The inventory provides key statistics about the files in the selected volume, such as files scanned and the available space trends. The inventory includes the following information:
The inventory summary lists the number of files scanned on the primary storage area and the secondary storage area. It also lists key statistics for the primary storage area, the secondary storage area, and both areas combined as the shadow volume.
Key Statistics |
Description |
---|---|
Total Subdirectories |
The total number of subdirectories in the volume. |
Total Files |
The total number of files in the volume. |
Space in Use |
The amount of space currently in use in the volume for data and metadata. On NSS volumes where salvage is enabled, the space in use includes space used by deleted files and directories. |
Space Available |
The amount of free space in the volume. |
File Types |
The number of different file types in use throughout the entire volume. |
Soft Link Files |
The NSS file system and NCP Server do not support soft links to files. This is a placeholder for future non-NCP support. |
Soft Link Subdirectories |
The NSS file system and NCP Server do not support soft links to subdirectories. This is a placeholder for future non-NCP support. |
The following figure is an example of the summary:
The Available Space Trends report shows the trends for space usage on the primary storage area and the secondary storage area. The following figure is an example of the Available Space Trend graphs:
The Profiles portion of the inventory report graphically displays information about the shadow volume. Graphical profiles are displayed by size in bytes and file count for the following categories:
File Type Profiles indicates storage space usage by file types that are actually in use on your system, such as LOG, TDF, DAT, XML, EXE, and so on.
The following figure is an example of the File Type Profiles graphs:
File Owner Profiles indicates storage space usage by the designated owner of the file. It is not unusual in NCP to see the root user as the owner of files. For NCP volumes and NSS, file access is governed by the file system trustees assigned to the file, not the file owner. Trustees are users who have User objects defined in eDirectory, and who have been granted file system rights for the file. NCP tracks ownership via the user’s eDirectory GUID.
The following figure is an example of the File Owner Profiles graphs.
Three time stamp profiles are generated:
Files Modified Profiles: Modified dates indicate the last time someone changed the contents of a file.
Files Accessed Profiles: Access dates indicate the last time someone accessed a file, but did not change the contents if this differs from the modified date.
Files Changed Profiles: Change dates indicate the last time someone changed the metadata of a file, but did not change the contents if this differs from the modified date.
Time stamps are grouped by the following time periods:
The following figure is an example of the File Modified Profiles graphs. Similar graphs are created for File Accessed Profiles and File Changed Profiles.
File Size Profiles reports the size of files, grouped by the following size ranges:
The following figure is an example of the File Size Profiles graphs:
Statistical data used to create the graphs is also available in tables that report statistics for the primary area, the secondary area, and both areas combined as the shadow volume. The count for file entries for the primary area and shadow (secondary) area are linked to detail reports that list the files matching that particular category and group. From the file lists, you have the option to copy, move, or delete one or multiple files.
For example, the following figure shows a few lines of a file-type information table:
An Inventory Detail Report lists all of the files that match a particular category and group for a file count entry in the tabular reports in the shadow volume inventory. You can select one or multiple files in the list, then select one of the following operations to be performed:
Move the selected volumes to the other file tree.
Move the selected files to a specified path on the server.
Copy the selected files to a specified path on the server.
Delete the selected files.
The action is performed on the selected files, and a confirmation list is displayed.
The following figure is an example of a detail report for file types that reside on the secondary volume:
The Custom Shadow Volume Options section of the volume inventory allows you to generate reports based on key statistics of interest, and perform actions on them.
You can perform one of the following volume operations on the files that match the search criteria you specify:
List primary area selected files
Move selected files from primary area to shadow area.
List shadow area selected files.
Move selected files from shadow area to primary area.
In Search Patterns, you can specify wildcards and characters to select files by file names or extensions.
In File Owner Restrictions, select None or a user name. The search applies only to files where the file owner matches the specified owner.
You can specify one or multiple time stamps to consider for the search:
Last Modified Time
Last Accessed Time
Last Changed Time
If no time stamp is selected, time stamps are not considered in the search criteria.
If a time stamp is selected, you can specify one or multiple time ranges to consider for the search:
You can specify one or multiple ranges of file sizes to consider for the search: