The inventory reports key statistics about the files in the selected volume, such as files scanned and the available space trends. It reports information for NCP volumes on Linux POSIX file systems, Novell Storage Services (NSS) volumes, and Dynamic Storage Technology (DST) shadow volumes.
The inventory summary reports the number of files scanned on the volume and key statistics.
For a DST shadow volume, it shows information for the primary storage area and the secondary storage area. It also reports key statistics for the primary storage area, the secondary storage area, and both areas combined as the shadow volume.
Key Statistics |
Description |
---|---|
Total Subdirectories |
The total number of subdirectories in the volume. |
Total Files |
The total number of files in the volume. |
Space in Use |
The amount of space currently in use in the volume for data and metadata. On NSS volumes where salvage is enabled, the space in use includes space used by deleted files and directories. |
Space Available |
The amount of free space in the volume. |
File Types |
The number of different file types in use throughout the entire volume. |
Soft Link Files |
The NSS file system and NCP Server do not support soft links to files. This is a placeholder for future non-NCP support. |
Soft Link Subdirectories |
The NSS file system and NCP Server do not support soft links to subdirectories. This is a placeholder for future non-NCP support. |
FIFO (named pipe) and Socket File Types |
Although the NSS file system supports, NCP Server does not support and display FIFO (named pipe) and Socket File Types when a volume is scanned for files. This is a placeholder for future non-NCP support. |
The Available Space Trends report shows the trends for space usage on the volume. For a DST shadow volume, it shows information for the primary storage area and the secondary storage area.
The Profiles portion of the inventory report graphically displays information about the volume. Graphical profiles are displayed by size in bytes and file count for the following categories:
In order to view the graphical displays in the file system inventory report, Java must be installed on the machine you use to access Novell Remote Manager, and the browser must have Java and Javascript enabled.
In Java 7 Update 51 (Java JRE 1.7.0_51) and later, applets with self-signed or unsigned certificates are blocked by the Java default Security setting of High, or a setting of Very High. You can set the Java Security setting to Medium in order to allow the graphical display applet to run after presenting a security prompt. Other security warnings about unsigned certificates or self-signed certificates must also be addressed.
For more information, see Inventory Graphics Are Not Displayed in the Web Browser
in the OES 11 SP3: Novell Remote Manager Administration Guide.
File Type Profiles indicates storage space usage by file types that are actually in use on your system, such as LOG, TDF, DAT, XML, EXE, and so on.
File Owner Profiles indicates storage space usage by the designated owner of the file. It is not unusual in NCP to see the root user as the owner of files. For NCP volumes and NSS, file access is governed by the file system trustees assigned to the file, not the file owner. Trustees are users who have User objects defined in NetIQ eDirectory, and who have been granted file system rights for the file. NCP tracks ownership via the user’s eDirectory GUID.
Three time stamp profiles are generated:
Files Modified Profiles: Modified dates indicate the last time someone changed the contents of a file.
Files Accessed Profiles: Access dates indicate the last time someone accessed a file, but did not change the contents if this differs from the modified date.
Files Changed Profiles: Change dates indicate the last time someone changed the metadata of a file, but did not change the contents if this differs from the modified date.
Time stamps are grouped by the following time periods:
File Size Profiles reports the size of files, grouped by the following size ranges:
Statistical data used to create the graphs is also available in tables that report statistics for the volume.
For a DST shadow volume, data is categorized for the primary area, the secondary area, and both areas combined as the shadow volume. The count for file entries for the primary area and shadow (secondary) area are linked to detail reports that list the files matching that particular category and group. From the file lists, you have the option to copy, move, or delete one or multiple files.
An Inventory Detail report lists all of the files that match a particular category and group for a file count entry in the tabular reports in the volume inventory. You can select one or multiple files in the list, then select one of the following operations to be performed:
Move the selected volumes to the other file tree. (This option is available only for DST shadow volumes.)
Move the selected files to a specified path on the server.
Copy the selected files to a specified path on the server.
Delete the selected files.
At the bottom of the inventory report, you can create custom scans: Customer Directory Tree Scans for NCP volumes, or Custom Shadow Volume Options for DST shadow volumes. These scans allow you to generate reports based on key statistics of interest, and perform actions on them.
In the Custom Shadow Volume Options scan, you can perform one of the following operations for DST shadow volumes on the files that match the search criteria you specify:
List primary area selected files
Move selected files from primary area to shadow area.
List shadow area selected files.
Move selected files from shadow area to primary area.
In Search Patterns you can specify wildcards and characters to select files by filenames or extensions.
In File Owner Restrictions select None or a user name. The search applies only to files where the file owner matches the specified owner.
You can specify one or multiple time stamps to consider for the search:
Last Modified Time
Last Accessed Time
Last Changed Time
If no time stamp is selected, time stamps are not considered in the search criteria.
If a time stamp is selected, you can specify one or multiple time ranges to consider for the search:
You can specify one or multiple ranges of file sizes to consider for the search: