturns the file system disk activity in a line chart. Uses data from the Filesystem Disk Activitydata source.

l Filesystem node - Name of the object to which the file system is attached

l Filesystem - Name of the file system

l Filesystem Sub Name - Name of the storage array on which the file system resides

l Disk node - Name of the object to which the disk is attached

l Disk - Name of the disk

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 413

l Busy - Average activity level for the disks (as a percentage)

Filesystem Peak Snapshot UtilizationReturns file system peak snapshot utilization in a table report. Uses data from the FilesystemConfiguration and Filesystem Status data sources.

l Hostname - Name of the host on which the file system is mounted

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Peak Snapshot Utilization - (as a percentage)

l Cleanable Space - Amount of space that can be cleaned (in MB)

Filesystem Snapshot UtilizationReturns file system snapshot utilization in a line chart. Uses data from the FilesystemConfiguration and Filesystem Status data sources.

l Hostname - Name of the host on which the file system is mounted

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Snapshot Utilization - (as a percentage)

l Cleanable Space - Amount of space that can be cleaned (in MB)

Filesystem UtilizationReturns the utilization of all file systems on a host or group of hosts over time in a table report.Uses data from the Filesystem Configuration and Filesystem Status data sources.

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Space Usage - Amount of space used on the file system (in MB)

l Inode Usage - (1000)

l Capacity - Total space on the file system available for standard usage (in MB)

l Files - Maximum number of files on the file system (1000)

l Space Utilization - (as a percentage)

l Inode Utilization - (as a percentage)

l Cleanable Space - Amount of space that can be cleaned (in MB)

Filesystem Utilization By NodeReturns the average file system utilization on a host over time by averaging the utilization acrossall file systems on that host in a line chart. Uses data from the Filesystem Utilization By Client datasource.

l Hostname - Name of the host

l Utilization - Average file system utilization for each host (as a percentage)

Reports by System Template

414 Dell EMC Data Protection Advisor Report Reference Guide

Filesystem Utilization By PartitionReturns file system utilization by partition in a line chart. Uses data from the Filesystem UtilizationBy Partition data source.

l Hostname - Name of the host

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Filesystem Utilization - Average file system utilization for the file system (as a percentage)

Filesystem Utilization CurrentReturns the percentage of the existing data file that is occupied in a column chart. Uses data fromthe Filesystem Utilization By Partition data source.

l Hostname - Name of the host

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Filesystem Utilization - Average file system utilization for the file system (as a percentage)

Filesystem Utilization for rulesetReturns details on the filesystem utilization in a table report. Report for Filesystem utilization highand increasing rule. Uses data from the Filesystem Utilization By Partition and User Input datasources.

l Hostname - Name of the host

l Sub Name - Identifier for the Storage Array

l Filesystem - Name of the file system

l Alert - Identifier of the alert

HP VLS Capacity Utilization TrendReturns HP Virtual Library System capacity utilization trend in a line chart. Uses data from the VTLStatus data source.

l Hostname - Hostname of the VTL

l Physical Capacity Utilization - Percentage usage of physical capacity

l Logical Capacity Utilization - Percentage usage of logical capacity

HP VLS ThroughputReturns Virtual Library System throughput in a line chart. Uses data from the VTL Status datasource.

l Hostname - Hostname of the VTL

l Throughput - Device throughput (MB/second)

l Replication Throughput In - Inbound replication throughput (MB/second)

l Replication Throughput Out - Outbound replication throughput (MB/second)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 415

MTree Daily Compression StatisticsReturns MTree daily compression statistics in a table report. Uses data from the MTree DailyCompression Statistics data source.

l Hostname - Name or IP address of the Data Domain server

l Name - MTree name

l Pre Compression Size - Size before compression (in MB)

l Post Global Compression Size - Size after deduplication (in MB)

l Post Local Compression Size - Size after deduplication + local compression (in MB)

MTree Quota Utilization'Returns the MTree quota utilization details per MTree in a line graph over time. Uses data fromthe Quota Configuration data source.

l Pre Compression Soft Limit Utilization - The Pre Compression Size divided by the Soft Limitvalue, then this value is multiplied by 100

l Pre Compression Hard Limit Utilization - The Pre Compression Size divided by the Hard Limitvalue, then this value is multiplied by 100

MTree Physical Capacity StatisticsReturns current statistics on Data Domain physical capacity. Uses data from the MTree PhysicalCapacity Statistics data source. Drilling down on the report returns statistics per MTree.

l Hostname - Name of the backup server

l Name - Name of the MTree

l Pre Compression Size - Size before compression

l Post Global Compression Size - Size after de-dupe

l Post Local Compression Size - Size after compression

l Measurement Time - Time at which the above statistics were taken from the MTree snapshot

MTree Physical Capacity Statistics TrendReturns trend information on Data Domain physical capacity over time. Uses data from the MTreePhysical Capacity Statistics data source.

l Hostname - Name of the backup server

l Name - Name of the MTree

l Pre Compression Size - Size before compression

l Post Global Compression Size - Size after de-dupe

l Post Local Compression Size - Size after compression

Memory UtilizationReturns the aggregate memory utilization over time of memory on all hosts selected in the reportin a line chart. Uses data from the Memory Configuration and Memory Status data sources.

l Utilization - (as a percentage)

Reports by System Template

416 Dell EMC Data Protection Advisor Report Reference Guide

Memory Utilization By NodeReturns the utilization over time of memory on a per host basis in a line chart. Uses data from theMemory Configuration and Memory Status data sources.

l Hostname - Name of the host

l Sub Name - Name of the storage array

l Used - Amount of memory in use on the machine (in MB)

l Utilization - (as a percentage)

Memory Utilization CurrentReturns the percentage of the existing data file that is occupied in a column chart. Uses data fromthe Memory Configuration and Memory Status data sources.

l Utilization - (as a percentage)

Network Interface Performance By InterfaceReturns network interface performance by interface in a line chart. Uses data from the NetworkInterface Performance By Interface data source.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

l Data In - Amount of data coming into the interface (KB/second)

l Data Out - Amount of data leaving the interface (KB/second)

l Packets In - Number of packets coming in to the interface (1000s/second)

l Packets Out - Number of packets leaving the interface (1000s/second)

l Data - (KB/second)

l Packets - (1000s/second)

Network Interface Performance By NodeReturns network interface performance by object in a line chart. Uses data from the NetworkInterface Performance By Node data source.

l Hostname - Name of the host on which the network interface is located

l Data - (KB/second)

l Packets - (1000s/second)

Network Interface Performance SummaryThis report shows the maximum and average throughput by network interface, and performance inkilobytes per second by interface.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 417

l Max Throughput - (KB/second)

l Average Throughput - (KB/second)

Network Interface Utilization By Interface and DirectionReturns network interface utilization by interface and direction in a line chart. Uses data from theNetwork Interface Performance By Interface and Network Interface Status data sources.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

l Data In Utilization - Amount of data coming into the interface (as a percentage)

l Data Out Utilization - Amount of data leaving the interface (as a percentage)

NetWorker VBA UtilizationReturns information on NetWorker Virtual Basic Appliance (VBA) utilization in a table. Uses datafrom the VBA Configuration and VBA Status data sources.

l Server - Name of the Networker server

l Name - Name of the VBA

l Total Capacity - Total capacity (MB)

l Used Capacity - Used capacity of the VBA (MB)

l Capacity Utilization - Percentage usage of total capacity

Process CPU UtilizationReturns the CPU utilization of all processes running on a machine over the report’s time period in aline chart. Uses data from the Process Status data source.

l Hostname - Name on which the process is running

l PID - Identifier of the process

l Process Name - Name of the process

l CPU - Amount of CPU used by the process (as a percentage)

Process CPU Utilization For Specific ProcessReturns the utilization of CPUs for specific processes over a period of time in a line chart. Usesdata from the Process Status data source.

l Hostname - Name on which the process is running

l PID - Identifier of the process

l Process Name - Name of the process

l CPU - Amount of CPU used by the process (as a percentage)

Reports by System Template

418 Dell EMC Data Protection Advisor Report Reference Guide

Process Memory UsageReturns the memory usage of processes running on a machine in a line chart. Uses data from theProcess Status data source.

l Hostname - Name on which the process is running

l PID - Identifier of the process

l Process Name - Name of the process

l Memory - Amount of memory used by the process (in MB)

RecoverPoint Journal UtilizationReturns the percentage journal utilization (journal usage of total journal capacity) over time in aline chart. Uses data from the Consistency Group Copy Status data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the Copy

l Journal Utilization - Current utilization of the journal (as a percentage)

System Statistics RAGReturns system statistics Red, Amber, Green (RAG) traffic-light style report details in a healthstatus report. Uses data from the Disk Activity By Device, Network Interface Status, NetworkInterface Performance By Interface, Memory Status, Filesystem Utilization By Partition, ProcessorUtilization By Client, and Memory Configuration data sources.

l Hostname - Name of the host

l CPU - Utilization on the CPU (as a percentage)

l Memory - Utilization on the memory (as a percentage)

l Node - Name of the object

l Disk - Utilization on the disk (as a percentage)

l Filesystem - Utilization on the file system (as a percentage)

l Net In - Net utilized in (as a percentage)

l Net Out - Net utilized out (as a percentage)

TSM Client Occupancy SummarySummary of TSM client occupancy details in a table report. Uses data from the Backup ClientOccupancy By Client - Logical, Backup Client Occupancy By Client - Physical, and TSM TotalLogical Occupancy data sources.

l Client - Name of the backup client

l Physical - Amount of physical storage used (in MB). Physical space is the total space taken upby data for the filespace including space that is no longer active in itself but part of a set ofdata that is still active

l Logical - Amount of logical storage used (in MB). Logical space is purely the space taken up byactive data

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 419

TSM Database UtilizationReturns the utilization of the TSM database and recovery log over time in a line chart. Uses datafrom the TSM Database Utilization data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Object - One of: Database, Recovery Log

l Utilization - Utilization of the assigned capacity (as a percentage)

TSM Storage Pool UtilizationReturns the utilization of storage pools over time against the high migration point and lowmigration point values. Uses data from the Backup Pool Configuration and Backup Pool Statusdata sources. This report allows users to see how close pool utilization is to the migrationthresholds.

l Server - Hostname of backup server on which the pool is located

l Sub Name - Name of TSM server instance

l Pool Name - Name of the storage pool

l Utilization - Percentage of storage pool utilized

l High Mig. Pct - Value at which the TSM server automatically starts migration for this storagepool. This value is determined when the number of volumes containing data reaches thispercentage of the total number of volumes in the storage pool. The total number of volumesincludes the maximum number of scratch volumes

l Low Mig. Pct - Value at which the TSM server stops migration for this storage pool. This valueis determined when the number of volumes containing data reaches this percentage of thetotal number of volumes in the storage pool

Tape Library Aggregate UtilizationReturns the total utilization across all tape libraries in a column chart. Uses data from the TapeLibrary Configuration and Tape Library Status data sources.

l Utilization - Number of slots that are occupied with tapes (as a percentage). This value is thecombined utilization for all tape libraries managed by the ACSLS server

Tape Library Aggregate Utilization TrendReturns the aggregate utilization across all tape libraries over a given time period in a line chart.Uses data from the Tape Library Configuration and Tape Library Status data sources.

l Utilization - Number of slots that are occupied with tapes (as a percentage). This value is thecombined utilization for all tape libraries managed by the ACSLS server

Tape Library Capacity UtilizationReturns tape library capacity utilization in a line chart. Uses data from the Tape Library Status datasource.

l Hostname - Name of the device being monitored

Reports by System Template

420 Dell EMC Data Protection Advisor Report Reference Guide

l Library Name - Name of the tape library. This field is not populated if monitoring a devicedirectly. Instead its name is populated in the Hostname field. This field is populated ifmonitoring a device that manages multiple libraries such as an EDL

l Physical Capacity Utilization - Percentage usage of physical capacity

l Logical Capacity Utilization - Percentage usage of logical capacity

Tape Library Compression RatioReturns the size of data compressed against the original data size over time in a line chart. Usesdata from the Tape Library Status data source.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring a devicedirectly. Instead its name is populated in the Hostname field. This field is populated ifmonitoring a device that manages multiple libraries such as an EDL

l Data Compression Ratio - Ratio of compressed data size to data backed up

Tape Library Deduplication RatioReturns the size of data deduplicated against the original data size over time in a line chart. Usesdata form the Tape Library Status data source.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring a devicedirectly. Instead its name is populated in the Hostname field. This field is populated ifmonitoring a device that manages multiple libraries such as an EDL

l Dedupe Ratio - Difference between the Deduplication Ratio and the Total Compression Factor(as a percentage)

Tape Library Slot Utilization TrendReturns the utilization of each tape library at a point in time and trended over time in a line chart.Uses data from the Num Volumes and Tape Library Configuration data sources.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring a devicedirectly. Instead its name is populated in the Hostname field. This field is populated ifmonitoring a device that manages multiple libraries such as an EDL

l Slot Utilization -

Tape Library ThroughputReturns tape library throughput details in a line chart. Uses data from the Tape Library Status datasource.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring a devicedirectly. Instead its name is populated in the Hostname field. This field is populated ifmonitoring a device that manages multiple libraries such as an EDL

l Throughput - Throughput of size to duration (MB/sec)

l Replication Throughput In - Inbound replication throughput (MB/second)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 421

l Replication Throughput Out - Outbound replication throughput (MB/second)

Tape Library Usage By LibraryReturns tape library usage by library details in a column chart. Uses data from the Tape LibraryConfiguration and Tape Library Status data sources.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring a devicedirectly. Instead its name is populated in the Hostname field. This field is populated ifmonitoring a device that manages multiple libraries such as an EDL

l Num Volumes - Number of volumes in the library

l Num Empty Slots - Number of empty slots

Tape Library UtilizationReturns the utilization of each individual tape library at a point in time in a column chart. Uses datafrom the Tape Library Configuration and Tape Library Status data sources.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring a devicedirectly. Instead its name is populated in the Hostname field. This field is populated ifmonitoring a device that manages multiple libraries such as an EDL

l Utilization - (as a percentage)

Tape Library Utilization TrendReturns the utilization trend of each individual tape library at a point in time in a line chart. Usesdata from the Tape Library Configuration and Tape Library Status data sources.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring a devicedirectly. Instead its name is populated in the Hostname field. This field is populated ifmonitoring a device that manages multiple libraries such as an EDL

l Utilization - (as a percentage)

Tape Library Volume Utilization TrendReturns the utilization of each tape library volume over time in a line chart. Uses data from theTape Library Volume Status data source.

l Hostname - Name of the device being monitored

l Library Name - Name of the tape library. This field is not populated if monitoring a devicedirectly. Instead its name is populated in the Hostname field. This field is populated ifmonitoring a device that manages multiple libraries such as an EDL

l Utilization - (as a percentage)

Reports by System Template

422 Dell EMC Data Protection Advisor Report Reference Guide

Top 10 Offending ClientsReturns the top ten offending clients in a table report. Uses data from the Backup Device Config,Backup Device Status, Backup Job Details, Backup Job Media, and Pools On Data Domain datasources.

l Server - Name of the backup server

l Client - Name of the client backed up

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Data Domain Name - Name of the Data Domain

l De-Dupe Ratio - (as a percentage)

Top 10 Offending JobsReturns the top ten offending jobs in a table report. Uses data from the Backup Device Config,Backup Device Status, Backup Job Details, Backup Job Media, and Pools On Data Domain datasources.

l Server - Name of the backup server

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Level - Level of the backup. This is hardcoded to full

l Size - Amount of data backed up (in MB)

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Data Domain Name - Name of the Data Domain

l De-Dupe Ratio - (as a percentage)

Top 5 Busiest ServersReturns the top five busiest servers in a table report. Uses data from the Processor Utilization ByClient data source.

l Node - Name of the host

l CPU Utilization - Utilization on the CPU (as a percentage)

VTL Aggregate Storage UtilizationReturns VTL aggregate storage utilization details in a line chart. Uses data from the VTLConfiguration and VTL Status data sources.

l Utilization - (as a percentage)

Virtual Fibre Channel Port UtilizationReturns the utilization of virtual Fibre Channel ports in a line chart. Uses data from the FibreChannel Performance By Port and Fibre Channel Port Status data sources.

l Hostname - Name of the object

l Sub Name - Name of server instance, if applicable

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 423

l Port - Port identifier. For example, Port 1

l Data Out Utilization - Amount of data sent from the port (as a percentage)

l Data In Utilization - Amount of data received by the port (as a percentage)

Virtual Host Memory UtilizationReturns virtual host memory utilization details in a line chart. Uses data from the Virtual HostConfiguration and Virtual Host Status data sources.

l Virtual Host - Name of the Virtual Centre server

l Memory Used - Amount of memory used by the virtual machine (in MB)

l Utilization - Amount of memory utilization (as a percentage)

Virtual Network Interface Performance By InterfaceReturns the virtual network interface performance by interface in a line chart. Uses data from theNetwork Interface Performance By Interface data source.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

l Data In - Amount of data coming into the interface (KB/second)

l Data Out - Amount of data leaving the interface (KB/second)

l Packets In - Number of packets coming in to the interface (1000s/second)

l Packets Out - Number of packets leaving the interface (1000s/second)

l Data -

l Packets -

Virtual Network Interface Performance By NodeReturns the virtual network interface performance by object in a line chart. Uses data from theNetwork Interface Performance By Node data source.

l Hostname - Name of the host on which the network interface is located

l Data - Amount of data leaving the object (KB/second)

l Packets - Number of packets leaving the object (1000s/second)

Virtual Network Interface Performance SummarySummary of the virtual network interface performance in a column chart. Uses data from theNetwork Interface Performance By Interface data source.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

l Max Throughput - (KB/second)

l Average Throughput - (KB/second)

Reports by System Template

424 Dell EMC Data Protection Advisor Report Reference Guide

Xsigo Infiniband Port UtilizationReturns the percentage utilization of the Infiniband port or ports in a line chart. Uses data from theInfiniband Port Status and Infiniband Port Performance data sources.

l Hostname - Name of the Xsigo Director object

l Sub Name - Identifier for the switch

l Name - Identifier for the InfiniBand port

l Data In Utilization - Amount of data received (KB/second)

l Data Out Utilization - Amount of data sent (KB/second)

ROI system templatesThe return on investment (ROI) reports compare the costs of backing up an environment bytraditional backup application compared to Avamar deduplication.

Deduplication Cost SavingsReturns the cost savings of an Avamar installation for each machine being backed up in a tablereport. Uses data from the Backup Server Status, Total Size, Total Size Scanned, and User Inputdata sources. The cost savings are calculated by looking at how much it would cost to fully protecteach client using a traditional backup application compared to the cost to fully protect each clientusing Avamar.

l Server - Hostname of the backup server

l Client -

l Data Backed Up - Total amount of data backed up (in GB)

l Data Protected - (in GB)

l Cost/GB for backups - Current cost to back up a single gigabyte of data in the environment

l Cost of Deduplicated Backups -

l Cost of Traditional Backups -

l Cost Saving Due to Deduplication -

Deduplication ROI TrendReturns the ROI (return on investment) for an Avamar installation over time in a line chart. Usesdata from the Backup Server Status, Total Size, Total Size Scanned, and User Input data sources.The return on investment is calculated by looking at how much it would cost to fully protect theenvironment using a traditional backup application compared to the cost to fully protect theenvironment using Avamar.

l Purchase cost - Total cost of the Avamar installation. This is the cost against which thesavings are balanced to show overall ROI.

l Cost of Deduplicated Backups -

l Cost of Traditional Backups -

l Cost Saving Due to Avamar -

l Return on Investment - The values are in units of currency. For example, if the cost of theAvamar installation is $10,000 and the cost of carrying out backups is 1 cent per gigabyte,enter 10,000 for Purchase cost and 0.01 for Cost/GB for backups.

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 425

To obtain the best ROI information, run the report with a start time of when Avamar was firstmonitored and an end time of the current time.

Scheduling system templatesScheduling reports display information on when backup Jobs were run and which devices were inuse.

The Scheduling reports are broken down into reports about the scheduling of backups and thescheduling of devices.

Active Clone Job DistributionReturns the number of active (running) Jobs over time. Uses data from the Active Jobs datasource.

l Active Clones - Number of Jobs that are active

Backup Active Job DistributionReturns information on the distribution of active backups in a column chart. Uses data from theActive Jobs data source.

l Active Jobs - Number of active clone jobs

Backup Client ScheduleReturns backup client schedule in a timeline chart. Uses data from the Backup Job Details and SLASchedule Details data sources. This report is similar to the Job Schedule report. The difference isthat information on jobs is rolled up on a per-client basis so that a row is displayed for each client.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Proxy - Proxy backup host

l Session - Number of sessions simultaneously accessing the device

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Num Files - Number of files backed up

Reports by System Template

426 Dell EMC Data Protection Advisor Report Reference Guide

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Started - Time the Job started writing

l Finished - Time the Job completed

l Expiry Date - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Transferred - Total size of the data transferred (in MB)

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Effective Path - Effective path of the Backup

l Error Code Summary - Error code summary associated with the error message

l Status Code Summary - Status code summary from the job

l Plugin Name - Plug-in name

l Num. Successful Copies - Number of successful copies

l Num. Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 427

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy Schedule -Name of the schedule

l Start Time - Start times for each schedule component

l End Time - End times for each schedule component

l Duration - Durations of each schedule component

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Device SchedulingReturns when devices are in use by analyzing performance information from the drives in atimeline chart. Uses data from the Tape Drive Performance From Best Source data source. Thisreport does not return data for backup applications that do not provide device performanceinformation such as Symantec NetBackup.

l Device Host - Name of the host that the device is connected to

l Device Name - Name of the device

l Write Throughput - Throughput of the device when performing write operations (KB/second)

l Read Throughput - Throughput of the device when performing read operations (KB/second)

Backup Device Shared UsageReturns backup device usage for shared devices in a timeline chart. Uses data from the BackupDevice Config and Backup Device Status data sources. This report can be used in shared storageenvironments to show the utilization of the underlying physical tape drive instead of looking atthings from a host-centric view. This report will return no data in a non-shared environment.

l Hardware Id - Identifier such as the device serial number that uniquely maps it to a physicaldevice

l Status - Status of the drive: Up, Down, Service

Reports by System Template

428 Dell EMC Data Protection Advisor Report Reference Guide

Backup Device UsageReturns details on the backup device usage in a timeline chart. Uses data from the Backup DeviceStatus data source.

l Hardware ID - Identifier such as the device serial number that uniquely maps it to a physicaldevice

l Status - Status of the drive: Up, Down, Service

Backup Group ForecastReturns when groups are scheduled to run in a timeline chart. Uses data from the Avamar GroupForecast and NetBackup Group Forecast data sources.

l Server - Name of the backup server

l Group - Name of group associated with schedule

l Schedule - Name of the schedule on the backup server

l Start Time - Date and time a schedule run starts

l End Time - Date and time a schedule run ends

l Duration - Total duration of a run

Backup Job DistributionReturns the total number of jobs completed over time in a line chart. Uses data from the Num Jobsdata source. This report appears when jobs are completed on a backup server or on a set ofclients. This report allows users to identify the busiest times during the backup window so thatusers can schedule backups at other times or plan outages.

l Num Jobs - Number of jobs that have completed

Backup Job Distribution By Media ServerReturns the total number of jobs by the media server for which the backup was performedcompleted over time in a line chart. Uses data from the Num Jobs data source.

l Num Jobs - Number of jobs that have completed

l Media Server - Name of the Media Server on which the backup or archive occurred

Backup Job ForecastReturns the jobs that are expected to run between two times in a table reports. Uses data fromthe Avamar Job Forecast and NetBackup Job Forecast data sources.

l Server - Name of the backup server on which the backup Job will run

l Group - Name of the backup group in which the Job is scheduled to run

l Client - Name of the backup client on which the Job will run

l Job - Name of the backup Job

l Schedule - Name of the schedule associated with the forecasted Job

l Scheduled Start - Time the Job is scheduled to start

l Scheduled End- Time the Job is scheduled to end

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 429

Backup Job Forecast versus ActualReturns the difference between the forecasted Jobs and the jobs that actually were run in a tablereport. Uses data form the Avamar Job Forecast, Backup Job Details, Backup Job Status, andNetBackup Job Forecast data sources.

l Server - Name of the backup server

l Group - Name of the group or policy under which the Job is running

l Schedule - Name of the schedule under which the Job is running

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Size - Amount of data backed up (in MB)

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Attempts - Number of attempts that took place before the Job completed

l Scheduled Start - Start time of schedule

l Scheduled End - End time of schedule

Backup Job Forecast versus Actual SummaryReturns the difference between the forecasted Jobs and the jobs that actually were run in a tablereport. Uses data form the Avamar Job Forecast, Backup Job Details, Backup Job Status, andNetBackup Job Forecast data sources.

l Queued - Time the Job started queuing

l Running -

l [null]-N -

l [others]-N -

l [null]-A -

l [others]-A -

l Success -

l Failed -

l Completed -

l Expected -

l Missing -

Backup Job ScheduleReturns when individual Jobs on a client or backup server were run in a timeline chart. Uses datafrom the Backup Job Details and SLA Schedule Details data sources.

The Job Schedule report appears when backups of individual jobs are starting and completing. Todisplay additional information on each job, move the cursor over a specific candle in the chart.

Reports by System Template

430 Dell EMC Data Protection Advisor Report Reference Guide

To display whether a job was completed within a backup window in the job schedule report, enableservice level reporting. Service level reporting is a system-wide attribute and must be enabled byan administrator. The EMC Data Protection Advisor Installation and Administration Guide providesmore information.

If the Job Schedule report runs after SLA Reporting is enabled, the following occurs: Jobs thatcompleted within the backup window are marked in green, Jobs that completed out of the windoware marked in red.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions simultaneously accessing the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Expires - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Transferred - Total size of the data transferred (in MB)

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 431

l Media Wait Time - Number of seconds waiting for the backup media

l Total Reduction Ratio -The ratio for the size of data compressed and deduplicated against theoriginal data size over time

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Effective Path - Effective path of the Backup

l Error Code Summary - Summary of the error codes associated with the backup

l Status Code Summary - Status summary code of the backup job

l Plugin Name - Plug-in name

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Schedule - Name of the schedule

l Start Time - Start times for each schedule component

l End Time - End times for each schedule component

l Duration - Durations of each schedule component

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

Reports by System Template

432 Dell EMC Data Protection Advisor Report Reference Guide

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Job Schedule For Specific ClientReturns when clients are actively performing backups in a timeline chart. Uses data from theBackup Job Details and SLA Schedule Details data sources. This report is similar to the Backup JobSchedule template. The difference is that information on jobs is rolled up on a per-client basis sothat a row is displayed for each client.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of TSM Server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Client - Name of the client backed up

l Job - Name of the Job backed up

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions simultaneously accessing the device

l Proxy - Proxy backup host

l Status - Status of the Job backed up: Success, Failed, Missed

l Err Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Storage Unit - Name of the Storage Unit to which a Job was backed up

l Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Expires - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication

l Size Transferred - Total size of the data transferred (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 433

l Archive Flag - Indicates whether Job was an archive or a backup

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Total number of inline copies taken, if any

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Number of seconds waiting for the backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Num Objects Deduplicated - Number of backup objects deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Effective Path - Effective path of the Backup

l Error Code Summary - Error code summary associated with the error message

l Status Code Summary - Status code summary from the job

l Plugin Name - Plug-in name

l Num Successful Copies - Number of successful copies

l Num Failed Copies - Number of failed copies

l Total Size of Copies - Total size of copies (in MB)

l Bytes Modified Sent - (in bytes)

l Bytes Modified Not Sent - (in bytes)

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Schedule - Name of the schedule

Reports by System Template

434 Dell EMC Data Protection Advisor Report Reference Guide

l Start Time - Start times for each schedule component

l End Time - End times for each schedule component

l Duration - Durations of each schedule component

l Group Job ID - ID of the group job instance

l Parent Job ID - NetBackup job ID of the parent job

l Is Snap - If job is a snapshot backup

l Storage Id - Holds the job ID used for storage device identification (hidden field)

l Snap Target - Snap target/replication target

l Snap Target Platform - Snap target platform type

l Snap Policy - Snap replication policy name

l Snap Creation Type - Snap creation type, either Managed or Discovered

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

Backup Size DistributionReturns the total amount of data completed over time in a line chart. Uses data from the Total Sizedata source. The Backup Size Distribution template is similar to the Job Distribution template butdisplays the amount of data that has been backed up over time on the graph.

l Total Size - Total amount of data backed up (in GB)

Backup Size Distribution By Media ServerReturns the total amount of data being backed up, broken down by Media Server over time in aline chart. Uses data from the Total Size data source.

The Backup Size Distribution by Media Server template is similar to the Backup Size Distributiontemplate except that it displays information on when data was backed up. This information iscalculated by media server. This report is not available in NetWorker environments because it isnot possible to determine to which media server a job was written after a backup completes.

l Total Size - Total amount of data backed up (in GB)

l Server - Name of the backup server on which the Job took place

l Media Server - Name of the Media Server on which the backup or archive occurred

Maintenance Job ScheduleReturns maintenance job schedule details in a timeline chart. Uses data from the Backup JobDetails, Clone Operations, and Maintenance Job Details data sources.

l Server - Name of the backup server on which the Job took place

l Status - Status of the maintenance job: Success, Failed

l Start Time - Time the job started

l End Time - Time the job completed

l Operation -

l Job Type - Category of maintenance jobs under which this job is grouped

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 435

TSM Server Side Process SchedulingReturns TSM server side process scheduling details in a timeline chart. Uses data from the BackupJob Details, TSM Migration, TSM Reclamation, TSM Database Backup, TSM Delete Volume, TSMExpiration, TSM Move, and TSM Storage Pool Copy data sources.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Status - Completion status of the migration process: Success, Failed

l Start Time - Time the process started

l End Time - Time the process completed

l Operation -

TSM Storage Pool Migration ScheduleReturns all of the migration jobs that have occurred grouped by storage pool in a timeline chart.Uses data from the TSM Backup and TSM Migration data sources.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool from which data has been migrated

l Start Time - Time the process started

l End Time - Time the process completed

TSM Storage Pool Reclamation ScheduleReturns all of the reclamation jobs that have occurred grouped by storage pool in a timeline chart.Uses data from the TSM Reclamation data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Storage Pool - Name of the storage pool from which data has been reclaimed

l Start Time - Time the process started

l End Time - Time the process completed

Service Level Management system templatesIn a backup environment, they provide reports on the backup environment performance against aService Level Agreement (SLA).

Backup Daily Success RateReturns the success rate of jobs that completed on the backup servers or clients in a columnchart. Uses data from the Num Jobs data source.

l Success Rate - Success rate of backups over the reporting period (as a percentage)

Reports by System Template

436 Dell EMC Data Protection Advisor Report Reference Guide

Backup Jobs with Last ResolutionReturns a list of all jobs on a backup server with resolution information in a table report. Uses datafrom the Backup Job with Last Resolution and Backup Job Details data sources.

l Id - Identifier that uniquely identifies this Job

l App Job Id - Identifier that uniquely identifies this Job on the backup server on which the Jobran

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of backup server instance

l Media Server - Name of the Media Server on which the backup or archive occurred

l Group - Name of the group or policy in which the Job took place

l Schedule - Name of the schedule under which the Job ran

l Domain Name - Name of the domain associated with the group

l Client - Name of the client backed up

l Policy - Name of the protection policy

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

l Action - Name of the action

l Job - Name of the Job backed up

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Orig Status - Original status of the backup job

l Error Code - Error code from the backup application, if available

l Status Code - Status code of the job from the backup application

l Level - Level of the Job backed up: Full, Incr, User, Manual, Cumulative Incr, Differential Incr,1-9

l Size - Amount of data backed up (in MB)

l Storage Unit - Name of the Storage Unit to which a Job was backed up (Symantec NetBackuponly)

l Files - Number of files backed up

l Num Files Not Backed Up - Number of files not backed up. This value is not available from allbackup applications

l Queued - Time the Job started queuing

l Started - Time the Job started writing

l Finished - Time the Job completed

l Expires - Date that a Job will expire

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Transferred - Size transferred to server (in MB)

l Backup Application - Name of the backup application that backed up the Job. For example,NetWorker, NetBackup

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 437

l Pool - Backup pool in which the backup Job belongs

l Tries - Number of attempts that took place before the Job completed

l Number of Copies - Number of inline copies, if any

l Duration - Time the backup application took to complete the job

l Job ID 2 - NetBackup Job ID in the activity log

l Owner - Owner of the backup job

l Idle Wait Time - Time Server spent waiting for backup client

l Media Wait Time - Time Server spent waiting for backup media

l Total Reduction Ratio - Total percentage of data compressed and deduplicated

l Is Compressed - Indicates whether the RMAN backup is compressed or not

l Deduplication Reduction - Total percentage of data deduplicated

l Restarted Job - Indicates if the job is a restarted job

l Num Objects Deduplicated - Number of backup objects deduplicated

l Effective Path - Effective path of the Backup

l Error Code Summary - Error code summary associated with the error message

l Status Code Summary - Status code summary from the job

l Plugin Name - Plug-in name

l Num Successful Copies - Number of successful copies (including primary copy)

l Num Failed Copies - Number of failed copies (including primary copy)

l Total Size of Copies - Total size of all copies combines (including primary copy)

l Bytes Modified Not Sent - (in bytes)

l Bytes Modified Sent - (in bytes)

l Group Job ID - ID of the group job instance

l Parent Job ID - backup job ID of the parent job

l Storage Job Id - Holds the job ID used for storage device identification (hidden field)

l Duration - Duration that data should be backed up

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Ran In Window - Indicates if the entire backup was in the backup window

l Started In Window - Indicates if the backup started in the backup window

l Finished In Window - Indicates if the backup finished in the backup window

l Time In Window - Amount of time that the backup spent in the backup window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the backup window (inseconds)

l Out Of Window Reason - Text string explaining why the Job was out of window. Only validwhen the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its backup window

n Job finished out of window - Job finished outside of its backup window

Reports by System Template

438 Dell EMC Data Protection Advisor Report Reference Guide

l Trailing Space In Window - Amount of time before the end of the backup window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Leading Space In Window - Amount of time after the start of the backup window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Valid Level - Indicates if the level of backup is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the backup job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this backup job

l Customer Contact - Name of the customer related to this remediation

l Management Contact - Name of the manager related to this remediation

l Current Status - Resolution status of the remediated backup

l Reason - Reason specified in auto reconciliation resolution

l Details - Additional details entered by the user when resolving the job

l User - Name of the user who entered the resolution

l Include in Any Calculations - If this backup is to be included in any calculations

l Include in SLA Calculations - If this backup is to be included in SLA calculations

l Instance Name - Name of the database instance backed up (hidden field)

l Database Backup Type - Type of the database instance backed up (hidden field)

l Entered - Date and time at which the resolution was added to a backup job

l Custom1 - User-customizable field

l Custom2 - User-customizable field

l Custom3 - User-customizable field

l Custom4 - User-customizable field

l Custom5 - User-customizable field

Clone SLA StatusReturns details of backup jobs that have run within or outside permitted SLAs, and if a backup jobwas cloned within 24 hours of the backup job ending in a table. Uses data from the Clone JobDetails, Backup Job Details, and Report Times data sources.

l Job Id - Identifier for the clone job

l App Job Id - Identifier that uniquely identifies the cloned Job on the backup server on whichthe Job ran

l Server - Name of the backup server on which the clone took place

l Sub Name - Name of backup server instance

l Group - Name of the group or policy in which the cloned Job took place

l Schedule - Name of the schedule under which the clone ran

l Client - Name of the client on which the Jobs were cloned

l Action - Name of the action

l Workflow - Name of the workflow

l Workflow Job Id - Job ID associated with the workflow

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 439

l Policy - Name of the protection policy

l Job - Name of the cloned Job

l Domain Name - Name of the domain associated with the group

l Backup Set - Name of the backup set associated with the job

l Session - Number of sessions simultaneously accessing the device

l Proxy - Proxy backup host

l Backup Status - Status of the Job backed up: Success, Failed, Missed

l Size - Size of the job (in MB)

l Queue Start - Time the Job started queuing

l Start Time - Time the Job started writing

l End Time - Time the Job completed

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Clone Job - Name of the cloned Job

l Clone Size - Size of the backup job associated with the clone job (in MB)

l Clone Size Scanned - The size of the backup job associated with the clone job

l Clone Start Time - Time that the clone operation started

l Clone End Time - Time that the clone operation ended

l Clone Id - Identifier for the cloned backup Job

l Duration - Time the backup application took to complete the job

l Success Flag - Internal field used to determine report row colours

Backup SLA SummaryReturns the success rate of jobs that completed on the backup servers or clients selected in atable report. Uses data from the Backup Job Details and Backup Job Resolution data sources.

l Jobs - Number of jobs that were completed

l Successful - Number of jobs that were successful

l Within SLA - Number of jobs that completed successfully within their backup window

l % Successful - Percentage of jobs that were successful

l % Within SLA - Percentage of jobs that were successful within their backup window

Backup SLA Summary By ClientThis report is similar to the SLA Summary report, except that it returns a breakdown of thesuccess rate on a per-client basis in a table report. Uses data from the Backup Job Details andBackup Job Resolution data sources.

l Client - Name of the client backed up

l Jobs - Number of jobs that were completed

l Successful - Number of jobs that were successful

l Within SLA - Number of jobs that completed successfully within their backup window

l % Successful - Percentage of jobs that were successful

l % Within SLA - Percentage of jobs that were successful within their backup window

Reports by System Template

440 Dell EMC Data Protection Advisor Report Reference Guide

Restore Jobs with Last ResolutionReturns a list of all jobs on a backup server with resolution information in a table report. Uses datafrom the Backup Job with Last Resolution and Backup Job Details data sources.

l Id - Identifier that uniquely identifies this restore

l App Job Id - Identifier that uniquely identifies this restore job on the backup server on whichthe restore job ran

l Server - Name of the backup server on which the restore took place

l Sub Name - Name of backup server instance

l Media Server - Name of the Media Server on which the Job was backed up

l Backup Time - Time at which the data being restored was originally restored

l Domain Name - Name of the domain associated with the group

l Client - Name of the client being restored

l Job - Name of the Job being restored

l Session - Number of sessions when a volume is present and mounted in the device

l Proxy - Proxy backup host

l Orig Status - Original status of the restore job

l Err Code - Error code associated with the restore

l Size - Amount of data backed up (in MB)

l Size Offset - Number of bytes that must be added to the Size field to be able to view the totalnumber of bytes that have been restored

l Size Scanned - Total size of the data scanned before deduplication (in MB)

l Size Scanned Offset - Number of bytes that must be added to the Size Scanned field to beable to view the total number of bytes that have been scanned

l Backup Application - Name of the backup application on which the restore occurred

l Owner - Owner of the restore job

l Num Files - Number of files restored

l Retrieve Flag - If set, the retrieve flag indicates that this operation was a retrieve operationand not a restore operation (TSM only)

l Backup Number - Number of the backup that is being restored

l Number of Files - Number of files restored

l Scanned - Size of the scanned and compressed file (in MB)

l Plugin Name - Plug-in name

l Group Job ID - ID of the group job instance

l Parent Job ID - restore job ID of the parent job

l Duration - Duration that data should be restored

l Throughput - Throughput of size to duration (MB/sec)

l Average File Size - Average size of each file

l Retention - Retention days

l Ran In Window - Indicates if the entire backup was in the restore window

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 441

l Started In Window - Indicates if the backup started in the restore window

l Finished In Window - Indicates if the backup finished in the restore window

l Time In Window - Amount of time that the backup spent in the restore window (in seconds)

l Time Out Of Window - Amount of time that the backup spent out of the restore window (inseconds)

l Out Of Window Reason - Text string explaining why the restore Job was out of window. Onlyvalid when the Ran In Window is FALSE. Can be one of:

n Job started out of window - Job started outside of its restore window

n Job finished out of window - Job finished outside of its restore window

l Trailing Space In Window - Amount of time before the end of the restore window the Jobfinished (in seconds). Only valid when Started In Window is TRUE

l Leading Space In Window - Amount of time after the start of the restore window the Jobstarted (in seconds). Only valid when Finished In Window is TRUE

l Valid Level - Indicates if the level of restore is valid

l Valid Retention - Indicates if the Retention Period is valid

l Compliant - Indicates if the restore job is compliant with the data protection policy

l Policy Used - Indicates if a data protection policy applies to this restore job

l Group - Name of the group or policy under which the Job is running

l Customer Contact - Name of the customer related to this remediation

l Management Contact - Name of the manager related to this remediation

l Current Status - Resolution status of the remediated restore

l Reason - Reason specified in auto reconciliation resolution

l Details - Additional details entered by the user when resolving the job

l User - Name of the user who entered the resolution

l Include in Any Calculations - If this restore is to be included in any calculations

l Include in SLA Calculations - If this restore is to be included in SLA calculations

l Entered - Date and time at which the resolution was added to a restore job

l Custom1 - User-customizable field

l Custom2 - User-customizable field

l Custom3 - User-customizable field

l Custom4 - User-customizable field

l Custom5 - User-customizable field

Status system templatesStatus reports allow users to query the current status of devices managed by the backup serverand any pending mount requests that the devices have outstanding.

Reports by System Template

442 Dell EMC Data Protection Advisor Report Reference Guide

ACSLS ACS StatusReturns the status of ACS on an ACSLS Server in a table report. Uses data from the ACSLS ACSStatus data source.

l Server - Name of the host on which ACSLS is running

l Name - Name of the ACS

l State - Current state of the ACSLS Software: Diagnostic, Offline, Offline Pending, Online,Recovery

l Current Audit Requests - Number of audit requests that are in progress on the server

l Pending Audit Requests - Number of audit requests that are pending on the server

l Current Mount Requests - Number of mount requests that are in progress on the server

l Pending Mount Requests - Number of mount requests that are pending on the server

l Current Dismount Requests - Number of dismount requests that are in progress on the server

l Pending Dismount Requests - Number of dismount requests are pending on the server

l Current Eject Requests - Number of eject requests that are in progress on the server

l Pending Eject Requests - Number of eject requests are pending on the server

ACSLS Lock StatusReturns information on locks for ACSLS drives and volumes in a table report. Uses data from theACSLS Lock Status data source.

l Server - Hostname or IP address of the ACSLS server

l Lock ID - Identifier for the lock

l Type - Lock target type: Drive, Volume

l Identifier - Identifier for the locked target

l Duration - Duration of the lock (in seconds)

l Pending - Number of locks pending on the target

l Status - Current status of the target. For example, in use

l User ID - Identifier for the lock owner

ACSLS Port StatusReturns information on the current status of ACSLS Ports in a table report. Uses data from theACSLS Port Status data source.

l Server - Name of host on which ACSLS is running

l Port - Address of the ACSLS Port, which is a combination of the ACS and Port fields. Forexample, 0,0

l Name - Name of the ACSLS port. For example, /dev/mchanger1

l State - State of the port: Online, Offline

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 443

ACSLS Server StatusReturns the current status of an ACSLS Server in a table report. Uses data from the ACSLSServer Status data source.

l Server - Name of the host on which the ACSLS is running

l State - Current state of the ACSLS Software: Idle, Idle pending, Recovery, Run

l Current Audit Request - Number of audit requests that are in progress on the server

l Pending Audit Requests - Number of audit requests that are pending on the server

l Current Mount Requests - Number of mount requests that are in progress on the server

l Pending Mount Requests - Number of mount requests that are pending on the server

l Current Dismount Requests - Number of dismount requests that are in progress on the server

l Pending Dismount Requests - Number of dismount requests are pending on the server

l Current Eject Requests - Number of eject requests that are in progress on the server

l Pending Eject Requests - Number of eject requests are pending on the server

Backup Client Physical OccupancyReturns backup client physical occupancy details in a table report. Uses data from the BackupClient Occupancy By Client - Physical data source.

l Physical - Amount of physical storage used (in MB). Physical space is the total space taken upby data for the filespace including space that is no longer active in itself but part of a set ofdata that is still active

Backup Client StatusReturns the backup client status details in a table report. Uses data from the Backup Client Statusdata source.

l Server - Server on which the backup client resides

l Client - Name of the client backed up

l Responding - If selected, indicates that the backup client is responding

l Daemon Running - If selected, indicates that a daemon is running on the backup client

l No IP Address - Indicates if the IP address of a client can be resolved or not

Backup Device Downed DevicesReturns details of downed backup devices in a table report. Uses data from the Backup DeviceStatus data source.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device in the backup software

l Control - Robot/Drive control information

l Status - Status of the drive: Up, Down, Service

Reports by System Template

444 Dell EMC Data Protection Advisor Report Reference Guide

l Errors - Error count on the device as reported by the backup software

l Volume Id - Label of any volume loaded in the drive

l Activity - Activity, if any, which the device is undertaking: Read, Write, Mount, Dismount,Label, Idle

l Session - Number of sessions simultaneously accessing the device

l Throughput - Device throughput (KB/second)

Backup Device ErrorsReturns backup device error details in a table report. Uses data from the Backup Device Errorsdata source.

l Server - Name of the NetBackup Storage Node

l Device Host - Name of the NetBackup Storage Node

l Device Name - Name of the device

l Error Type - Type of error that has occurred. For example, TAPE_ALERT, WRITE_ERROR

l Volume - Volume that was loaded in the drive at the time the error occurred

l Data - Additional information associated with the error

l Timestamp - Time that the error occurred

Backup Device StatusReturns details of all backup devices in a table report. Uses data from the Backup Device Configand Backup Device Status data sources.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Host - Name of the host to which the device is attached

l Device Name - Name of the device in the backup software

l Device Path - Operating system path to the device

l Device Class - Class of device: Disk, Tape

l Jukebox - Name of the jukebox in which the device is located

l Device Type - Type of device. For example, DLT, Ultrium-2

l Read Only - Indicates if the drive is configured as read-only: Yes, No

l Hardware Id - Identifier such as the device serial number that uniquely maps it to a physicaldevice

l Firmware - Firmware version of the device

l Media Manager Path - Operating system path to the media manager

l Num Target Sessions - Number of target sessions

l Send/Receive Timeout - Send and receive timeout

l Num Retries - Number of retries

l Network Retry Interval - Network failure retry interval (in seconds)

l Compression - Indicates if compression is enabled

l Encryption - Indicates if encryption is enabled

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 445

l Max Errors - Maximum number of errors

l Device Access - Device access information

l Control - Robot/Drive control information

l Status - Status of the drive: Up, Down, Service

l Errors - Error count on the device as reported by the backup software

l Volume Id - Label of any volume loaded in the drive

l Sessions - Number of sessions when a volume is present and mounted in the device

l Throughput - Device throughput (KB/second)

l Firmware - Firmware version of the device

l Soft Read Errors -

l Hard Read Errors -

l Hard Write Errors -

l Status - Status of the drive: Up, Down, Service

l Volume - Label of any volume loaded in the drive

l Speed -

l State -

l Loop Id -

l Num Loads -

l Cleaning Required -

Backup Pool StatusReturns the backup pool status details in a table report. Uses data from the Backup Pool Statusdata source.

l Server - Name of backup server on which the pool is located

l Sub Name - Name of TSM server instance

l Pool Name - Name of the storage pool

l Pool Type - Type of storage pool: Primary, Copy, Active Data

l Pct Migration - Percentage of data in storage pool that can be migrated

l Migration running - Indicates if at least one migration process is active for the storage pool

l Amount Migrated - Amount of data currently migrated from the storage pool (in MB)

l Elapsed Migration Time - Depending on migration activity, indicates the following (in seconds):

n If migration is active, this indicates the amount of time elapsed since migration began.

n If migration is not active, this indicates the amount of time required to complete the lastmigration.

n If multiple parallel migration processes are used for the storage pool, this indicates the totaltime from the beginning of the first process until the completion of the last process.

l Reclamation Running - Indicates if a reclamation process is active for the storage pool

l Num Scratch Volumes Used - Number of scratch volumes used in the storage pool

l Space Trigger Utilization - Utilization of the storage pool, as calculated by the storage poolspace trigger, if any, for this storage pool (as a percentage)

Reports by System Template

446 Dell EMC Data Protection Advisor Report Reference Guide

l Duplicate Data - Amount of data that was removed from the storage pool by the reclamationprocess. This field also represents the amount of storage space that was saved in the storagepool as a result of server-side data deduplication.

l Percentage Duplicate Data - (as a percentage)

Backup Server Error SummarySummary count of the most common errors a backup server has encountered in a column chart. Italso provides details on errors and warnings that have occurred on a backup server. Uses datafrom the Application Errors data source.

l Error - Error code of the message: message prefix, message number, message type

l Count - Number of errors

Backup Server StatusReturns backup server status details in a table report. Uses data from the Backup Server Statusdata source.

l Server - Name or IP Address of the backup server

l Utilization - Percentage that the server is being utilized

l Used Raw - Identifies how much of the raw capacity is used (in MB)

l Used Capacity - Identifies how much of the capacity is used (in TB)

Backup Unavailable Device Count for rulesetReturns details about unavailability of backup devices in a table report. Report for Many backupdevices unavailable rule. Uses data from the Backup Device Status and User Input data source.

l Unavailable Count -

l Maximum Number of Downed Devices -

l Alert - Identifier of the alert

Battery StatusReturns battery status details in a table report. Uses data from the Battery Status data source.

l Node - Name of the object

l Name - Identifier for the battery

l Status - Current status of the battery

l Charge - Charge remaining on the battery

Battery SummarySummary of the battery details in a column chart. Uses data from the Battery Status data source.

l Count - Number of batteries

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 447

BTD CapacityReturns information on BTD capacity in a column chart. Uses data from the VTL Status and VTLConfiguration data sources.

l Hostname - Hostname of the VTL

l Capacity - Disk capacity of the VTL (in MB)

l Used - Amount of disk capacity used by the VTL (in GB)

l Space Eligible for Trunc - Amount of data eligible for truncation (in MB)

BTD Health StatusReturns the health status in a column chart. Uses data from the Fan Status, Network InterfaceStatus, Tape Library Status, Tape Drive Status, Disk Status, Thermometer Status, and PSU Statusdata sources.

l Status - Current status of a drive

l Count - Number of devices

l Type - Type of device

BTD UsageReturns information on the Backup To Disk (BTD) usage in a column chart. Uses data from theVTL Status data source.

l Hostname - Hostname of the VTL

l Dedup Reduced - Size of data backed up after deduplication (in MB)

l Waiting for Dedup - VTL is waiting for deduplication to begin (in MB)

l Wont be Deduped - VTL will not be deduplicated (in MB)

l System Metadata - Amount of disk space used by the system (in MB)

l Space Eligible for Trunc - Amount of data eligible for truncation (in MB)

Card StatusReturns card status details in a table report. Uses data from the Card Status data source.

l Node - Name of the object

l Adaptor - Identifier for the adaptor

l Sub Name - Identifier for the storage array

l State - State of the storage processor

l Used Memory Size - Size of the memory being used (in MB)

l Read Cache State - Status of the read cache

l Write Cache State - Status of the write cache

Reports by System Template

448 Dell EMC Data Protection Advisor Report Reference Guide

Celerra Replication StatusReturns Celerra replication status details in a table report. Uses data from the Celerra ReplicationPerformance and Celerra Replication Status data sources.

l Server - Hostname or IP address of the Celerra being monitored

l Name - Name of the replication set

l Network Status - Status of the network link being used by the replication set

l Source Status - Status of the source of the replication set

l Destination Status - Status of the target of the replication set

l Last Synch Time - Date and time that the data on either side of the replication link was lastsynchronized

Client OccupancyReturns client occupancy details in a table report. Uses data from the Backup Client Occupancydata source.

l Server - Name of the server

l Sub Name - Name of the TSM server instance

l Client - Name of the client

l Type - Type of data stored: Backup, Archive, HSM

l Filespace - Name of client filespace

l Pool - Storage pool which contains the client filespace

l Filespace ID - ID of the client filespace

l Files - Number of active files

l Physical - Amount of physical storage used (in MB). Physical space is the total space taken upby data for the filespace. Physical space includes space that is no longer active itself, but isincluded in a set of data that is still active

l Logical - Amount of logical storage used (in MB). Logical space is space used by active data

Client Occupancy by Server TrendReturns information on client occupancy value grouped by server over time in a line chart. Usesdata from the Backup Client Occupancy by Server data source. This report returns data forCommVault Simpana, TSM, NetBackup, NetWorker, PureDisk, and Data Protector.

l Server- Name of the Backup Server

l Occupancy (MB) - Amount of storage used

Cluster StatusReturns cluster status for cluster details in a table report. Uses data from the Cluster Status datasource.

l Cluster Name - Name of cluster

l Active Host - Name of the active host

l State - State of the cluster: OK, Warning, Failed, Offline, Unknown

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 449

Collector Status for rulesetReturns details of the alerts for collector errors, log messages, and collectors that have failed in atable report. Uses data from the DPA Status, Process Log, Registered Collectors, and RequestHistory data sources.

l Alert - Identifier of the alert

l Server - Name of the Server running the agent: DPA

l Hostname - Name of the host on which the DPA Data Collection Agent is installed

Data Domain Active StreamsReturns the Data Domain active streams in a line chart. Uses data from the Data Domain ActiveStreams data source.

l Hostname - Name or IP address of the Data Domain server

l Active Read Streams - Number of active read file streams

l Active Write Streams - Number of active write file streams

l Re Opened Read Streams - Re-opened read file streams in the past 30 seconds

l Re Opened Write Streams - Re-opened write file streams in the past 30 seconds

Data Domain Boost Option StatusReturns the Data Domain boost option status in a table report. Uses data from the Data DomainBoost Option Status data source.

l Hostname - Name of the host

l Name - Option name. For example, distributed-segment-processing, virtual-synthetics

l Status - Option value. For example, enabled

Data Domain Filesystem Archive Unit StatusReturns status information on the Data Domain filesystem archive unit in a table report. Uses datafrom the Data Domain Filesystem Archive Unit Status data source.

l Hostname - Name of the host

l Name - File system archive unit name

l State - State of the archive unit: New, Target, Sealed

l Status - Status of the archive unit: Ready, Disabled

l Unit Size - Size of the archive unit (in MB)

l Disk Group - Disk groups

l Start Time - Archive unit start time

l End Time - Archive unit end time

Reports by System Template

450 Dell EMC Data Protection Advisor Report Reference Guide

Data Domain Filesystem Cleaning StatusReturns information on the status of Data Domain filesystem cleaning in a table report. Uses datafrom the Data Domain Filesystem Cleaning Status data source.

l Hostname - Name or IP address of Data Domain

l Status- Data Domain Filesystem clean status

l Schedule- Data Domain Filesystem clean schedule

l Throttle- Data Domain Filesystem clean throttle

Data Domain Filesystem OptionsReturns information on the Data Domain filesystem options in a table report. Uses data from theData Domain Filesystem Options data source.

l Hostname - Name of the host

l Name - File system option name. For example, Local compression type, App optimizedcompression, Current global compression type

l Value - Option value. For example: lz, none, 9

Data Domain ModesReturns current Data Domain mode information in a table report. Uses data from the Data DomainModes data source.

l Hostname - Name or IP address of the Data Domain server

l Backup Mode - Indicates if backup mode is enabled or disabled

l Extended Retention Mode - Indicates if archive mode is enabled or disabled

l VTL Mode - Indicates if VTL mode is enabled or disabled

Data Domain System Capacity LicensesReturns information on Data Domain system capacity licenses in a table report. Uses data from theData Domain System Capacity Licenses data source.

l Hostname - Name of the host

l Key - Key name

l Feature - Feature for the license. For example, DDBOOST, REPLICATION, VTL

l Model - Model for the feature of the license

l Capacity - Capacity of the model

Data Domain System LicensesReturns Data Domain system license details in a table. Uses data from the Data Domain SystemLicenses data source.

l Hostname - Name of the host

l Key - Key name

l Feature - Feature for the license. For example, DDBOOST, REPLICATION, VTL

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 451

Data Domain System User StatusReturns the Data Domain system user status details in a table. Uses data from the Data DomainSystem User Status data source.

l Hostname - Name of the host

l User - User name

l UID - User identifier

l Role - User role

l Status - User status

DataProtector Database StatusReturns Data Protector database status details in a table report. Uses data from the DatabaseUsage data source.

l Server - Name of the Data Protector Server

l Database Name - Name of the internal database

l Table Name - Name of the database table

l Size - Size of the table (in MB)

l Used Records - Number of records used in the table

l Total Records - Number of total records allocated in the table

l Utilization - Percentage of total records used

DataProtector Datafile UsageReturns Data Protector datafile usage details in a table report. Uses data from the Datafile Usagedata source.

l Server - Name of the Data Protector Server

l Type - Type of data contained in the datafile

l Directory - Location in file system of the datafile

l Size - Size of the datafile (in MB)

l Files - Number of files

DataProtector Purge PreviewReturns Data Protector purge preview details in a table report. Uses data from the Purge Statusdata source.

l Server - Name of the Data Protector Server

l Client - Name of the Data Protector client

l Num Filenames - Total number of filenames in the internal database

l Num Estimated Obsolete - Estimated number of obsolete filenames in the internal database

l Estimated Duration - Estimated duration of a database purge (in seconds)

Reports by System Template

452 Dell EMC Data Protection Advisor Report Reference Guide

DataProtector Record File UsageReturns Data Protector record file usage details in a table report. Uses data from the Record FileUsage data source.

l Server - Name of the Data Protector server

l Type - Type of records the file contains

l Directory - Location of the record file in the file system

l Size - Used size of the record file (in MB)

l Max Size - Maximum allocated size of the record file (in MB)

l Utilization - Percentage used of the allocated size

DataProtector Service StatusReturns Data Protector service status details in a table report. Uses data from the Service Statusdata source.

l Server - Name of the Data Protector server

l Service Name - Name of the service

l Status - Status of the service

l Process ID - Process identifier

Device Availability for rulesetReturns details of device availability in a table report. Report for Less than x% backup devicesavailable rule. Uses data from the Backup Device Config, Backup Device Status, and User Inputdata sources.

l Server - Name of the backup server

l Sub Name - Name of the TSM server instance

l Device Availability - Availability of the device

l Alert - Identifier of the alert

l Max Availability -

Disk Array StatusReturns disk array status details in a table report. Uses data from the Disk Array Status datasource.

l Hostname - Hostname or IP address of the array

l Sub Name - Name of the storage array

l Disk Array Name - Name of the disk array

l Status - Current status of disk array

l State - Indicates whether the disk array is enabled or not

l Used - Indicates whether the disk array is in use (in GB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 453

Disk Failed for rulesetReturns details on disk failures in a table report. Report for Disk failed for a number of hours rule.Uses data from the Disk Status data source.

l Node - Name of the object to which the disk is attached

l Alert - Identifier of the alert

Disk StatusReturns disk status details in a table report. Uses data from the Disk Configuration and Disk Statusdata sources.

l Hostname - Name of the host to which the disk is attached

l Sub Name - Identifier for the Storage Array

l Device - Name of the disk

l Size - Size of the disk (in GB)

l State - Current operational state of the disk: Online, Offline, Failed

l Use - Use of the disk, if any: Data, Parity, Spare. Only valid if State is Online

l Errors - Error count for disk

l Allocated - Space allocated on disk for use (in GB)

l Name - Identifier for the disk

l Temperature - Current disk temperature (in Celsius)

l Group Name - RAID group of disk

l Status - Status of disk: Okay, Reconstruct, Resync, Unknown

l Recon Percentage - Percentage of the disk reconstructed

l Resynch Percentage - Percentage of the disk resynched

l Remapped Blocks - Number of blocks remapped

EDL Failover StatusReturns EMC Disk Library failover status details in a table report. Uses data from the EDL FailoverStatus data source.

l Hostname - Name or address of the EMC Disk Library host

l Secondary - Name or address of the failover partner

l Type - Failover configuration type

l Self Check Interval - Interval between primary DL checks for software or hardware failure onitself (in seconds)

l Heartbeat Interval - Interval between primary DL checks for software or hardware failure onitself (in seconds)

l Recovery Setting - Time until automatic recovery attempted

l State - Current failover state of the EMC Disk Library

Estimated Protected Backup CapacityReport returns total protected backup capacity of MS SQL/Oracle RMAN backups, Networker/Avamar environments in a table report. Uses data from the Last Backup Details by Client and Job,

Reports by System Template

454 Dell EMC Data Protection Advisor Report Reference Guide

Last Backup Details by Client and Job Within Filtered Group, Backup Virtual Host Used Size andNetWorker Last Backup Details by Client and Job Within Filtered Group data sources.

Note the following considerations:

l For Oracle RMAN backups, Oracle RMAN data collection must be configured and collectingdata successfully in DPA using NetWorker/RMAN backups.

l The report requires that the Avamar, NetWorker or RMAN servers that are monitored by DPAhave 60 days' worth of job data.

l The purpose of the report is to catch those jobs that may be run infrequently; not to sum thejobs.

The report displays the following fields:

l Capacity Protected - The overall total protected capacity for all clients on the backup server inMB

Estimated Protected Backup Capacity DetailsReturns details of protected backup capacity per client of MSSQL/Oracle RMAN backups,NetWorker, or Avamar environment in a table report. Uses data from the Last Backup Details byClient and Job, Last Backup Details by Client and Job Within Filtered Group, Backup Virtual HostUsed Size, and NetWorker Last Backup Details by Client and Job Within Filtered Group datasources. The report displays the following fields:

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of the server instance

l Client - Name of the client backed up

l Capacity Protected - Total protected capacity per backup client (in MB)

The following previously visible fields are now hidden by default. You can access them by selectingthem using Table Format:

l Capacity Protected (Not MSSQL via NW/Avamar) - Total protected capacity for Avamar andNetworker jobs (in MB)

l Capacity Protected (Not MSSQL) - Total protected capacity for RMAN and MSSQL jobs (inMB)

l Capacity Protected (MSSQL via NW/Avamar) - Total protected capacity for Avamar andNetworker MSSQL jobs (in MB)

l Capacity Protected (Virtual Host) - If the Client is a virtual host being backed up by Networkeror Avamar from vCenter it is the total storage space in MB committed to the virtual hostacross all datastores

Fan StatusReturns fan status details in a table report. Uses data from the Fan Status data source.

l Node - Name of the object

l Name - Name of the fan

l Active - Indicates if the fan is currently active

l Speed - Speed that the fan is rotating (revolutions/minute)

l Normal Speed - Expected fan speed (revolutions/minute)

l Level - Current activity level of the fan

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 455

l Status - Status of the fan

Fan SummarySummary of fan details in a column chart. Uses data from the Fan Status data source.

l Count - Number of fans

Fibre Channel Port StatusReturns the Fibre Channel port status details in a table report. Uses data from the Fibre ChannelPort Config and Fibre Channel Port Status data sources.

l Hostname - Name of the switch

l Port - Name of the Fibre Channel port

l Sub Name - If returning data for RecoverPoint, the name of site in which RecoverPointAppliance is located. Otherwise, the identifier for the Celerra Data Mover

l Sub Name 2 - Name of RecoverPoint Appliance

l Controller - Number of the controller

l WWPN - World Wide Port Name for the Fibre Channel interface

l Mode - Indicates if the port is a Target or Initiator

l OS Device - Device name from which Fibre Channel port is visible on the operating system

l Internal - Indicates if the Fibre Channel port is internal, that is, if the port is connected tointernal hardware, and not a SAN

l Type - Type of Fibre Channel port on the switch or HBA

l Virtual - Indicates if the Fibre Channel port is virtual or physical

l WWNN - World Wide Node Name of the Fibre Channel port

l Auto Neg - Indicates if autonegotiation is enabled on this interface

l Link Active - Indicates if the switch is connected to anything

l Speed - Speed of the port (Mb/second)

l Minimum Bandwidth - Minimum bandwidth of the interface (MB/second)

l Administrative Link Up - Indicates if the port has been disabled by an administrator

Fibre Channel Port Summary By NodeReturns Fibre Channel port summary by object details in a table report. Uses data from the FibreChannel Port Count By Node and Fibre Channel Port Status data sources.

l Switch Name - Name of the switch

l Total -

l Used -

l Free -

l Utilization - (as a percentage)

Reports by System Template

456 Dell EMC Data Protection Advisor Report Reference Guide

Fileserver StatusReturns file server status details in a health status report. Uses data from the File server Statusdata source.

l Node - Name of the file server

l CIFS Status - Status of CIFS server

l NFS Status - Status of NFS server

Filesystem Disk StatusReturns the file system disk status in a table report. Uses data from the Filesystem Disk Statusdata source.

l Filesystem node - Name of the object to which the file system is attached

l Filesystem - Name of the file system

l Filesystem Sub Name - Name of the storage array on which the file system resides

l Disk node - Name of the object to which the disk is attached

l Disk - Name of the disk

l Disk Sub Name - Name of the storage array on which the disk resides

l State - Current operational state of the disk: Online, Offline, Failed

l Use - Use of the disk, if any: Data, Parity, Spare. Only valid is State is Online.

l Errors - Number of read and write errors on the disk

Filesystem Quota StatusReturns file system quota status details in a table report. Uses data from the Quota Configurationand Quota Status data sources.

l Server - Name or IP address of the Celerra server

l Filesystem - Description of the file system

l Tree ID - Identifier for the tree

l Path - Path of the tree

l Type - One of: Tree, User, Group

l Comment - User comments for the quota

l User ID - Identifier for the user

l Windows Sids - Windows Security Identifier

l Files Soft Limit - Soft file usage quota for the file system. If exceeded, a warning is sent toWindows clients

l Files Hard Limit - Hard file usage quota for the file system. If exceeded, user requests foradditional files (for example, creating a new file) are denied

l Space Soft Limit - Soft space usage quota for the file system. If exceeded, a warning is sent toWindows clients (in MB)

l Space Hard Limit - Hard space usage quota for the file system. If exceeded, user requests foradditional space (for example, saving a file) are denied (in MB)

l Files Used - Number of files used on the tree

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 457

l Space Used - Amount of space used on the tree (in MB)

l Files Time Left - Amount of grace period remaining after a File Softlimit breach before the FileHardlimit condition is triggered (in seconds)

l Space Time Left - Amount of grace period remaining after a Space Softlimit breach before theSpace Hardlimit condition is triggered (in seconds)

l File Utilization - (as a percentage)

l Space Utilization - (as a percentage)

Filesystem Snapshot StatusReturns file system snapshot status details in a table report. Uses data from the Checkpoint Statusdata source.

l Server - Hostname or IP address of the server containing the file system

l Checkpoint ID - Unique identifier for the checkpoint

l Checkpoint Name - Name of the checkpoint

l Checkpoint Time - Time at which the checkpoint was taken

l State - State of the checkpoint: active, inactive, pending, restoring, other

l Filesystem - Source file system for the checkpoint

l Filesystem Size - Size of file system at the time checkpoint was taken (in MB)

Filesystem StatusReturns file system status details in a table report. Uses data from the Filesystem Configurationand Filesystem Status data sources.

l Hostname - Name of the host on which the file system is mounted

l Sub Name - Identifier for the storage array

l Filesystem - Name of the file system

l Capacity - Total space on the file system available for standard usage (in MB)

l Snapshot Capacity - Amount of space reserved for the use of snapshots (in MB). If the totalamount of data stored for snapshots is higher than the amount of space reserved forsnapshots, additional space is claimed from the volume itself

l Used Space - Amount of space used on the file system (in MB)

l Used Snapshot Space - Amount of space used for snapshots on the file system (in MB)

l Utilization - (as a percentage)

l Snapshot Utilization - (as a percentage)

l Cleanable Space - Amount of space that can be cleaned (in MB)

Filesystem Status SummarySummary of the file system status in a table report. Uses data from the Filesystem Configurationand Filesystem Status data sources.

l Hostname - Name of the host on which the file system is mounted

l Capacity - Total space on the file system available for standard usage (in MB)

Reports by System Template

458 Dell EMC Data Protection Advisor Report Reference Guide

l Snapshot Capacity - Amount of space reserved for the use of snapshots (in MB). If the totalamount of data stored for snapshots is higher than the amount of space reserved forsnapshots, additional space is claimed from the volume itself

l Used Space - Amount of space used on the file system (in MB)

l Used Snapshot Space - Amount of space used for snapshots on the file system (in MB)

l Utilization - (as a percentage)

l Snapshot Utilization - (as a percentage)

l Cleanable Space - Amount of space that can be cleaned (in MB)

Host StatusReturns host status details in a table report. Uses data from the Host Status data source.

l Hostname - Name of the host

l Sub Name - Identifier for the storage array

l Startup Time - Time the host last rebooted

l CPU Used - Amount of CPU used (as a percentage)

l Memory Used - Amount of memory used (in MB)

l Status - Status of the Celerra device

IP Autonegotiation Mismatch for rulesetReturns details of when an IP autonegotiation mismatch occurs in a table report. Report for IPautonegotiation mismatch system rule template. Uses data from the Network Link Pair Duplex datasource.

l Host Name - Name of the host on which the network interface is located

l Host Port - Name of the port

l Host Autoneg - If selected, indicates that the interface on the host is configured toautonegotiate speed and duplex settings with the switch

l Switch name - Name of the switch

l Switch port - Name of the switch port

l Switch Autoneg - If selected, indicates that the interface on the switch is configured toautonegotiate speed and duplex settings with the host

IP Duplex Mismatch for rulesetReturns details of when an IP duplex mismatch occurs in a table report. Report for IP duplexmismatch system rule template. Uses data from the Network Link Pair Duplex data source.

l Host Name - Name of the host on which the network interface is located

l Host Port - Name of the port

l Host Duplex - Duplex setting of the host

l Switch Name - Name of the switch

l Switch Port - Name of the switch port

l Switch Duplex- Duplex setting of the switch

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 459

iSCSI StatusReturns information on a the status of iSCSI adapters on a object in a table report. Uses data fromthe iSCSI Status data source. An Error field appears if the iSCSI adapter is not online.

l Node - Name of the object on which the iSCSI adapter exists

l Name - Name of the iSCSI adapter

l Online - Indicates if the iSCSI adapter is online

l Error - iSCSI adapter errors

LUN StatusReturns LUN status details in a table report. Uses data from the LUN Status data source.

l Node - Name of the array on which the LUN exists

l Sub Name - Identifier for the storage array on which the LUN resides

l Name - Name of the LUN

l Online - Indicates if this LUN is online

l Mapped - Indicates if this LUN is mapped to any endpoints

l Used Capacity - Space used on the LUN (in GB)

l Allocated Capacity - Space allocated on the LUN (in GB)

l Is Thin - Indicates whether the LUN is thin

l Num Copies - Number of copies existing of the LUN

l State - LUN online status

l Access - Indicates whether the LUN is read/write or read only

l No Single Point of Failure - Indicates if there is no single point of failure for the LUN

l Auto Assignment - Indicates auto assignment is enabled

l Auto Trespass - Indicates whether auto trespass is enabled

l Private - Indicates whether the LUN is private

l Read Cache - Indicates whether a read cache on the LUN is enabled

l Variable Length Prefetch - Indicates whether variable length prefetch is enabled

l Write Cache - Indicates whether a write cache on the LUN is enabled

MTree Retention Lock StatusReturns MTree retention lock status details in a table report. Uses data from the MTree RetentionLock Status data source.

l Hostname - Name or IP address of the Data Domain server

l Name - Mtree name

l Minimum Period - Minimum retention period

l Maximum Period - Maximum retention period

l Status - Mtree retention lock status

Reports by System Template

460 Dell EMC Data Protection Advisor Report Reference Guide

Mirror StatusReturns mirror status details in a table report. Uses data from the Mirror Status data source.

l Node - Name of the object on which the mirror resides

l Path - Path to the mirror

l Mirror Status - Status of the mirror:

n Active - the mirror is synchronized with its source

n Updating - the mirror is currently updating from its source

n Quiesced - the mirror is temporarily not updating from its source

n Broken - the mirror is able to be used, and as such is not updating from its source

n Unsynchronized - the mirror is not synchronized with its source

l Last Update - Last time this mirror was set to update from the source

l Update Size - Total size of the last update of this mirror (in KB)

l Exposure - Current data exposure (in seconds)

NetBackup Device Cleaning StatusReturns NetBackup device cleaning status details in a table report. Uses data from the NetBackupDevice Cleaning data source.

l Server - Name of the NetBackup master server

l Device Host - Name of the NetBackup Media Server to which the device is attached

l Device Name - Name of the NetBackup device

l Device Type - Type of device. For example, DLT, Ultrium-2

l Mount Time - Duration that the device has had volumes mounted in it (in seconds)

l Frequency - Cleaning frequency of the drive in seconds; that is, how often it should be cleaned

l Last Cleaned - Date and time that the device was last cleaned

l Comment - Any comments associated with this device

l Cleaning Required - Indicates if cleaning is required on this device

NetBackup Disk Pool StatusReturns NetBackup disk pool status details in a table report. Uses data from the NetBackup DiskPool Status data source.

l Server - Name of the NetBackup Server

l Sub Name - Not applicable

l Pool - Name of the disk pool

l Status - Status of the disk pool

l Administrative State - Administrative State: Up, Down

l Internal State - Internal pool state: Up, Down

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 461

NetBackup Disk Volume StatusReturns NetBackup disk volume status details in a table report. Uses data from the NetBackupDisk Volume Status data source.

l Server - Name of the NetBackup Server

l Sub Name - Not applicable

l Volume ID - Identifier for the volume

l Used Space - Space used in the volume (in GB)

l Num Read Mounts - Number of read mounts configured on the volume

l Num Write Mounts - Number of write mounts configured on the volume

l Read Streams - Number of read streams configured on the volume

l Write Streams - Number of writer streams configured on the volume

l Status - Active status of the volume

l Administrative State - Administrative state of the volume

l Internal State - Internal state of the volume: up, down

NetBackup SLP Backlog by ImageReturns the daily number of images in SLP Complete and Incomplete states in a line chart. Usesdata from the NetBackup SLP Backlog by Image Status data source.

l Master Server - Hostname of a NetBackup master server where SLP is configured

l Lifecycle Policy Name - Policy name

l Image Status - Image status name

l Images Count - Images count for status specified in "Image Status" field

NetBackup SLP Images StatusReturns list of SLP images statuses in a table report. Uses data from the NetBackup SLP Imagesdata source.

l Master Server - Hostname of a NetBackup master server where SLP is configured

l Image ID - Backup image identifier

l SLP Name -Policy name

l SLP Version - Policy version

l Backup Client Name - Backup client name

l Backup Client Type - Backup client type

l Backup Policy Name - Backup policy name

l Backup time - Time when the backup was run

l Data Classification - Data classification name for backed up data

l Origin Master Server - Backup origin master server

l Image Created Time - Backup image creation time

l Image Completed Time - Backup image SLP completion time

Reports by System Template

462 Dell EMC Data Protection Advisor Report Reference Guide

l In Process Time - Backup image processing time

l Image SLP state - State of SLP for the backup image

NetBackup SLP Jobs StatusReturns a list of SLP jobs statuses in a table report. Uses data from the NetBackup SLP Jobs datasource.

l Master Server - Hostname of a NetBackup master server where SLP is configured

l Image ID - Backup image identifier

l Copy Number - Copy number assigned to the operation

l Operation - Operation type for the job

l Job Id - Job identifier; is zero for jobs which are planned but are not yet started

l Operation State - Job status

l Retry Count - Number of retries done for a copy job

l Last Retry Time - Last time when server tried to run job

l Data Classification - Data classification name for backed up data

l Policy Name - Backup policy name

l Schedule Name - Backup schedule name

l Destination - Destination storage for a job

l Origin Master Server - Backup origin master server

l Target Master Server - Backup target master server

l Expiration Time - Image copy expiration time

l Image Created Time - Backup image creation time

l Lag Time - Time period between backup and copy creation times

l Retention - Retention type

l SLP Name - Policy name

l SLP Version - Policy version

l Format - Backup image format

l Copy Size - Total size of copy fragments for completed jobs, image size for incomplete

NetBackup SLP Status by ImageThis data source returns SLP images with aggregate counts and sums for corresponding jobs andis used in the NetBackup SLP Status by Image system template.

l Master Server - Hostname of a NetBackup master server where SLP is configured

l Image ID - Backup image identifier

l Image State - Status of lifecycle for a backup image

l Image Created Time - Backup image creation time

l Image Completed Time - Backup image SLP completion time

l SLP Name - Policy name

l SLP Version - Policy version

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 463

l Backup Client Name - Backup client name

l Backup Policy Name - Backup policy name

l Origin Master Server - Backup origin master server

l Copies Total - Total number of image copies as defined by SLP

l Copies Complete - Number of completed image copies

l Copies Incomplete - Number of image copies in the incomplete state

l % Copies Complete - Percent of completed image copies

l Total Expected Size - Total sum of image copies size

l Completed Copy Size - Sum of complete image copies

l Remaining Copy Size - Size of incomplete image copies

l Completed Copy Size % - Percent of copy sizes of complete copies

NetBackup Storage Server StatusReturns NetBackup storage server status details in a table report. Uses data from the NetBackupStorage Server Status data source.

l Server - Name of the NetBackup Storage Server

l Sub Name - Not applicable

l Name - Name of the storage unit

l Type - Type of storage server: master, client

l Status - Status of the storage server

l Administrative State - Administrative status: Up, Down

l Internal State - Internal storage server status: Up, Down

Network Interface Link PairReturns information about connectivity between the interface on a switch and the host to which itis connected in a table report. Uses data from the Network Link Pair Duplex data source. For eachinterface on the switch, the report displays the host to which it is connected. For this report toperform correctly, data must be gathered from the host and from the switch.

l Host name - Name of the host on which the network interface is located

l Host port - Name of the port

l Host duplex - Duplex setting of the host

l Switch name - Name of the switch

l Switch port - Name of the switch port

l Switch duplex - Duplex setting of the switch

Network Interface Link Pair Autonegotiation StatusReturns information about the autonegotiation status for both the switch and the networkinterface on the host machine to which it is connected in a table report. Uses data from theNetwork Link Pair Autonegotiation data source. This report allows users to identify when clientsmay be configured with different settings to the switch that can result in performance problems.

l Host Node - Name of the host on which the network interface is located

Reports by System Template

464 Dell EMC Data Protection Advisor Report Reference Guide

l Host Port - Name of the port

l Host Autoneg - If selected, indicates that the interface on the host is configured toautonegotiate speed and duplex settings with the switch

l Switch Node - Name of the switch to which the host network interface is connected

l Switch Port - Name of the interface on the switch to which the host is connected

l Switch Autoneg - If selected, indicates that the interface on the switch is configured toautonegotiate speed and duplex settings with the host

Network Interface Link Pair Duplex StatusReturns information about the duplex settings for both interfaces on a switch and the networkinterface on the host machine to which it is connected in a table report. Uses data from theNetwork Link Pair Duplex data source. This report allows users to identify when clients may beconfigured with different settings to the switch that can result in performance problems.

l Host Name - Name of the host on which the network interface is located

l Host Port - Name of the port

l Host Duplex - Duplex setting of the host

l Switch Name - Name of the switch

l Switch Port - Name of the switch port

l Switch Duplex - Duplex setting of the switch

Network Interface StatusReturns network interface status details in a table report. Uses data from the Network InterfaceConfig and Network Interface Status data sources.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Identifier for the Storage Array

l Interface - Name of the interface

l Description - Optional description for the interface

l MAC Address - MAC address of the interface

l Auto Neg - Indicates if the interface is set to auto negotiate

l MTU - Maximum Unit of Transmission for the interface (largest packet size) (in bytes)

l Failover - Standby interface if the primary interface goes down

l Multicast - If enabled, the interface can send data to more than one address at the same time

l Promiscuous - If enabled, all traffic is passed to the interface rather than just packetsaddressed to it

l Simplex - If enabled, the interface messages are filtered and not displayed

l Receive Buffer - Amount of data that can be received before sending a reply (in bytes). If sizeis not specified on the interface, then the system-wide settings are used

l Send Buffer - Amount of data that can be sent before receiving a reply (in bytes). If size is notspecified on the interface, then the system-wide settings are used

l Virtual - Indicates if the network interface is virtual or physical

l Link Up - Indicate if the interface has a link with the switch

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 465

l Speed - Speed at which the interface is running (Mb/second)

l Full Duplex - Indicates if the interface is running at full duplex

l Administrative Link Up - Indicates if the port has been disabled by an administrator

l Jumbo Packets Enabled - Indicates that Jumbo Packets are enabled by default.

Orphaned LUNsReturns orphaned LUNs in a table report. Uses data from the LUN Configuration and LUN Mappingdata sources.

l Node - Name of the array on which the LUN exists

l Sub Name - Identifier for the storage array on which the LUN resides

l Name - Name of the LUN

Process CountReturns process count details in a line chart. Uses data from the Process Count data source.

l Processes - Number of processes running on the host

l Hostname - Name of the host on which the process is running

l PID - Process identifier

l Process Name - Name of the process

l Process cmd - Full command line of the process

l CPU - Percentage CPU that is being used by the process

l Memory - Amount of memory that is being used by the process (in MB)

Process Count By HostReturns process count by host details in a line chart. Uses data from the Process Count By Hostdata source.

l Processes - Number of processes running on the host

l Hostname - Name of the host on which the process is running

l PID - Process identifier

l Process Name - Name of the process

l Process cmd - Full command line of the process

l CPU - Percentage CPU that is being used by the process

l Memory - Amount of memory that is being used by the process (in MB)

Process Count CurrentReturns current process count details in a column chart. Uses data from the Process Count datasource.

l Process Count - Number of processes running on the host

Process StatusReturns the process status details in a table report. Uses data from the Process Status datasource.

When running the Process Status report from an object in the configuration tree, the reportdisplays the status of any DPA processes that run on the selected objects. The report does not

Reports by System Template

466 Dell EMC Data Protection Advisor Report Reference Guide

show the status of any agents that may be monitoring those objects remotely. Run the ProcessStatus report from the DPA Server objects to view the status of all DPA processes across allmachines. This allows you to identify any processes that are not running.

l Hostname - Name of the host on which the process is running

l PID - Process identifier

l Process Name - Name of the process

l Process Command - Full command line of the process

l CPU - Percentage CPU that is being used by the process

l Memory - Amount of memory that is being used by the process (in MB)

Processor StatusReturns processor status in a column chart. Uses data from the Processor Status data source.

l Count - Processor count

Processor Status DetailsReturns processor status details in a table report. Uses data from the Processor Status datasource.

l Node - Object in which the processors are situated

l ID - Processor number of the object

l Sub Name - If returning data for RecoverPoint Appliance, the name of the site in whichRecoverPoint Appliance is located. If returning data for Celerra, the name of the Data Mover

l Sub Name 2 - Name of RecoverPoint Appliance

l Online - Indicates if the processor is currently online

PSU StatusReturns power supply unit (PSU) status in a table report. Uses data from the PSU Status datasource.

l Node - Name of the object

l Name - Name of the PSU

l Active - Indicates if the PSU is currently active

l Status - Status of the PSU

PSU SummarySummary of power supply unit (PSU) details in a column chart. Uses data from the PSU Statusdata source.

l Count - PSU count

RecoverPoint Consistency Group Copy StatusReturns RecoverPoint consistency group copy status in a table report. Uses data from theConsistency Group Copy Status data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 467

l Consistency Group - Name of the consistency group

l Name - Name of the consistency group

l Enabled - Indicates if the consistency group is active

l Active RPA - Name of the RecoverPoint Appliance that is currently active for this Copy

l Data Transfer - Status of Data Transfer for this Copy. For example, ACTIVE

l Journal State - Current state of journal. For example, DISTRIBUTING IMAGES TO STORAGE

l Storage Access - Current status of access to the storage for this copy. For example, DIRECTACCESS, NO ACCESS

l Current Protection Window - Time duration of the current protection window

l Current Protection Window Status - Status of the current protection window

l Predicted Protection Window - Predicted protection window value

l Predicted Protection Window Status - Predicted protection window status

l Average Compression - Average compression achieved

l Link Mode - Link mode for CDP and CRR operations. For example, CONTINUOUS,CONTINUOUS ASYNC

l Journal Mode - Journal Mode. For example, NORMAL

l Journal Usage - Current usage of the journal (in MB)

l Journal Capacity - (in MB)

l Latest Journal Image - Timestamp of the most recent image

l Journal Lag - Size of the journal lag (in MB)

RecoverPoint Consistency Group Copy Status for Active RPAsReturns RecoverPoint consistency group copy status for active RPAs in a table report. Uses datafrom the Consistency Group Copy Status data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Consistency Group - Name of the consistency group

l Name - Name of the consistency group

l Enabled - Indicates if the consistency group is active

l Active RPA - Name of the RecoverPoint Appliance that is currently active for this Copy

l Data Transfer - Status of Data Transfer for this Copy. For example, ACTIVE

l Journal State - Current state of journal. For example, DISTRIBUTING IMAGES TO STORAGE

l Storage Access - Current status of access to the storage for this copy. For example, DIRECTACCESS, NO ACCESS

l Current Protection Window - Time duration of the current protection window

l Current Protection Window Status - Status of the current protection window

l Predicted Protection Window - Predicted protection window value

l Predicted Protection Window Status - Predicted protection window status

l Average Compression - Average compression achieved

l Link Mode - Link mode for CDP and CRR operations. For example, CONTINUOUS,CONTINUOUS ASYNC

Reports by System Template

468 Dell EMC Data Protection Advisor Report Reference Guide

l Journal Mode - Journal Mode. For example, NORMAL

l Journal Usage - Current usage of the journal (in MB)

l Journal Capacity - Capacity of the journal (in MB)

l Latest Journal Image - Timestamp of the most recent image

l Journal Lag - Size of the journal lag (in MB)

RecoverPoint Event DetailsReturns RecoverPoint event details in a table report. Uses data from the RecoverPoint Eventsdata source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Time - Time the event occurred

l Site - Site at which event occurred

l RPA - Hostname or IP address of the RecoverPoint Appliance

l Topic - One of: Management, Site, RPA, Group, Splitter

l Scope - One of: Normal, Detailed, Advanced

l Level - One of: Info, Warning, Error

l ID - Identifier for the event

l User - One of: Admin, Root, Webdownload

l Groups - Names of the consistency groups

l Summary - Summary of the log

l Details - Log details

RecoverPoint Event SummarySummary of RecoverPoint events in a column chart. Uses data from the RecoverPoint Events datasource.

l Level - One of: Info, Warning, Error

l Level Count - Count of level events

l Type - Type of event

RecoverPoint Last 10 Event DetailsReturns the ten most recent events in the RPA environment in a table report. Uses data form theRecoverPoint Events data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Time - Time the event occurred

l Site - Site at which event occurred

l RPA - Hostname or IP address of the RecoverPoint Appliance

l Topic - One of: Management, Site, RPA, Group, Splitter

l Scope - One of: Normal, Detailed, Advanced

l Level - One of: Info, Warning, Error

l ID - Identifier for the event

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 469

l User - One of: Admin, Root, Webdownload

l Groups - Names of the consistency groups

l Summary - Summary of the log

l Details - Log details

RecoverPoint RPA Active Consistency GroupsReturns the consistency groups that are currently active for each RPA in a table report. Uses datafrom the Consistency Group Copy Status data source.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Active RPA - Name of the RecoverPoint Appliance that is currently active for this Copy

l Consistency Group - Name of the consistency group

l Name - Name of the Copy

RecoverPoint VolumesReturns RecoverPoint volume details in a table report. Uses data from the RecoverPoint Volumesdata source.

l Server - Name or IP address of the management interface of the RecoverPoint cluster

l Name - Name of the volume

l ID - Identifier for the volume

l Vendor - Name of the vendor

l Product - Name of the product

l Model - Model of the volume

l Size - Size of the volume (in MB)

l Consistency Group - Name of the consistency group

l Copy - Name of the copy within the consistency group

l Replication Set - Name of the replication set. If the volume is a Journal, this value will be NULL

l Volume Type - Type of volume: Replication Set, Journal, Repository

RecoverPoint Volumes for Replication SetsReturns RecoverPoint volume for replication set details in a table report. Uses data from theRecoverPoint Volumes data source.

l Server - Name or IP address of the management interface of the RecoverPoint cluster

l Name - Name of the volume

l ID - Identifier for the volume

l Vendor - Name of the vendor

l Product - Name of the product

l Model - Model of the volume

l Size - Size of the volume (in MB)

l Consistency Group - Name of the consistency group

l Copy - Name of the copy within the consistency group

Reports by System Template

470 Dell EMC Data Protection Advisor Report Reference Guide

l Replication Set - Name of the replication set. If the volume is a Journal, this value will be NULL

l Volume Type - Type of volume: Replication Set, Journal, RepositoryReplication Set

Remote Mirror StatusReturns remote mirror status details in a table report. Uses data from the Remote Mirror Statusdata source.

l Source node - Name of the object on which the source mirror resides

l Source path - Path to the mirror source

l Mirror node - Name of the object on which the remote mirror resides

l Mirror path - Path to the remote mirror

l Mirror status - Current status of the remote mirror: Unsynchronized, Active, Broken,Quiesced, Updating

l Last update - Last time this remote mirror was set to update from the source

l Update size - Total size of the last update of this remote mirror (in KB

l Exposure - (in seconds)

Replication StatusReturns Data Domain replication status details in a table report. Uses data from the ReplicationPerformance and Replication Status data sources.

l Hostname - Hostname of replicating server

l Source - Identifier for replication source

l Destination - Identifier for replication destination

l State - State of replication set

l Status - Status of replication set

l Connection Time - Time connection was established

l Throttle - Amount of data transfer to which replication is throttled

l Destination Host - Unique identifier for the destination of replication

l Synchronized - Indicates whether data is synchronized

Tape Drive Cleaning SummarySummary that displays how many tape drives require cleaning in a column chart. Uses data fromthe Tape Drive Status data source.

l Count - Number of tape drives that require cleaning

Tape Drive Count By StateReturns the tape drive count by state in a column chart. Uses data from the Tape Drive Statusdata source.

l State - State of a drive

l Count - Number of tape drives in the state

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 471

Tape Drive Count By StatusReturns tape drive count by status in a column chart. Uses data from the Tape Drive Status datasource.

l State - State of a drive

l Count - Number of tape drives in the state

Tape Drive StatusReturns tape drive status in a table report. Uses data from the Tape Drive Status data source. Forvirtual tape drives, this report displays its tape library. However, the tape library of which aphysical tape drive is a member is not displayed. For all drives, the Status field shows the health ofthe drive. For physical tape drives, the State field also indicates whether the tape drive is loadedwith a volume or not. This information is not available for virtual tape drives.

l Hostname - Name of the host to which the drive is attached

l Library Name - If monitoring a device that manages multiple tape libraries such as an EDL Unit,this field contains the name of the library that in which the drive is located. In other situations,this field is not populated

l Device name - Name of device

l Soft Read Errors - Number of corrected read errors

l Hard Read Errors - Number of uncorrected read errors

l Soft Write Errors - Number of corrected write errors

l Hard Write Errors - Number of uncorrected write errors

l Status - Current status of a drive

l Volume - Name of the volume currently loaded in the drive

l Speed - Speed the interface is running at if Fibre attached (Mb/second)

l State - State of a drive

l Loop Id - Loop id of a drive if fibre attached

l Num Loads - Number of times a tape has been mounted on that drive

l Cleaning Required - Indicates if the tape drive currently requires cleaning

l Virtual - Indicates if the tape drive is virtual

Tape Library CAP StatusReturns the status of any cartridge access ports in a table report. Uses data from the Tape LibraryCap Status data source.

l Hostname - Name of the host to which the device is attached

l Address - Unique identifier of the CAP in the tape library

l Status - Status of the CAP

l Unlocked - Indicates if the CAP is unlocked

l Open - Indicates if the CAP is open or closed

Reports by System Template

472 Dell EMC Data Protection Advisor Report Reference Guide

Tape Library CAP Status SummarySummary of any cartridge access ports status in a column chart. Uses data from the Tape LibraryCap Status data source.

l Status - Status of the CAP

l Count - Number in the state

Tape Library Empty Volume CountReturns tape library empty volume count details in a column chart. Uses data from the TapeLibrary Volume Status data source.

l Hostname - Name of the device that is being monitored. Typically this field contains the nameof the tape library, but it can contain the name of the device managing multiple libraries suchas an EDL

l Library Name - Name of the library. This field is only populated when the device beingmonitored supports multiple tape libraries, such as EDL

l Count - Number of empty volumes

Tape Library Slot StatusReturns the volumes that are loaded into slots in each library on the virtual tape library in a tablereport. Uses data from the Tape Library Slot Status data source. For physical tape libraries, thisreport also contains information on the type of media.

l Hostname - Name of the device that is being monitored. Typically this field contains the nameof the tape library, but this value can be the name of the device managing multiple librariessuch as an EDL

l Library Name - Name of the library. This field is only populated when the device beingmonitored supports multiple tape libraries, such as EDL

l Address - Unique address of the element inside the tape library

l Status - Indicates if the slot is loaded

l Volume - Barcode of the volume in that slot

l Type - Type of virtual tape library

l Virtual - Indicates if the tape library is a virtual tape library

Tape Library Status DetailsReturns the status of individual tape libraries in a table report. Uses data from the Tape LibraryStatus data source. For each library on the system, the report displays the hostname, the numberof volumes in the library, and the status of the library.

l Hostname - Name of the device being monitored. If monitoring a tape library directly, this fieldcontains the library name. If monitoring a device such as an EDL that supports multiplelibraries, this field contains the name of the EDL

l Library Name - Name of the tape library. This field is not populated if monitoring a devicedirectly. Instead its name is populated in the Hostname field. This field is populated ifmonitoring a device that manages multiple libraries such as an EDL

l Status - Status of the library

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 473

l Num Volumes - Number of volumes in the library

l Virtual - Indicates if the library is virtual

l State - Current active state of the tape library

Tape Library Status SummarySummary of the tape library status in a column chart. Uses data from the Tape Library Status datasource.

l Count - Number of tape library in status

Tape Library Volume StatusReturns tape library volume status details in a table report. Uses data from the Tape LibraryVolume Status data source.

l Hostname - Name of the device that is being monitored. Typically this field contains the nameof the tape library, but it can contain the name of the device managing multiple libraries suchas an EDL

l Library Name - Name of the library. This field is only populated when the device beingmonitored supports multiple tape libraries, such as EDL

l Volume - Identifier for the volume

l Size - Amount of data on the volume (in MB)

l Virtual - Indicates if the volume is virtual or physical

l Location - Location of the volume in the library

l Location Type - Type of location in which the volume is located. For example, slot, drive

l Pool - Pool that this tape is in

l Type - Type of media

l Data Type - Type of tape: data, clean, scratch

l Entry Date - Date that the volume was entered into the library

l Access Date - Last time the volume was accessed

l Access Count - Number of times the volume has been accessed

l Max Use - Maximum number of times a volume can be used

l Status - Status of the volume

l Reorg - Reorganization status of the volume: Queued, Restoring, Save

l Stale - Indicates if volume is stale: RESTORING, NULL

l Migrated - Indicates the volume is no longer in cache and must be read in from the tape beforenext access: 0, 1, NULL

l Dirty - Indicates the volume is in cache but has not been saved since the last change: 0, 1,NULL

l Read Only Mount - Indicates if the last mount was read-only: 0, 1, NULL

l Scratch Mount - Indicates if the last mount was a scratch mount: 0, 1, NULL

l Scratch - Indicates if the volume is a scratch volume

l Drive - Name of the drive, if volume is in use in a drive or was requested

l Device - Device name of the logical drive, if volume is in use in a drive or was requested

Reports by System Template

474 Dell EMC Data Protection Advisor Report Reference Guide

l Next Block - First block after last used block on a volume

l Number Logical Volumes - Number of logical volumes stored on a physical volume

l Number Valid Logical Volumes - Number of valid logical volumes stored on the physical volume

l Valid Size - Amount of valid data on volume (in MB)

l Valid Portion - Portion of data valid on volume

l Tape Filesystem - Identifier for the tape file system

l Library Device Name - Device name of the logical drive in library notation, if volume is in use ina drive or was requested

l Capacity - Capacity of volume (in MB)

l Compression Ratio - Ratio of data compressed to original size during backup

Thermometer StatusReturns thermometer status details in a table report. Uses data from the Thermometer Status datasource.

l Node - Name of the object

l Name - Name of the thermometer

l Active - Indicates if the thermometer is active: 1 (active)

l Temperature - Temperature currently registered by the thermometer (in Celsius)

l Overheating - Indicates if the temperature is above an internal threshold

Thermometer SummarySummary of information on any temperature sensors that are overheating in a column chart. Usesdata from the Thermometer Status data source.

l Count - Number of thermometer sensors that are overheating

Thermometer TrendReturns the changes in temperature over time in a line chart. Uses data from the ThermometerStatus data source.

l Node - Name of the object

l Name - Name of the thermometer

l Temperature - Temperature currently registered by the thermometer (in Celsius)

Thermometer Trend for Specific ThermometerReturns the changes in temperature over time for a specific thermometer in a line chart. Uses datafrom the Thermometer Status data source.

l Node - Name of the object

l Name - Name of the thermometer

l Temperature - Temperature currently registered by the thermometer (in Celsius)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 475

TSM Client FilespacesReturns TSM client filespace details in a table report. Uses data from the TSM Client Filespacesdata source.

l Server - Name of the TSM server

l Sub Name - Name of TSM server instance

l Client - Name of the backup client

l Filespace Name - Name of the filespace

l Filespace ID - Identifier for the filespace

l Filespace Type - Type of filespace

l Capacity - Size of the filespace (in MB)

l Percentage Utilization - Percent of space used in the filespace

l Backup Start - Time the last incremental backup of the filespace started

l Backup End - Time the last incremental backup of the filespace ended

l Delete Time - Time the filespace was last deleted

TSM Client OccupancyReturns occupancy details broken down by TSM client in a table report. Uses data from theBackup Client Occupancy, TSM Audit Occupancy, and TSM Backup Set data sources. This reportshows the total logical occupancy by client for backup sets, along with other client occupancydata.

l Server - Name of the TSM server

l Sub Name - Name of TSM server instance

l Client - Name of the client object

l Type - Type of data stored: Backup, Archive, HSM

l Filespace -Name of client filespace

l Filespace ID- ID of the client filespace

l Pool - Storage pool which contains the client filespace

l Files - Number of active files

l Physical - Amount of physical storage used (in MB). Physical space is the total space taken upby data for the filespace including space that is no longer active in itself but part of a set ofdata that is still active

l Logical - Amount of logical storage used (in MB). Logical space is purely the space taken up byactive data

l Backup - Total backup storage use for the object (in MB)

l Backup Copy - Total backup copy storage use for the object (in MB)

l Archive - Total archive storage use for the object (in MB)

l Archive Copy - Total archive copy storage use for the object (in MB)

l Total - Total storage use for the object (in MB)

Reports by System Template

476 Dell EMC Data Protection Advisor Report Reference Guide

TSM Database StatusReturns TSM database status details in a table report. Uses data from the TSM DatabaseUtilization data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Buffer Pool Hit Ratio - Percentage ratio of buffer pool hits

l Package Cache Hit Ratio - Percentage ratio of package cache hits

l Buffer Requests - Number of buffer requests

l Num Sort Overflows - Number of sorts that ran out of heap memory

l Num Lock Escalations - Number of times row locks were escalated to table locks

l Last Reorg Time - Time of the last database reorganization

l Num Incremental Database Backups - Number of incremental database backups that haveoccurred since the last full database backup

l Last Full Database Backup Time - Last time the database was fully backed up

TSM Database UsageReturns TSM database usage details in a column chart. Uses data from the TSM DatabaseUtilization data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Object - One of: Database, Recovery Log

l Usage - Amount of used space in the TSM database (in MB)

TSM Database Volume StatusReturns TSM database volume status details in a table report. Uses data from the TSM DatabaseVolumes data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Object - One of: Database, Recovery Log

l Copy 1 Name - Name of the first copy

l Copy 1 Status - Status of the first copy

l Copy 2 Name - Name of the second copy

l Copy 2 Status - Status of the second copy

l Copy 3 Name - Name of the third copy

l Copy 3 Status - Status of the third copy

l Available Space - Amount of available space (in MB)

l Allocated Space - Amount of allocated space (in MB)

l Free Space - Amount of free space (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 477

TSM Defined Server StatusReturns the TSM defined server status in a table report. Uses data from the TSM Defined ServerStatus data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Defined Server - Name of the defined server

l Last Access - Date and time of last access

l Last Session Bytes Sent - Number of bytes sent in the last sessions to the client object (inbytes)

l Last Session Bytes Received - Bytes received by the server during the last client objectsessions (in bytes)

l Duration - Length of last client object session (in seconds)

l Nodes - Name of the client object

l Roles - One of: Storage Agent, Replication

l Idle Wait Last Session - (percentage)

l Comm. Wait Last Session - (percentage)

l Media Wait Last Session - (percentage)

TSM Identify Duplicate Process DetailsReturns TSM Identify Duplicate Process details in a table report. Uses data from the TSM IdentifyDuplicate Process Details data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Process ID - Identify Duplicates process ID

l Storage Pool - Storage pool on which Identify Duplicates process is running

l Volume - Volume of the storage pool on which Identify Duplicates process is running

l State - Current state of the Identify Duplicates process

l Current File Size - Size of current physical file in MB

l Num. Duplicate Extents - Number of duplicate extents found by Identify Duplicates process onthe storage pool

l Num. Files Processed - Number of files processed by Identify Duplicates process on thestorage pool

l Total Dedupe Size - Total Duplicate size found by Identify Duplicates process on the storagepool in MB

l Dedupe State Start Time - Dedupe start date/time

TSM Identify Duplicate Process TrendReturns current and deduplicated size as a trend over time in a line chart. Uses data from the TSMIdentify Duplicate Process Details data source.

l Server - Name of the TSM Server

Reports by System Template

478 Dell EMC Data Protection Advisor Report Reference Guide

l Sub Name - Name of TSM server instance

l Process ID - Identify Duplicates process ID

l Storage Pool - Storage pool on which Identify Duplicates process is running

l Dedupe Size - Total Duplicate size found by Identify Duplicates process on the storage pool inMB

TSM Replication Node StatusReturns TSM replication object status details in a table report. Uses data from the TSMReplication Node Status data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Node Name - Name of the object

l Replication Type - Type of replication

l Filespace Name - Name of the filespace

l FSID - Identifier for the filespace

l Num. Files On Server - Number of files on the server

l Replication Server Name - Name of the replication server

l Num. Files On Replication Server - Number of files on the replication server

TSM Replication Process DetailsReturns TSM replication process details in a table report. Uses data from the TSM ReplicationProcess Details data source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Summary ID - Summary identifier

l Data Type - Type of data

l Last Updated - User who last updated

l Target Server - Name of the target server

l Num. Files Needing No Action - Number of files needing no action

l Num. Files Replicated - Number of files replicated

l Num. Files Not Replicated - Number of files not replicated

l Num. Files Deleted - Number of files deleted

l Num. Files Not Deleted - Number of files not deleted

l Num. Files Updated - Number of files updated

l Num. Files Not Updated - Number of files not updated

l Size Replicated - Total size of data replicated (in MB)

l Size Transferred - Total size of the data transferred (in MB)

l Size Not Replicated - Total size of data not replicated (in MB)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 479

TSM Replication Process SummarySummary of the TSM replication process in a table report. Uses data from the TSM ReplicationProcess Summary data source.

l Id - Identifier that uniquely identifies this process on the server on which it ran

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Node Name - Name of the object

l Filespace Name - Name of the filespace

l FSID - Identifier for the filespace

l Process ID - Unique identifier used by TSM to identify the process

l Command -

l Completion State -

l Reason For Incompletion -

l Total Files Replicated - Number of files replicated

l Total Files Deleted - Number of files deleted

l Total Files Updated - Number of files updated

l Total Files Not Replicated - Number of files not replicated

l Total Size Replicated - Total size of data replicated (in MB)

l Total Size Transferred - Total size of the data transferred (in MB)

l Total Size Not Replicated - Total size of data not replicated (in MB)

TSM Device Path StatusReturns TSM device path status in a table report. Uses data from the TSM Device Path datasource.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Source - Name of the path source

l Source Type - Type of path source

l Destination - Name of the path destination

l Destination Type - Path destination type

l Destination Library - Name of the destination path library if the type is a drive

l Destination Node Name - Name of the device in the destination path

l Destination Device - Name of the destination path device

l Destination External Manager - Name of the external library manager, if applicable

l LUN - Logical unit name (LUN) through which the disk can be accessed by the source

l Initiator - Path initiator

l Destination Directory - Directory location of a file on the source

l Online - Indicates whether the path is online and available for use or offline

Reports by System Template

480 Dell EMC Data Protection Advisor Report Reference Guide

l Last Updated - User who last updated the path

l Last Update Time - Time of the last update

TSM Filespace SummaryReturns TSM filespace summary in a table report. Uses data from the Backup Client Occupancyand TSM Client Filespaces data sources.

l Client - Name of the backup client

l Occupancy - (in MB)

l Filespace Size - (in MB)

l Occupancy Ratio - (as a percentage)

TSM LAN Free Server StatusReturns the TSM LAN-free server status in a table report. Uses data from the TSM LAN FreeServer Status data source. In DPA 6.0, LAN-Free Server Status is renamed Defined Server Status.LAN-free Server Status is supported for backwards compatibility; however, Defined Server Statusis preferred going forward.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l LAN Free Server - Name of the LAN-free Server

l Last Access - Date and time of last access

l Last Session Bytes Sent - Number of bytes sent in the last sessions to the client object

l Last Session Bytes Received - Bytes received by the server during the last client objectsessions

l Duration - Length of last client object session (in seconds)

l Node -Name of the client object

TSM Recovery Log UsageReturns TSM recovery log usage in a column chart. Uses data from the TSM Database Utilizationdata source.

l Server - Name of the TSM Server

l Sub Name - Name of TSM server instance

l Object - One of: Database, Recovery Log

l Usage - Amount of used space in the TSM recovery log (in MB)

Virtual Host Top 10 Longest Time Since Last Power OnReturns information on the top 10 longest time since last power on in a table report. Uses datafrom the Virtual Host Status data source.

l Virtualization Server - Hostname of a Virtualization Server managed by Virtual Centre

l Virtual Host - Name of the Virtual Centre server

l Status - Status of the virtual machine

l CPU Used - CPU utilization of the virtual machine (in MHz)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 481

l Memory Used - Amount of memory used by the virtual machine (in MB)

l Startup Time - Time virtual host was started

VTL StatusReturns VTL status details in a table report. Uses data from the VTL Configuration and VTL Statusdata sources.

l Hostname - Hostname of the VTL

l Capacity - Disk capacity of the VTL (in MB)

l Used - Amount of disk capacity used by the VTL (in GB)

l DeDupe Original - Size of data before deduplication (in MB)

l DeDupe Reduced - Size of data backed up after deduplication (in MB)

Xsigo Infiniband Port StatusReturns status information on the InfiniBand ports in a table report. Uses data from the InfinibandPort Status and Infiniband Port Configuration data sources.

l Hostname - Name or IP address of the Xsigo appliance

l Linkup - Indicates if the link is active or down

l Speed - Speed of the interface (MB/second)

Troubleshooting system templatesTroubleshooting reports provide information on any errors generated by the tape library or its tapedrives. There are two sets of reports in the troubleshooting category that assist with detectingtape library and tape drive errors. These are:

l Tape Library Errors

l Tape Drive Errors

Aggregate Fibre Channel Port ErrorsReturns information on Fibre Channel port errors in a line chart. Uses data from the Fibre ChannelPerformance data source.

l Errors - Number of bad frames received by the port

l Errors Out - Number of bad frames sent by the port

l Discards In - Number of incoming frames discarded

l Discards Out - Number of outgoing frames discarded

l No Credits - Number of times that the port has been unable to transmit data due to a lack ofbuffer-to-buffer credits

Fibre Channel Port Errors By NodeReturns the total number of frame errors and total number of times that the ports have run out ofbuffer-to-buffer credits on all ports on a switch over time in a line chart. Uses data from the FibreChannel Performance By Node data source.

l Hostname - Name of the object

Reports by System Template

482 Dell EMC Data Protection Advisor Report Reference Guide

l Errors - Number of bad frames received by the port

l Errors Out - Number of bad frames sent by the port

l Discards In - Number of incoming frames discarded

l Discards Out - Number of outgoing frames discarded

l No Credits - Number of times that the port has been unable to transmit data due to a lack ofbuffer-to-buffer credits

Fibre Channel Port Errors By PortReturns the total number of frame errors and total number of times that the ports have run out ofbuffer-to-buffer credits on all ports on a switch over time in a line chart. Uses data from the FibreChannel Performance By Port data source.

l Hostname - Name of the object

l Sub Name - Name of server instance, if applicable

l Port - Port identifier. For example, Port 1

l Errors - Number of bad frames received by the port

l Errors Out - Number of bad frames sent by the port

l Discards In - Number of incoming frames discarded

l Discards Out - Number of outgoing frames discarded

l No Credits - Number of times that the port has been unable to transmit data due to a lack ofbuffer-to-buffer credits

Network Interface ErrorsReturns network interface errors in a line chart. Uses data from the Network InterfacePerformance data source.

l Errors In - Number of errors coming in to the interface (/second)

l Errors Out - Number of errors leaving the interface (/second)

l Discards In - Number of packets discarded coming in to the interface (/second)

l Discards Out - Number of packets discarded leaving the interface (/second)

Network Interface Errors By InterfaceReturns network interface errors by interface in a line chart. Uses data from the Network InterfacePerformance By Interface data source.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

l Errors In - Number of errors coming in to the interface (/second)

l Errors Out - Number of errors leaving the interface (/second)

l Discards In - Number of packets discarded coming in to the interface (/second)

l Discards Out - Number of packets discarded leaving the interface (/second)

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 483

Network Interface Errors By Interface for rulesetReturns details for network interface errors by interface in a table report. Report for NetworkInterface reporting more than x% errors rule. Uses data from the Network Interface PerformanceBy Interface, Report Times, and User Input data sources.

l Hostname - Name of the host on which the network interface is located

l Sub Name - Name of the storage array

l Interface - Interface name

l Errors -

l Maximum Percentage Errors -

l Alert5 -

l Alert6 -

l Alert - Identifier of the alert

Network Interface Errors By NodeReturns network interface errors by object in a line chart. Uses data from the Network InterfacePerformance By Node data source.

l Hostname - Name of the host on which the network interface is located

l Errors In - Number of errors coming in to the object (/second)

l Errors Out - Number of errors leaving the object (/second)

l Discards In - Number of packets discarded coming in to the object (/second)

l Discards Out - Number of packets discarded leaving the object (/second)

RecoverPoint RPA Packet LossReturns RecoverPoint RPA packet loss in a line chart. Uses data from the RPA Performance datasource.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Site - Site at which the RecoverPoint Appliance is located

l Name - Name of the RecoverPoint Appliance

l Packet Loss - Packet loss on the network (as a percentage)

Tape Drive Error CountReturns tape drive error count in a column chart. Uses data from the Tape Drive Status datasource.

l Hostname - Name of the host to which the drive is attached. If gathering tape driveinformation by monitoring a tape library directly, this field contains the tape library name. Ifgathering tape drive information from a unit that manages multiple tape libraries such as anEDL, this field contains the name of that device

l Device Name - Name of device

l Soft Errors - Total of the soft read and write errors

l Hard Errors - Total of the hard read and write errors

Reports by System Template

484 Dell EMC Data Protection Advisor Report Reference Guide

Tape Drive Error Count By NodeReturns tape drive error count by object in a column chart. Uses data from the Tape Drive Statusdata source.

l Hostname - Name of the host to which the drive is attached. If gathering tape driveinformation by monitoring a tape library directly, this field contains the tape library name. Ifgathering tape drive information from a unit that manages multiple tape libraries such as anEDL, this field contains the name of that device

l Soft Errors - Total of the soft read and write errors

l Hard Errors - Total of the hard read and write errors

Tape Drive Error TrendReturns tape drive error trend details in a line chart. Uses data from the Tape Drive Status datasource.

l Hostname - Name of the host to which the drive is attached. If gathering tape driveinformation by monitoring a tape library directly, this field contains the tape library name. Ifgathering tape drive information from a unit that manages multiple tape libraries such as anEDL, this field contains the name of that device

l Library Name - If monitoring a device that manages multiple tape libraries such as an EDL Unit,this field contains the name of the library that in which the drive is located. In other situations,this field is not populated

l Device Name - Name of device

l Soft Read Errors - Number of corrected read errors

l Hard Read Errors - Number of uncorrected read errors

l Soft Write Errors - Number of corrected write errors

l Hard Write Errors - Number of uncorrected write errors

Tape Library ErrorsReturns tape library errors in a table report. Uses data from the Tape Library Errors data source.

l Hostname - Name of the host to which the device is attached

l Error Code - Associated error code for the error in the tape library

l Severity - Severity of the error

l Error - Error in the tape library

l Count - Number of errors logged at the time

l Action - Recommended action taken on error

l Timestamp - Date and time of the error

Viewlet system templatesFor more specific details on the various reports, select one of the reports described in thefollowing sections.

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 485

Backup KPIsReturns backup KPI details in a table report. Uses data from the Num Jobs, Backup Job Details,Backup Statistics, Restore Statistics, Total Size (MB), Backup Client Config, and Total SizeScanned (MB) data sources.

l Successful Backups - Number of successful backups

l Protected Data - Amount of protected data (in MB)

l Total Backups - Total number of backups

l Successful Restores - Number of successful restores

l Total Restores - Total restores

l Unprotected Clients - Number of unprotected clients

Backup Size Distribution for Backup KPIsDrill down report for viewlet that shows the total data backed up over time in a line chart. Usesdata from the Total Size and Total Size Scanned data sources.

l Protected Data - Amount of protected data (in GB)

Data Backed Up Daily for Backup KPIsDrill down report for viewlet that shows the total data backed broken down by daily interval in acolumn chart. Uses data from the Total Size and Total Size Scanned data sources.

l Protected Data - Amount of protected data (in GB)

Data Collection Agent ErrorsReturns data collection agent errors in a table report. Uses data from the Agent Configuration andAgent Errors data sources.

l Agent Name - Name of the DPA data collection agent

l Message - Error message that is returned

l Start Time - Start time of the last failure

l End Time - End time of the last failure

l Version - Version of the agent

Data Collection Agent HealthReturns data collection agent health details in a table report. Uses data from the AgentConfiguration, Agent Errors, and Agent Status data sources.

l Count - Number of agents

l Property -

Data Collection Agents DownReturns data collection agent down details in a table report. Uses data from the AgentConfiguration and Agent Status data sources.

l Agent Name - Name of the DPA data collection agent

Reports by System Template

486 Dell EMC Data Protection Advisor Report Reference Guide

l Version - Version of the agent

Objects Not Meeting RPOsReturns objects not meeting RPOs in a table report. Uses data from the Objects Not Meeting RPOdata source.

l Node name - Name of the replicated object

RecoverPoint Protected Capacity by SystemReturns the protected data capacity by the RecoverPoint System in a table. Uses data from theConsistency Group Data Protected and Consistency Group Copy Configuration data sources.

l Server - Name or IP address of the Management Interface of the RecoverPoint cluster

l Data Protected - Total amount of data protected (in MB)

RecoverPoint Protected Capacity by CGReturns the protected data capacity by the RecoverPoint Consistency Group in a table. Uses datafrom the Consistency Group Data Protected and Consistency Group Copy Configuration datasources.

l Consistency Group- Name or IP address of the Management Interface of the RecoverPointcluster

l Data Protected - Total amount of data protected (in MB)

Unprotected Clients for Backup KPIsDrill down report for Backup KPIs viewlet that returns those clients without a successful backup ina table report. Uses data from the Backup Client Config, Last Backup Details by Client and Job,and Num Jobs data sources.

l Server - Name of the backup server on which the Job took place

l Sub Name - Name of the TSM server instance

l Client - Name of the client on the backup server

l Domain Name - Name of the application domain

l Time Since Last Backup - Time since the last backup

Reports by System Template

Dell EMC Data Protection Advisor Report Reference Guide 487

Reports by System Template

488 Dell EMC Data Protection Advisor Report Reference Guide