Hp StoreAll Storage Bedienungsanleitung Seite 1

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Lager Hp StoreAll Storage herunter. HP StoreAll Storage User Manual [es] Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 209
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
HP IBRIX X9000 Network Storage System
File System User Guide
Abstract
This guide describes how to configure and manage X9000 Software file systems and how to use NFS, CIFS, FTP, and HTTP
to access file system data. The guide also describes the following file system features: quotas, remote replication, snapshots,
data retention and validation, data tiering, and file allocation. The guide is intended for system administrators managing X9300
Network Storage Gateway systems, X9320 Network Storage Systems, X9720 Network Storage Systems, and X9730 Network
Storage Systems. For the latest X9000 guides, browse to http://www.hp.com/support/manuals. In the storage section, select
NAS Systems and then select HP X9000 Network Storage Systems from the IBRIX Storage Systems section.
HP Part Number: TA768-96061
Published: June 2012
Edition: 8
Seitenansicht 0
1 2 3 4 5 6 ... 208 209

Inhaltsverzeichnis

Seite 1 - File System User Guide

HP IBRIX X9000 Network Storage SystemFile System User GuideAbstractThis guide describes how to configure and manage X9000 Software file systems and ho

Seite 2

1) The segment server initiating the operation can read files directly from the segmentacross the SAN; this is called a SAN READ.2) The segment server

Seite 3 - Contents

Modify a configuration profile:ibrix_ftpshare -m SHARENAME –c PROFILENAME [-f FSNAME -p dirpath] -IIP-Address:Port [–u USERLIST] [-S SETTINGLIST]Delet

Seite 4 - 4 Contents

Accessing sharesClients can access an FTP share by specifying a URL in their browser (Internet Explorer or MozillaFirefox). In the following URLs, IP_

Seite 5 - Contents 5

For Active Directory users (specify the user as in this example: ASM2k3.com\\ib1):• Upload a file using FTP protocol:curl -T <filename> -k ftp:/

Seite 6 - 6 Contents

9 Using HTTPThe HTTP feature allows you to create HTTP file shares for data stored on the cluster. Clients accessthe HTTP shares using standard HTTP a

Seite 7 - Contents 7

• Ensure that all users who are given read or write access to HTTP shares have sufficient accesspermissions at the file system level for the directori

Seite 8 - File system operations

On the Host Servers page, select the servers that will host the configuration profile.Managing HTTP from the GUI 105

Seite 9 - File system operations 9

On the Virtual Host page, enter a name for the virtual host and specify an SSL certificate anddomain name if used. Also add one or more IP addresses:p

Seite 10 - Configuring file systems

On the Settings page, set the appropriate parameters for the share. Note the following:• When specifying the URL Path, do not include http://<IP ad

Seite 11 - Accessing file systems

On the Users page, specify the users to be given access to the share.IMPORTANT: Ensure that all users who are given read or write access to shares hav

Seite 12 - Creating a file system

To allow specific users read access, write access, or both, click Add. On the Add Users to Sharedialog box, assign the appropriate permissions to the

Seite 13 - Creating a file system 13

• Data retention and validation. Data retention ensures that files cannot be modified or deletedfor a specific retention period. Data validation scans

Seite 14

The users will see an index of the share (if the browseable property of the share is set to true), andcan open and save files. For more information ab

Seite 15 - Creating a file system 15

ibrix_httpconfig –a profile1 –h node1,node2 -S“wblocksize=<value>,rblocksize=<value>”You can also set the values on the Modify HTTP Profil

Seite 16

Managing the HTTP configurationView a configuration profile:ibrix_httpconfig -i PROFILENAME [-v level]Modify a configuration profile:ibrix_httpconfig

Seite 17 - Creating a file system 17

Accessing sharesClients access an HTTP share by specifying a URL in their browser (Internet Explorer or MozillaFirefox). In the following URLs, IP_add

Seite 18 - File limit for directories

• Download a file using HTTP protocol:curl -u <ADuser> http://IP_address/dils/urlpath -o path todownload>/<filename>/• Download a file

Seite 19

• When creating certificates, verify that the hostname matches the Vhost name.When creating a certificate, the hostname should match the Vhost name or

Seite 20 - CLI procedures

1. Disconnect the network drive.2. In Windows, select Start > Run and enter regedit.3. Increase FileAttributeLimitInBytes from the default value of

Seite 21 - Windows X9000 clients

10 Managing SSL certificatesServers accepting FTPS and HTTPS connections typically provide an SSL certificate that verifies theidentity and owner of t

Seite 22 - Using Export Control

1. Generate a private key:openssl genrsa -des3 -out server.key 1024You will be prompted to enter a passphrase. Be sure to remember the passphrase.2. R

Seite 23 - Using Export Control 23

Adding a certificate to the clusterTo add an existing certificate to the cluster, click Add on the Certificates panel. On the AddCertificate dialog bo

Seite 24 - 3 Setting up quotas

2 Creating and mounting file systemsThis chapter describes how to create file systems and mount or unmount them.Creating a file systemYou can create a

Seite 25 - Setting user and group quotas

Exporting a certificateIf necessary, you can display a certificate and then copy and save the contents for future use. Thisstep is called exporting. S

Seite 26 - 26 Setting up quotas

11 Using remote replicationThis chapter describes how to configure and manage the Continuous Remote Replication (CRR)service.OverviewThe CRR service p

Seite 27 - Setting directory tree quotas

NOTE: Run-once can also be used to replicate a single software snapshot. This must be done onthe GUI.You can replicate to a remote cluster (an intercl

Seite 28

NOTE: If a different file system is used for the target, the linkage can go back to the originalcluster.• To replicate a directory or snapshot on a fi

Seite 29 - Using a quotas file

Select the file system on the GUI, and then select Remote Replication Exports from the lowerNavigator. On the Remote Replication Exports bottom panel,

Seite 30 - Using online quota check

The Remote Replication Exports panel lists the replication exports you created for the file system.Expand Remote Replication Exports in the lower Navi

Seite 31 - Deleting quotas

FSNAME is the target file system to be exported. The –p option exports a directory located underthe root of the specified file system (the default is

Seite 32 - Troubleshooting quotas

Additional reports are available for the active replication tasks. In the lower Navigator, expandActive Tasks > Remote Replication to see a list of

Seite 33 - 4 Maintaining file systems

For a run-once replication, either specify the source directory or click Use a snapshot and thenselect the appropriate Snap Tree and snapshot.For both

Seite 34

For a run-once replication, either specify the source directory or click Use a snapshot and thenselect the appropriate Snap Tree and snapshot.For both

Seite 35

On the Configure Options dialog box, enter a name for the file system, and specify the appropriateconfiguration options.Creating a file system 13

Seite 36

Pausing or resuming a replication taskTo pause a task, select it on the Remote Replication Tasks panel and click Pause. When you pausea task, the stat

Seite 37 - Extending a file system

option, the replication starts at the root of the file system. The run-once job terminates after thereplication is complete; however, the job can be s

Seite 38 - How rebalancing works

Resuming a remote replication taskUse the following command to resume a continuous or run-once replication task with the specifiedtask ID. Use the ibr

Seite 39

1. Stop write traffic to the local site.2. Wait for all remote replication queues to drain.3. Stop remote replication on the local site.4. Reconfigure

Seite 40 - 40 Maintaining file systems

12 Managing data retention and validationThe data retention and validation feature is intended for sites that need to archive read-only filesfor busin

Seite 41 - Deleting a file system

Default retention period. If a specific retention period is not applied to a file, the file will be retainedfor the default retention period. The sett

Seite 42 - 42 Maintaining file systems

storage. A scheduled scan will quit immediately if it detects that a scan of the same file system isalready running.You can schedule periodic data val

Seite 43

Check Enable Data Validation to schedule periodic scans on the file system. Use the default schedule,or select Modify to open the Data Validation Scan

Seite 44 - Troubleshooting file systems

The retenMode option is required and is either enterprise or relaxed. You can specify any,all, or none of the period options. retenDefPeriod is the de

Seite 45 - SegmentRejected is reported

To enable data retention on an existing file system using the CLI, run this command:ibrix_fs -W -f FSNAME -o "retenMode=<mode>,retenDefPeri

Seite 46

If data retention will be used on the file system, enable it and set the retention policy on theWORM/Data Retention dialog box. See “Managing data ret

Seite 47

========================= { … } RETENTION : Enterprise [default=15d,mininum=1d,maximum=5y]Changing the retention profile for a fi

Seite 48 - 5 Using NFS

See the touch(1) documentation for the time/date formats allowed with the -d option. You canalso enter the following on a Linux command line to see th

Seite 49 - Exporting a file system 49

To administer files from the CLI, use the ibrix_reten_adm command.IMPORTANT: Do not use the ibrix_reten_adm command on a file system that is not enabl

Seite 50

Setting or removing a legal holdWhen a legal hold is set on a retained or WORM file, the file cannot be deleted until the hold isreleased, even if the

Seite 51 - Unexporting a file system

system is in Relaxed retention mode (not Enterprise), the exact date/time can be in the past, inwhich case the file immediately expires from retention

Seite 52 - Log files

Go to the Schedule tab to specify when you want to run the scan.Starting an on-demand validation scanYou can run a validation scan at any time. Select

Seite 53

To start an on-demand validation scan from the CLI, use the following command:ibrix_datavalidation -s -f FSNAME [-d PATH]Viewing, stopping, or pausing

Seite 54

Meta hash: 80f68a53bb4a49d0ca19af1dec18e2ff0cf965daData hash: d64492d19786dddf50b5a7c3bebd3fc8930fc493The showvms command displays the hash sums store

Seite 55

The utilization report summarizes how storage is utilized between retention states and free space.The next example shows the first page of a utilizati

Seite 56

Generating and managing reportsTo run an unscheduled report from the GUI, select Filesystems in the upper Navigator and thenselect WORM/Data Retention

Seite 57 - Active Directory

If you want to create data retention reports, click Enable Report Data Generation. Use the defaultschedule, or click Modify to open the Report Data Ge

Seite 58 - LDAP ID mapping

ibrix_reports -s -f FILESYSTEMThen run the following command to generate the specified report:ibrix_reports -g -f FILESYSTEM -n NAME -o OUTPUT FORMATU

Seite 59

Backup support for data retentionThe supported method for backing up and restoring WORM/retained files is to use NDMP withDMA applications. Other back

Seite 60

13 Configuring Antivirus supportThe X9000 antivirus feature can be used with supported Antivirus software, which must be run onsystems outside the clu

Seite 61 - Local Groups

On the CLI, use the ibrix_avconfig command to configure Antivirus support. Use the ibrix_avcommand to update Antivirus definitions or view statistics.

Seite 62 - Local Users

ibrix_avconfig -d -FDisable Antivirus on specific file systems:ibrix_avconfig -d -f FSLISTUpdating Antivirus definitionsYou should update the virus de

Seite 63

To set the policy from the CLI, use this command:ibrix_avconfig -u -g A|DDefining protocol-specific policiesFor certain file sharing protocols (curren

Seite 64 - Windows Share Administrators

on their file extension or size. To configure exclusions on the GUI, click Exclusion on the AV EnableDisable panel. On the Exclusion Property dialog b

Seite 65 - Configuring LDAP

On the CLI, use the following options to specify exclusions with the ibrix_avconfig command:• -x FILE_EXTENSION — Excludes all files having the specif

Seite 66 - Configuring LDAP ID mapping

The CLI commands are:View statistics from all cluster nodes:ibrix_av -l -sDelete statistics from all nodes:ibrix_av -d -sAntivirus quarantines and sof

Seite 67

The quarantine utility displays both the snap name (which still has the original name), and the newfilename, although they are same file.Antivirus qua

Seite 68 - Delete a Local Group account:

The Default File Shares page allows you to create an NFS export and/or a CIFS share at the rootof the file system. The default settings are used. See

Seite 69 - 7 Using CIFS

14 Creating X9000 software snapshotsThe X9000 software snapshot feature allows you to capture a point-in-time copy of a file systemor directory for on

Seite 70 - Monitoring CIFS services

To enable a directory tree for snapshots, click Add on the Snap Trees panel.You can create a snapshot directory tree for an entire file system or a di

Seite 71 - CIFS shares

Modifying a snapshot scheduleYou can change the snapshot schedule at any time. On the Snap Trees panel, select the appropriatesnap tree, select Modify

Seite 72 - 72 Using CIFS

To take a snapshot from the CLI, use the following command:ibrix_snap -c -f FSNAME -P SNAPTREEPATH -n NAMEPATTERNSNAPTREEPATH is the full directory pa

Seite 73 - CIFS shares 73

2011-06-01T140000_hourly 2011-06-01T220000_hourly 2011-06-02T060000_hourly2011-06-01T150000_hourly 2011-06-01T230000_hourly 2011-06-02T070000_hour

Seite 74 - 74 Using CIFS

to copy files from the snapshot directory to a local or remote directory (see “Starting a replicationtask” (page 127)).Deleting snapshotsScheduled sna

Seite 75 - Configuring SMB signing

Select New on the Task Summary panel to open the New Snapshot Space Reclamation Task dialogbox.On the General tab, select a reclamation strategy:• Max

Seite 76 - 76 Using CIFS

To stop a running reclamation task, click Stop on the Task Summary panel.Managing reclamation tasks from the CLITo start a reclamation task from the C

Seite 77 - CIFS shares 77

Moving files between snap treesFiles created on, copied, or moved to a snap tree directory can be moved to any other snap treeor non-snap tree directo

Seite 78 - 78 Using CIFS

15 Creating block snapshotsThe block snapshot feature allows you to capture a point-in-time copy of a file system for onlinebackup purposes and to sim

Seite 79 - Connecting to cluster nodes

The Data Retention tab allows you to change the data retention configuration. The file system mustbe unmounted. See “Configuring data retention on exi

Seite 80 - Saving MMC settings

NOTE: If the snapshot store is too small, the snapshot will eventually exceed the available space(unless you detect this and manually increase storage

Seite 81 - Adding CIFS shares

The type of storage array determines the maximum number of snapshots you can keep and mountper file system.Maximum number of snapshots to mountMaximum

Seite 82 - 82 Using CIFS

Under Snapshot Configuration, select New to create a new snapshot scheme. The Create SnapshotScheme dialog box appears.172 Creating block snapshots

Seite 83

On the General tab, enter a name for the strategy and then specify the number of snapshots tokeep and mount on a daily, weekly, and monthly basis. Kee

Seite 84 - 84 Using CIFS

For either template, enter one or more of the following variables. The variables must be enclosedin braces ({ }) and separated by underscores (_). The

Seite 85 - Assigning attributes

ibrix_vs_snap_strategy -c -n NAME -k KEEP -m MOUNT [-N NAMESPEC] [-M MOUNTSPEC]The options are:The name for the snapshot scheme.-n NAMEThe number of s

Seite 86 - 86 Using CIFS

To see details about a specific automated snapshot scheme, use the following command:ibrix_vs_snap_strategy -i -n NAMEDeleting an automated snapshot s

Seite 87 - CIFS clients

Viewing snapshot informationUse the following commands to view snapshot information from the CLI.Listing snapshot information for all hostsThe ibrix_v

Seite 88 - CIFS shadow copy

The following table lists the output fields for ibrix_vs_snap -i.DescriptionFieldSnapshot segment number.SEGMENTThe file serving node that owns the sn

Seite 89 - Windows Clients Behavior

The next window shows a CIFS client accessing the snapshot file system .fs1_snap1. The originalfile system is mapped to drive X.Accessing snapshot fil

Seite 90 - 90 Using CIFS

In the commands, the –t option specifies a tier. TIERNAME can be any alphanumeric, case-sensitive,text string. Tier assignment is not affected by othe

Seite 91 - New directories and files

Troubleshooting block snapshotsSnapshot reserve is full and the MSA2000 is deleting snapshot volumesWhen the snapshot reserve is full, the MSA2000 wil

Seite 92 - Troubleshooting CIFS

16 Using data tieringA data tier is a logical grouping of file system segments. After creating tiers containing the segmentsin the file system, you ca

Seite 93 - Troubleshooting CIFS 93

In this example, filesystem ifs1 has four segments and no tiering information is currently defined.We will create two tiers, Tier1 and Tier2, and we w

Seite 94 - 8 Using FTP

Defining the primary tierAll new files are written to the primary tier, which is typically the tier built on the fastest storage.Use the following com

Seite 95 - Managing FTP from the GUI 95

The Data Tiering Rules panel lists the existing rules for the file system. To create a rule, click Create.On the Create Data Tiering Rule dialog box,

Seite 96 - 96 Using FTP

Additional rule examplesThe following rule migrates all files from Tier2 to Tier1:name="*"The following rule migrates all files in the subtr

Seite 97 - Managing FTP from the GUI 97

Click Details to see summary information about the task.Changing the tiering configuration with the GUIThe following restrictions apply when changing

Seite 98 - 98 Using FTP

Removing a segment from a tierYou can remove a segment from a tier, without assigning it to another tier. Select the file systemfrom the Filesystems p

Seite 99 - Managing FTP from the CLI

Assigning segments to tiersFirst determine the segments in the file system and then assign them to tiers. Use the followingcommand to list the segment

Seite 100 - The vsftpd service

ibrix_migrator -A -f FSNAME -r RULE -S SOURCE_TIER -D DESTINATION_TIERThe following rule migrates all files that have not been modified for 30 minutes

Seite 101 - Accessing shares

To mount or remount a file system, select it on the Filesystems panel and click Mount. You canselect several mount options on the Mount Filesystem dia

Seite 102 - 102 Using FTP

[root@ibrix01a testdata1]# ibrix_task -i -n Migrator_163 Operation: Migrator_163 ======================= Task Summary ============ Task Id

Seite 103 - 9 Using HTTP

Deleting a tiering ruleBefore deleting a rule, run the ibrix_migrator -l [-f FSNAME] -r command and notethe ID assigned to the rule. Then use the foll

Seite 104 - Managing HTTP from the GUI

Use the following qualifiers for relative times and dates:• Relative time: Enter in rules as year or years, month or months,week or weeks, day ordays,

Seite 105

The rule in the following example is based on the file’s last modification time, using a relative timeperiod. All files whose last modification date i

Seite 106 - 106 Using HTTP

files will be encountered at the beginning of the job, causing space on tier 2 to be consumed fasterthan on tier 1. Once a destination tier is full, o

Seite 107

17 Using file allocationThis chapter describes how to configure and manage file allocation.OverviewX9000 Software allocates new files and directories

Seite 108 - 108 Using HTTP

Standard segment preferences and allocation policiesCommentDescriptionNameThis is the default segment preference. It is suitablefor most use cases.Pre

Seite 109

An X9000 client or X9000 file serving node (referred to as “the host”) uses the following precedencerules to evaluate the file allocation settings tha

Seite 110 - 110 Using HTTP

Setting file and directory allocation policies from the CLIAllocation policy names are case sensitive and must be entered as uppercase letters (for ex

Seite 111 - Managing HTTP from the CLI

Creating a pool of preferred segments from the CLIA segment pool can consist of individually selected segments, all segments local to a file servingno

Seite 112 - 112 Using HTTP

© Copyright 2009, 2012 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP required for possession, use or

Seite 113

CLI proceduresThe CLI commands are executed immediately on file serving nodes. For X9000 clients, the commandintention is stored in the active Fusion

Seite 114 - 114 Using HTTP

Tuning allocation policy settingsTo optimize system performance, you can globally change the following allocation policy settingsfor a file system:• F

Seite 115 - Troubleshooting HTTP

HOSTNAME FSNAME POLICY STARTSEG DIRPOLICY DIRSEG SEGBITS READAHEAD PREALLOC HWM SWMmak01.hp.com ifs1 RANDOM 0 NONE 0

Seite 116 - 116 Using HTTP

18 Support and other resourcesContacting HPFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore con

Seite 117 - 10 Managing SSL certificates

19 Documentation feedbackHP is committed to providing documentation that meets your needs. To help us improve thedocumentation, send any errors, sugge

Seite 118 - 118 Managing SSL certificates

GlossaryACE Access control entry.ACL Access control list.ADS Active Directory Service.ALB Advanced load balancing.BMC Baseboard Management Configurati

Seite 119

SELinux Security-Enhanced Linux.SFU Microsoft Services for UNIX.SID Secondary controller identifier number.SNMP Simple Network Management Protocol.TCP

Seite 120 - Deleting a certificate

IndexSymbols/etc/likewise/vhostmap file, 8732-bit mode, disable, 4132-bit mode, enable, 12AActive Directoryconfigure, 57configure from CLI, 65Linux st

Seite 121 - 11 Using remote replication

data validationcompare hash sums, 146on-demand scans, 145resolve scan errors, 147schedule scans, 144stop or pause, 146view scan results, 146data valid

Seite 122 - 122 Using remote replication

MMicrosoft Management Consolemanage CIFS shares, 78migration, files, 185mounting, file system, 18, 20mountpointscreate from CLI, 20delete, 19, 20view,

Seite 123 - GUI procedure

create, 176defined, 169delete, 176discover LUNs, 170list storage allocation, 170mount, 176register the snapshot partition, 170set up the snapshot part

Seite 124 - 124 Using remote replication

NOTE: A file system must be mounted on the file serving node that owns the root segment (thatis, segment 1) before it can be mounted on any other host

Seite 125 - CLI procedure

Limiting file system access for X9000 clientsBy default, all X9000 clients can mount a file system after a mountpoint has been created. To limitaccess

Seite 126 - Viewing replication tasks

In addition, when specifying a hostgroup, the root user can be limited to RO access by addingthe root_ro parameter.Using Export Control 23

Seite 127 - Starting a replication task

3 Setting up quotasQuotas can be assigned to individual users or groups, or to a directory tree. Individual quotaslimit the amount of storage or the n

Seite 128 - Same cluster replications

On the GUI, select the file system and then select Quotas from the lower Navigator. On the QuotaSummary bottom panel, click Modify.To enable quotas fr

Seite 129

To configure a group quota, select the file system where the quotas will be configured. Next, selectQuotas > Group Quotas from the lower Navigator,

Seite 130 - Stopping a replication task

CLI procedureUse the following commands to set quotas for users and groups:• Set a quota for a single user:ibrix_edquota -s -u “USER” -f FSNAME [-M SO

Seite 131

To change a directory tree quota, select the directory tree on the Quota Usage Limits bottom panel,and then click Modify.CLI procedureTo create a dire

Seite 132 - 132 Using remote replication

Using a quotas fileQuota limits can be imported into the cluster from the quotas file, and existing quotas can beexported to the file. See “Format of

Seite 133

Contents1 Using X9000 Software file systems...8File system operations...

Seite 134 - Overview

A,{type},{block_hardlimit},{block_soft-limit},{inode_hardlimit},{inode_softlimit},{id}B,{type},{block_hardlimit},{block_soft-limit},{inode_hardlimit},

Seite 135 - Data validation scans

To run an online quota check from the GUI, select the file system and then select Online quotacheck from the lower Navigator.On the Task Summary panel

Seite 136 - New file systems

Troubleshooting quotasRecreated directory does not appear in directory tree quotaIf you create a directory tree quota on a specific directory and dele

Seite 137

4 Maintaining file systemsThis chapter describes how to extend a file system, rebalance segments, delete a file system or filesystem component, and ch

Seite 138

Viewing physical volume informationUse the following command to view information about physical volumes:ibrix_pv -lThe following table lists the outpu

Seite 139 - FileSystem: ifs1

Viewing logical volume informationTo view information about logical volumes, use the ibrix_lv -l command. The following tablelists the output fields f

Seite 140 - Setting the atime

DescriptionFieldYes if enabled; No if not.EXPORT_CONTROL_ENABLEDYes if enabled; No if not.QUOTA_ENABLEDIf data retention is enabled, the retention pol

Seite 141 - File administration

DescriptionFieldBackup host name.BACKUPSegment type. MIXED means the segment can contain both files and directories.TYPETier to which the segment was

Seite 142 - Specifying path lists

On the CLI, use the ibrix_fs command to extend a file system. Segments are added to the fileserving nodes in a round-robin manner. If tiering rules ar

Seite 143 - Changing a retention period

segments, and then moves files from sources to destinations to bring each candidate source segmentas close as possible to the calculated utilization t

Seite 144 - Running data validation scans

Deleting segments, volume groups, and physical volumes...42Deleting file serving nodes and X9000

Seite 145

Rebalancing segments from the CLITo rebalance all segments, use the following command. Include the -a option to run the rebalanceoperation in analytic

Seite 146

Viewing the status of rebalance tasksUse the following commands to view status for jobs on all file systems or only on the file systemsspecified in FS

Seite 147

To delete a file system, use the following command:ibrix_fs -d [—R] f FSLISTFor example, to delete file systems ifs1 and ifs2:ibrix_fs -d -f ifs1,ifs2

Seite 148

The ibrix_fsck command can detect and repair file system inconsistencies. File systeminconsistencies can occur for many reasons, including hardware fa

Seite 149

Run phase 2:ibrix_fsck -p 2 -f FSNAME [-s LVNAME] [-c] [-o "options"]The command can be run on the specified file system or optionally only

Seite 150 - Using remote replication

File system alert is displayed after a segment is evacuatedWhen a segment is successfully evacuated, a segment unavailable alert is displayed in the G

Seite 151

state_flags ... SEGMENT_LOCAL SEGMENT_PREFERED SEGMENT_DHB <SEGMENT_ ORPHAN_LIST_CREATED (0x00100061) write_WM ...

Seite 152

ibrix_fs -c failed with "Bad magic number in super-block"If a file system creation command fails with an error such as the following, the co

Seite 153

5 Using NFSTo allow NFS clients to access an X9000 file system, the file system must be exported. You canexport a file system using the GUI or CLI. By

Seite 154

Use the Settings window to specify the clients allowed to access the share. Also select the permissionand privilege levels for the clients, and specif

Seite 155 - Defining exclusions

Permissions in a cross-protocol CIFS environment...90How the CIFS server handles

Seite 156

The Summary window shows the configuration of the share. You can go back and revise theconfiguration if necessary. When you click Finish, the export i

Seite 157 - Viewing Antivirus statistics

Unexporting a file systemA file system should be unexported before it is unmounted. On the GUI, select the file system, selectNFS Exports from the low

Seite 158

To set case insensitivity from the CLI, use the following command:ibrix_caseinsensitive -s -f FSNAME -c [ON|OFF] -p PATHViewing the current setting fo

Seite 159

2:0:/fs_test1/samename-T/samename: TRUE2:0:DONEThe next sample log file is for a change in case insensitivity:0:0:31849:Case Insensitivity is turned O

Seite 160

6 Configuring authentication for CIFS, FTP, and HTTPX9000 software supports several services for authenticating users accessing shares on X9000 filesy

Seite 161

Using LDAP as the primary authentication methodRequirements for LDAP users and groupsX9000 supports only OpenLDAP. If you are using LDAP or LDAP ID ma

Seite 162 - Managing software snapshots

DescriptionValueNonvirtual attributenameLimited write DN credentials. HP recommends that you do notuse cn=Manager credentials. Instead, use an account

Seite 163 - [root@x9000n1 .snapshot]# ls

The wizard displays the configuration pages corresponding to the option you selected.• Active Directory. See “Active Directory” (page 57).• LDAP. See

Seite 164 - Accessing snapshots using NFS

If you want to use LDAP ID mapping as a secondary lookup for Active Directory, select Enabledwith LDAP ID Mapping and AD in the Linux Static User Mapp

Seite 165 - Deleting snapshots

Enter the following information on the dialog box:Enter the server name or IP address of the LDAP server host.LDAP Server HostEnter the LDAP server po

Seite 166

Pausing a remote replication task...131Resuming a remote replicati

Seite 167

Enter the following information in the remaining fields:Enter the LDAP user account used to authenticate to the LDAP server to read data, such ascn=hp

Seite 168 - Backing up snapshots

NOTE: If LDAP is the primary authentication service, Windows clients such as Explorer or MMCplugins cannot be used to add new users.Local GroupsSpecif

Seite 169 - 15 Creating block snapshots

NOTE: If Local Users and Groups is the primary authentication service, Windows clients such asExplorer or MMC plugins cannot be used to add new users.

Seite 170 - Automated block snapshots

To provide account information for the user, click Advanced. The default home directory is /home/<username> and the default shell program is /bi

Seite 171

NOTE: If Local Users and Groups is the primary authentication service, Windows clients such asExplorer or MMC plugins cannot be used to add new users.

Seite 172 - Scheme dialog box appears

You cannot change the UID or RID for a Local User account. If it is necessary to change a UID orRID, first delete the account and then recreate it wit

Seite 173 - Automated block snapshots 173

ibrix_ldapconfig -a -h LDAPSERVERHOST [-P LDAPSERVERPORT] -b LDAPBINDDN-p LDAPBINDDNPASSWORD -w LDAPWRITEOU -B LDAPBASEOFSEARCH -n NETBIOS -EENABLESSL

Seite 174 - 174 Creating block snapshots

The LDAP bind password.-p LDAPBINDDNPASSWORDThe maximum amount of time to allow the search to run.-m MAXWAITTIMEThe maximum number of entries (the def

Seite 175

Delete a Local Group account:ibrix_localgroups -d -g GROUPNAME68 Configuring authentication for CIFS, FTP, and HTTP

Seite 176 - 176 Creating block snapshots

7 Using CIFSThe IBRIX CIFS server implementation allows you to create file shares for data stored on the cluster.The CIFS server provides a true Windo

Seite 177 - Viewing snapshot information

Preparing the snapshot partition...169Registering for snapshots..

Seite 178

NOTE: Click CIFS Settings to configure SMB signing on this server. See “Configuring SMB signing” (page 75) for more information.To start, stop, or res

Seite 179

ConditionHealth StatusMonitoring is disabledNot MonitoredThe active Fusion Manager could not communicate with other file serving nodes in the clusterN

Seite 180 - 180 Creating block snapshots

On the Permissions page, specify permissions for users and groups allowed to access the share.72 Using CIFS

Seite 181 - 16 Using data tiering

Click Add to open the New User/Group Permission Entry dialog box, where you can configurepermissions for a specific user or group. The completed entri

Seite 182 - 182 Using data tiering

bitmask is 1–32. The completed entry appears on the Client IP Filters list on the Client Filteringpage.On the Advanced Settings page, enable or disabl

Seite 183 - Defining the primary tier

Configuring SMB signingThe SMB signing feature specifies whether clients must support SMB signing to access CIFS shares.You can apply the setting to a

Seite 184 - 184 Using data tiering

When configuring SMB signing, note the following:• SMB2 is always enabled.• Use the Required check box to specify whether SMB signing (with either SMB

Seite 185 - Running a migration task

On the CIFS Shares panel, click Add or Modify to open the File Shares wizard, where you cancreate a new share or modify the selected share. Click Dele

Seite 186 - 186 Using data tiering

Use the -A ALLOWCLIENTIPSLIST or –E DENYCLIENTIPSLIST options to list client IP addressesallowed or denied access to the share. Use commas to separate

Seite 187

NOTE: To use MMC to manage CIFS shares, you must be authenticated as a user with sharemodification permissions.NOTE: If you will be adding users with

Seite 188 - Creating a tiering policy

1 Using X9000 Software file systemsFile system operationsThe following diagram highlights the operating principles of the X9000 file system.The topolo

Seite 189 - Listing tiering rules

Windows Vista, Windows 2008, Windows 7:Complete the following steps:1. Open the Start menu and enter mmc in the Start Search box. You can also enter m

Seite 190 - Deleting a tier

The following example gives share management privileges to a single user:ibrix_auth -t -S 'share admins=[domain\user1]'If you specify multip

Seite 191 - Writing tiering rules

To add a new share, select Shares > New Share and run the Create A Shared Folder Wizard. Onthe Folder Path panel, enter the path to the share, bein

Seite 192 - Migration rule examples

Deleting CIFS sharesTo delete a CIFS share, select the share on the Computer Management window, right-click, andselect Delete.Linux static user mappin

Seite 193 - Ambiguous rules

Installing Identity Management for UNIXTo install Identity Management for UNIX on a domain controller running Windows Server 2003R2, see the following

Seite 194 - 194 Using data tiering

The following article provides more information about modifying attributes in the Active Directoryglobal catalog:http://support.microsoft.com/kb/24871

Seite 195 - 17 Using file allocation

Consolidating SMB servers with common share namesIf your SMB servers previously used the same share names, you can consolidate the servers withoutchan

Seite 196

Client utilities such as net use will report the requested share name, not the new share name.Mapping old share names to new share namesMappings are d

Seite 197

CIFS users cannot view directory tree quotas.Differences in locking behaviorWhen CIFS clients access a share from different servers, as in the X9000 S

Seite 198 - Setting segment preferences

Restore operationsIf a file has been deleted from a directory that has Previous Versions, the user can recover a previousversion of the file by perfor

Seite 199

(Specifically, a segment need not be a complete, rooted directory tree). Segments can be anysize and different segments can be different sizes.2. The

Seite 200 - Listing allocation policies

CIFS shadow copy restore during node failoverIf a node fails over while a CIFS shadow copy restore is in progress, the user may see a disruptionin the

Seite 201

but will not be inherited or propagated. The CIFS server also does not map POSIX ACLs to becompatible with Windows ACLs on a file.These permission mec

Seite 202 - Subscription service

the share, and are not inherited downward into the share directory tree. For true Windows-likebehavior, the creator of a share must access the root of

Seite 203 - 19 Documentation feedback

occur for 15 to 20 minutes. The client's copy will then continue without error if the retry timeouthas not expired. To work around this situation

Seite 204 - Glossary

8 Using FTPThe FTP feature allows you to create FTP file shares for data stored on the cluster. Clients accessthe FTP shares using standard FTP and FT

Seite 205

On the Config Profile page, select an existing configuration profile or create a new profile,specifying a name and defining the appropriate parameters

Seite 206 - 206 Index

On the Host Servers page, select the servers that will host the configuration profile.On the Settings page, configure the FTP parameters that apply to

Seite 207

On the Users page, specify the users to be given access to the share.IMPORTANT: Ensure that all users who are given read or write access to shares hav

Seite 208 - 208 Index

To define permissions for a user, click Add to open the Add User to Share dialog box.Managing the FTP configurationSelect File Shares > FTP from th

Seite 209

Use the buttons on the panels to modify or delete the selected configuration profile or share. Youcan also add another FTP share to the selected confi

Kommentare zu diesen Handbüchern

Keine Kommentare