The inventory reports key statistics about the files in the selected volume, such as files scanned and the available space trends. It reports information for NCP volumes on Linux POSIX file systems, Novell Storage Services (NSS) volumes, and Dynamic Storage Technology (DST) shadow volumes.
The inventory summary reports the number of files scanned on the volume and key statistics.
For a DST shadow volume, it shows information for the primary storage area and the secondary storage area. It also reports key statistics for the primary storage area, the secondary storage area, and both areas combined as the shadow volume.
Key Statistics |
Description |
---|---|
Total Subdirectories |
The total number of subdirectories in the volume. |
Total Files |
The total number of files in the volume. |
Space in Use |
The amount of space currently in use in the volume for data and metadata. On NSS volumes where salvage is enabled, the space in use includes space used by deleted files and directories. |
Space Available |
The amount of free space in the volume. |
File Types |
The number of different file types in use throughout the entire volume. |
Soft Link Files |
The NSS file system and NCP Server do not support soft links to files. In the initial release of DST, this is a placeholder for future non-NCP support. |
Soft Link Subdirectories |
The NSS file system and NCP Server do not support soft links to subdirectories. In the initial release of DST, this is a placeholder for future non-NCP support. |
The
report shows the trends for space usage on the volume. For a DST shadow volume, it shows information for the primary storage area and the secondary storage area.The
portion of the inventory report graphically displays information about the volume. Graphical profiles are displayed by size in bytes and file count for the following categories:indicates storage space usage by file types that are actually in use on your system, such as LOG, TDF, DAT, XML, EXE, and so on.
root user as the owner of files. For NCP volumes and NSS, file access is governed by the file system trustees assigned to the file, not the file owner. Trustees are users who have User objects defined in Novell eDirectory, and who have been granted file system rights for the file. NCP tracks ownership via the user’s eDirectory GUID.
indicates storage space usage by the designated owner of the file. It is not unusual in NCP to see theThree time stamp profiles are generated:
Files Modified Profiles: Modified dates indicate the last time someone changed the contents of a file.
Files Accessed Profiles: Access dates indicate the last time someone accessed a file, but did not change the contents if this differs from the modified date.
Files Changed Profiles: Change dates indicate the last time someone changed the metadata of a file, but did not change the contents if this differs from the modified date.
Time stamps are grouped by the following time periods:
reports the size of files, grouped by the following size ranges:
Statistical data used to create the graphs is also available in tables that report statistics for the volume.
For a DST shadow volume, data is categorized for the primary area, the secondary area, and both areas combined as the shadow volume. The count for file entries for the primary area and shadow (secondary) area are linked to detail reports that list the files matching that particular category and group. From the file lists, you have the option to copy, move, or delete one or multiple files.
An
lists all of the files that match a particular category and group for a file count entry in the tabular reports in the volume inventory. You can select one or multiple files in the list, then select one of the following operations to be performed:Move the selected volumes to the other file tree. (This option is available only for DST shadow volumes.)
Move the selected files to a specified path on the server.
Copy the selected files to a specified path on the server.
Delete the selected files.
At the bottom of the inventory report, you can create custom scans:
for NCP volumes, or for DST shadow volumes. These scans allow you to generate reports based on key statistics of interest, and perform actions on them.In the
scan, you can perform one of the following operations for DST shadow volumes on the files that match the search criteria you specify:List primary area selected files
Move selected files from primary area to shadow area.
List shadow area selected files.
Move selected files from shadow area to primary area.
In
, you can specify wildcards and characters to select files by filenames or extensions.In
, select or a user name. The search applies only to files where the file owner matches the specified owner.You can specify one or multiple time stamps to consider for the search:
Last Modified Time
Last Accessed Time
Last Changed Time
If no time stamp is selected, time stamps are not considered in the search criteria.
If a time stamp is selected, you can specify one or multiple time ranges to consider for the search:
You can specify one or multiple ranges of file sizes to consider for the search: