Listing All Files Included in an Exclusion Key Rule (Linux)
Determining the files that match an exclusion key rule involves two steps. You list all the keys in a GuardPoint, choose the key that you’re interested in, and then run a command to list the files that match that key. This process works for both standard key rules and exclusion key rules.
-
Decide on the GuardPoint that you want to check for excluded files. For example, for the GuardPoint
/oxf-fs1/gp1
, type the following on the command line:voradmin ldt key report /oxf-fs1/gp1 LDT_KEY1,1 LDT_KEY2,2 LDT_KEY3,5 NON_VERSIONED_KEY
The number after the comma is the key version number. See Key Report Option for more information about the
voradmin
key report. -
From the key report output, choose the key rule for which you want to list matching files. For example, to see the files associated with the
NON_VERSIONED_KEY
in the previous step, you would type:voradmin ldt key map NON_VERSIONED_KEY /oxf-fs1/gp1 /oxf-fs1/gp1/file1.dat10 /oxf-fs1/gp1/file2.dat10 /oxf-fs1/gp1/file3.dat10 /oxf-fs1/gp1/file4.dat10 /oxf-fs1/gp1/file5.dat10
See Key Map Option for more information about the
voradmin
key map report.