Obtaining Information About Keys Applied to Files
Key Report Option
In the following command, you can use the report
option of the voradmin
command to obtain information about all of the keys in use on the GuardPoint. The report lists all keys used in the GuardPoint. For each key, it gives the key name and key version number. It lists each unique key name and version combination only once, no matter how many files use the key.
The following example shows three keys used in the GuardPoint /oxf-fs1/gp1
:
voradmin ldt key report /oxf-fs1/gp1
LDT_KEY1,1
LDT_KEY2,2
LDT_KEY3,5
For an overview of voradmin ldt
, see CTE-LDT Command-Line Administration: voradmin command.
Key Map Option
In the voradmin ldt key [report|map] <key_name> <guard path>
command, you can use the map
option to obtain information about which files in a GuardPoint were transformed with a specific key, where:
<key_name>
is the name of the key.<guard path>
is the path of the GuardPoint where the key was used.
For example, to view information about the key LDT_KEY2 in the GuardPoint /oxf-fs1/gp1, you would enter:
voradmin ldt key map LDT_KEY2 /oxf-fs1/gp1
/oxf-fs1/gp1/file12345.dat10
/oxf-fs1/gp1/file12345.dat10
/oxf-fs1/gp1/file12345.dat10
/oxf-fs1/gp1/file12345.dat10
/oxf-fs1/gp1/file12345.dat10
Keys without a version number are used by files in an exclusion key rule or files that have yet to undergo initial key rotation. Use voradmin ldt key map
in conjunction with voradmin ldt attr get
to determine if a file using a key without a version number is part of an exclusion key rule or awaiting initial key rotation.