How to check your Avamar’s health with proactive_check

Here’s how to check your Avamar’s health with proactive_check

In order to keep everything clean we will check if we already have a “proactive_check” directory by entering the list command ls:

We see that the directory is not listed so we will create one using the make directory commannd.

We can validate it was created by listing again

Now we will change directory to our newly created proactive_check directory.

Here we have two options depending on your environment. If FTP is allowed at your site you can follow scenario 1 and if it is not allowed you can follow scenario 2

Scenario 1.

Here will enter the following ftp site to download the “” tool with the command:


admin@avamar:~/proactive_check/>: wget
--2024-02-02 14:00:40--  ftp://avamar_ftp:*password*
           => ''
Connecting to (|X.X.X.X|:21... connected.
Logging in as avamar_ftp ... Logged in!
==> SYST ... done.    ==> PWD ... done.
==> TYPE I ... done.  ==> CWD (1) /software/scripts ... done.
==> SIZE ... 363933
==> PASV ... done.    ==> RETR ... done.
Length: 363933 (355K) (unauthoritative)
100%[=====================================================================================================================================================================>] 363,933      794KB/s   in 0.4s   
2024-02-02 14:00:40 (794 KB/s) - '' saved [363933]

Scenario 2.

Here we will use WinSCP to upload the tool to the Avamar. Let’s download the file from Dell. First you will need to sign into the Dell site and once signed in you can paste in the following URL:

The link will automatically download the file for you. Once you have the file you can open WinSCP and login.

Then navigate on the left pane to the file and you can drag and drop it into the /space/home/admin/proactive_check/ directory that we create earlier.

Going back to our Avamar CLI in Putty, we need to give ourselves permisson to run the tool. First let’s run the ls -l command (LS-L in lowercase) to see the current permissions.

Now let’s run the following command: chmod 755 

Will check the permissions again to see what changed.

Now we have our file in the correct place!

We need to elevate to superuser to run the tool by typing su – and entering the password for superuser.

We can now run the command ./

You will see your results and suggested fixes. You can also enter the command cat hc_results.txt to see a detailed report including recommendation.

That will wrap this one up. Please let me know what you think in the comments!

Leave a Reply

Your email address will not be published. Required fields are marked *