Array Capacity Utilization Reports > EMC Isilon SMB Share Summary
  
Version 10.0.00
EMC Isilon SMB Share Summary
Use Search to find a template, report or dashboard by name. Search is case insensitive, supports partial entries, and will display a list of potential matches.
As you enter the name in the Search field, up to 10 potential matches are displayed. If the template, report or dashboard is shown, you can select and run it directly from the match list. You can also click All Items in the match list to go directly to the Search Results.
StorageConsole provides different navigation options to slice and examine your collected data. You can explore the data by using the APTARE customizable report templates or by using parts of your IT infrastructure as entry points. The Inventory Navigator serves as a browser for your infrastructure by object type. See also Exploring Your Inventory.
Use the Reports tab to examine the StorageConsole catalog of templates, dashboards and reports - organized by products along with user-created, and system folders. This report is located here:
 
Cluster
Name of the Isilon cluster.
Name
Display name of the share.
Path
Shared path in the ifs file system.
Usage Without Overhead
Combined used capacity (in KiB) of all paths in the export (not including OneFS overhead). Values are stored as KiB in the database and rendered according to your user profile preferences.
Usage With Overhead
Combined used capacity (in KiB) of all paths in the export (including OneFS overhead). Values are stored as KiB in the database and rendered according to your user profile preferences.
# Files and Directories
Combined count of files and directories of all paths in the NFS export.
Description
Configurable share description.
CSC Policy
Client-side caching policy.
Browse
If yes, it makes the share visible in net view and browse lists.
Exec
If yes, allows a user with read-only (RO) access to execute the file.
Strict
If yes, the server checks for and enforces file locks.
Hide
If yes, it hides files that begin with a dot (Unix config files).
Imper
Allow guest access to the share.
Flush
If yes, flush requests are always honored.
Byte Start
Starting point for automatic invalid byte mangling.
Create Perm
Default permissions to apply to sub-directories and files.
Map
Mangle map.
User
Impersonate user name.
Notify
Change notify on the share.
Locks
If yes, allow oplock requests.
RO Del
If yes, allows read-only files to be deleted.
NTFS ACL
If yes, allows ACLs to be stored and edited.