HP IBRIX X9000 Network Storage SystemFile System User GuideAbstractThis guide describes how to configure and manage X9000 Software file systems and ho
1) The segment server initiating the operation can read files directly from the segmentacross the SAN; this is called a SAN READ.2) The segment server
Modify a configuration profile:ibrix_ftpshare -m SHARENAME –c PROFILENAME [-f FSNAME -p dirpath] -IIP-Address:Port [–u USERLIST] [-S SETTINGLIST]Delet
Accessing sharesClients can access an FTP share by specifying a URL in their browser (Internet Explorer or MozillaFirefox). In the following URLs, IP_
For Active Directory users (specify the user as in this example: ASM2k3.com\\ib1):• Upload a file using FTP protocol:curl -T <filename> -k ftp:/
9 Using HTTPThe HTTP feature allows you to create HTTP file shares for data stored on the cluster. Clients accessthe HTTP shares using standard HTTP a
• Ensure that all users who are given read or write access to HTTP shares have sufficient accesspermissions at the file system level for the directori
On the Host Servers page, select the servers that will host the configuration profile.Managing HTTP from the GUI 105
On the Virtual Host page, enter a name for the virtual host and specify an SSL certificate anddomain name if used. Also add one or more IP addresses:p
On the Settings page, set the appropriate parameters for the share. Note the following:• When specifying the URL Path, do not include http://<IP ad
On the Users page, specify the users to be given access to the share.IMPORTANT: Ensure that all users who are given read or write access to shares hav
To allow specific users read access, write access, or both, click Add. On the Add Users to Sharedialog box, assign the appropriate permissions to the
• Data retention and validation. Data retention ensures that files cannot be modified or deletedfor a specific retention period. Data validation scans
The users will see an index of the share (if the browseable property of the share is set to true), andcan open and save files. For more information ab
ibrix_httpconfig –a profile1 –h node1,node2 -S“wblocksize=<value>,rblocksize=<value>”You can also set the values on the Modify HTTP Profil
Managing the HTTP configurationView a configuration profile:ibrix_httpconfig -i PROFILENAME [-v level]Modify a configuration profile:ibrix_httpconfig
Accessing sharesClients access an HTTP share by specifying a URL in their browser (Internet Explorer or MozillaFirefox). In the following URLs, IP_add
• Download a file using HTTP protocol:curl -u <ADuser> http://IP_address/dils/urlpath -o path todownload>/<filename>/• Download a file
• When creating certificates, verify that the hostname matches the Vhost name.When creating a certificate, the hostname should match the Vhost name or
1. Disconnect the network drive.2. In Windows, select Start > Run and enter regedit.3. Increase FileAttributeLimitInBytes from the default value of
10 Managing SSL certificatesServers accepting FTPS and HTTPS connections typically provide an SSL certificate that verifies theidentity and owner of t
1. Generate a private key:openssl genrsa -des3 -out server.key 1024You will be prompted to enter a passphrase. Be sure to remember the passphrase.2. R
Adding a certificate to the clusterTo add an existing certificate to the cluster, click Add on the Certificates panel. On the AddCertificate dialog bo
2 Creating and mounting file systemsThis chapter describes how to create file systems and mount or unmount them.Creating a file systemYou can create a
Exporting a certificateIf necessary, you can display a certificate and then copy and save the contents for future use. Thisstep is called exporting. S
11 Using remote replicationThis chapter describes how to configure and manage the Continuous Remote Replication (CRR)service.OverviewThe CRR service p
NOTE: Run-once can also be used to replicate a single software snapshot. This must be done onthe GUI.You can replicate to a remote cluster (an intercl
NOTE: If a different file system is used for the target, the linkage can go back to the originalcluster.• To replicate a directory or snapshot on a fi
Select the file system on the GUI, and then select Remote Replication Exports from the lowerNavigator. On the Remote Replication Exports bottom panel,
The Remote Replication Exports panel lists the replication exports you created for the file system.Expand Remote Replication Exports in the lower Navi
FSNAME is the target file system to be exported. The –p option exports a directory located underthe root of the specified file system (the default is
Additional reports are available for the active replication tasks. In the lower Navigator, expandActive Tasks > Remote Replication to see a list of
For a run-once replication, either specify the source directory or click Use a snapshot and thenselect the appropriate Snap Tree and snapshot.For both
For a run-once replication, either specify the source directory or click Use a snapshot and thenselect the appropriate Snap Tree and snapshot.For both
On the Configure Options dialog box, enter a name for the file system, and specify the appropriateconfiguration options.Creating a file system 13
Pausing or resuming a replication taskTo pause a task, select it on the Remote Replication Tasks panel and click Pause. When you pausea task, the stat
option, the replication starts at the root of the file system. The run-once job terminates after thereplication is complete; however, the job can be s
Resuming a remote replication taskUse the following command to resume a continuous or run-once replication task with the specifiedtask ID. Use the ibr
1. Stop write traffic to the local site.2. Wait for all remote replication queues to drain.3. Stop remote replication on the local site.4. Reconfigure
12 Managing data retention and validationThe data retention and validation feature is intended for sites that need to archive read-only filesfor busin
Default retention period. If a specific retention period is not applied to a file, the file will be retainedfor the default retention period. The sett
storage. A scheduled scan will quit immediately if it detects that a scan of the same file system isalready running.You can schedule periodic data val
Check Enable Data Validation to schedule periodic scans on the file system. Use the default schedule,or select Modify to open the Data Validation Scan
The retenMode option is required and is either enterprise or relaxed. You can specify any,all, or none of the period options. retenDefPeriod is the de
To enable data retention on an existing file system using the CLI, run this command:ibrix_fs -W -f FSNAME -o "retenMode=<mode>,retenDefPeri
If data retention will be used on the file system, enable it and set the retention policy on theWORM/Data Retention dialog box. See “Managing data ret
========================= { … } RETENTION : Enterprise [default=15d,mininum=1d,maximum=5y]Changing the retention profile for a fi
See the touch(1) documentation for the time/date formats allowed with the -d option. You canalso enter the following on a Linux command line to see th
To administer files from the CLI, use the ibrix_reten_adm command.IMPORTANT: Do not use the ibrix_reten_adm command on a file system that is not enabl
Setting or removing a legal holdWhen a legal hold is set on a retained or WORM file, the file cannot be deleted until the hold isreleased, even if the
system is in Relaxed retention mode (not Enterprise), the exact date/time can be in the past, inwhich case the file immediately expires from retention
Go to the Schedule tab to specify when you want to run the scan.Starting an on-demand validation scanYou can run a validation scan at any time. Select
To start an on-demand validation scan from the CLI, use the following command:ibrix_datavalidation -s -f FSNAME [-d PATH]Viewing, stopping, or pausing
Meta hash: 80f68a53bb4a49d0ca19af1dec18e2ff0cf965daData hash: d64492d19786dddf50b5a7c3bebd3fc8930fc493The showvms command displays the hash sums store
The utilization report summarizes how storage is utilized between retention states and free space.The next example shows the first page of a utilizati
Generating and managing reportsTo run an unscheduled report from the GUI, select Filesystems in the upper Navigator and thenselect WORM/Data Retention
If you want to create data retention reports, click Enable Report Data Generation. Use the defaultschedule, or click Modify to open the Report Data Ge
ibrix_reports -s -f FILESYSTEMThen run the following command to generate the specified report:ibrix_reports -g -f FILESYSTEM -n NAME -o OUTPUT FORMATU
Backup support for data retentionThe supported method for backing up and restoring WORM/retained files is to use NDMP withDMA applications. Other back
13 Configuring Antivirus supportThe X9000 antivirus feature can be used with supported Antivirus software, which must be run onsystems outside the clu
On the CLI, use the ibrix_avconfig command to configure Antivirus support. Use the ibrix_avcommand to update Antivirus definitions or view statistics.
ibrix_avconfig -d -FDisable Antivirus on specific file systems:ibrix_avconfig -d -f FSLISTUpdating Antivirus definitionsYou should update the virus de
To set the policy from the CLI, use this command:ibrix_avconfig -u -g A|DDefining protocol-specific policiesFor certain file sharing protocols (curren
on their file extension or size. To configure exclusions on the GUI, click Exclusion on the AV EnableDisable panel. On the Exclusion Property dialog b
On the CLI, use the following options to specify exclusions with the ibrix_avconfig command:• -x FILE_EXTENSION — Excludes all files having the specif
The CLI commands are:View statistics from all cluster nodes:ibrix_av -l -sDelete statistics from all nodes:ibrix_av -d -sAntivirus quarantines and sof
The quarantine utility displays both the snap name (which still has the original name), and the newfilename, although they are same file.Antivirus qua
The Default File Shares page allows you to create an NFS export and/or a CIFS share at the rootof the file system. The default settings are used. See
14 Creating X9000 software snapshotsThe X9000 software snapshot feature allows you to capture a point-in-time copy of a file systemor directory for on
To enable a directory tree for snapshots, click Add on the Snap Trees panel.You can create a snapshot directory tree for an entire file system or a di
Modifying a snapshot scheduleYou can change the snapshot schedule at any time. On the Snap Trees panel, select the appropriatesnap tree, select Modify
To take a snapshot from the CLI, use the following command:ibrix_snap -c -f FSNAME -P SNAPTREEPATH -n NAMEPATTERNSNAPTREEPATH is the full directory pa
2011-06-01T140000_hourly 2011-06-01T220000_hourly 2011-06-02T060000_hourly2011-06-01T150000_hourly 2011-06-01T230000_hourly 2011-06-02T070000_hour
to copy files from the snapshot directory to a local or remote directory (see “Starting a replicationtask” (page 127)).Deleting snapshotsScheduled sna
Select New on the Task Summary panel to open the New Snapshot Space Reclamation Task dialogbox.On the General tab, select a reclamation strategy:• Max
To stop a running reclamation task, click Stop on the Task Summary panel.Managing reclamation tasks from the CLITo start a reclamation task from the C
Moving files between snap treesFiles created on, copied, or moved to a snap tree directory can be moved to any other snap treeor non-snap tree directo
15 Creating block snapshotsThe block snapshot feature allows you to capture a point-in-time copy of a file system for onlinebackup purposes and to sim
The Data Retention tab allows you to change the data retention configuration. The file system mustbe unmounted. See “Configuring data retention on exi
NOTE: If the snapshot store is too small, the snapshot will eventually exceed the available space(unless you detect this and manually increase storage
The type of storage array determines the maximum number of snapshots you can keep and mountper file system.Maximum number of snapshots to mountMaximum
Under Snapshot Configuration, select New to create a new snapshot scheme. The Create SnapshotScheme dialog box appears.172 Creating block snapshots
On the General tab, enter a name for the strategy and then specify the number of snapshots tokeep and mount on a daily, weekly, and monthly basis. Kee
For either template, enter one or more of the following variables. The variables must be enclosedin braces ({ }) and separated by underscores (_). The
ibrix_vs_snap_strategy -c -n NAME -k KEEP -m MOUNT [-N NAMESPEC] [-M MOUNTSPEC]The options are:The name for the snapshot scheme.-n NAMEThe number of s
To see details about a specific automated snapshot scheme, use the following command:ibrix_vs_snap_strategy -i -n NAMEDeleting an automated snapshot s
Viewing snapshot informationUse the following commands to view snapshot information from the CLI.Listing snapshot information for all hostsThe ibrix_v
The following table lists the output fields for ibrix_vs_snap -i.DescriptionFieldSnapshot segment number.SEGMENTThe file serving node that owns the sn
The next window shows a CIFS client accessing the snapshot file system .fs1_snap1. The originalfile system is mapped to drive X.Accessing snapshot fil
In the commands, the –t option specifies a tier. TIERNAME can be any alphanumeric, case-sensitive,text string. Tier assignment is not affected by othe
Troubleshooting block snapshotsSnapshot reserve is full and the MSA2000 is deleting snapshot volumesWhen the snapshot reserve is full, the MSA2000 wil
16 Using data tieringA data tier is a logical grouping of file system segments. After creating tiers containing the segmentsin the file system, you ca
In this example, filesystem ifs1 has four segments and no tiering information is currently defined.We will create two tiers, Tier1 and Tier2, and we w
Defining the primary tierAll new files are written to the primary tier, which is typically the tier built on the fastest storage.Use the following com
The Data Tiering Rules panel lists the existing rules for the file system. To create a rule, click Create.On the Create Data Tiering Rule dialog box,
Additional rule examplesThe following rule migrates all files from Tier2 to Tier1:name="*"The following rule migrates all files in the subtr
Click Details to see summary information about the task.Changing the tiering configuration with the GUIThe following restrictions apply when changing
Removing a segment from a tierYou can remove a segment from a tier, without assigning it to another tier. Select the file systemfrom the Filesystems p
Assigning segments to tiersFirst determine the segments in the file system and then assign them to tiers. Use the followingcommand to list the segment
ibrix_migrator -A -f FSNAME -r RULE -S SOURCE_TIER -D DESTINATION_TIERThe following rule migrates all files that have not been modified for 30 minutes
To mount or remount a file system, select it on the Filesystems panel and click Mount. You canselect several mount options on the Mount Filesystem dia
[root@ibrix01a testdata1]# ibrix_task -i -n Migrator_163 Operation: Migrator_163 ======================= Task Summary ============ Task Id
Deleting a tiering ruleBefore deleting a rule, run the ibrix_migrator -l [-f FSNAME] -r command and notethe ID assigned to the rule. Then use the foll
Use the following qualifiers for relative times and dates:• Relative time: Enter in rules as year or years, month or months,week or weeks, day ordays,
The rule in the following example is based on the file’s last modification time, using a relative timeperiod. All files whose last modification date i
files will be encountered at the beginning of the job, causing space on tier 2 to be consumed fasterthan on tier 1. Once a destination tier is full, o
17 Using file allocationThis chapter describes how to configure and manage file allocation.OverviewX9000 Software allocates new files and directories
Standard segment preferences and allocation policiesCommentDescriptionNameThis is the default segment preference. It is suitablefor most use cases.Pre
An X9000 client or X9000 file serving node (referred to as “the host”) uses the following precedencerules to evaluate the file allocation settings tha
Setting file and directory allocation policies from the CLIAllocation policy names are case sensitive and must be entered as uppercase letters (for ex
Creating a pool of preferred segments from the CLIA segment pool can consist of individually selected segments, all segments local to a file servingno
© Copyright 2009, 2012 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP required for possession, use or
CLI proceduresThe CLI commands are executed immediately on file serving nodes. For X9000 clients, the commandintention is stored in the active Fusion
Tuning allocation policy settingsTo optimize system performance, you can globally change the following allocation policy settingsfor a file system:• F
HOSTNAME FSNAME POLICY STARTSEG DIRPOLICY DIRSEG SEGBITS READAHEAD PREALLOC HWM SWMmak01.hp.com ifs1 RANDOM 0 NONE 0
18 Support and other resourcesContacting HPFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore con
19 Documentation feedbackHP is committed to providing documentation that meets your needs. To help us improve thedocumentation, send any errors, sugge
GlossaryACE Access control entry.ACL Access control list.ADS Active Directory Service.ALB Advanced load balancing.BMC Baseboard Management Configurati
SELinux Security-Enhanced Linux.SFU Microsoft Services for UNIX.SID Secondary controller identifier number.SNMP Simple Network Management Protocol.TCP
IndexSymbols/etc/likewise/vhostmap file, 8732-bit mode, disable, 4132-bit mode, enable, 12AActive Directoryconfigure, 57configure from CLI, 65Linux st
data validationcompare hash sums, 146on-demand scans, 145resolve scan errors, 147schedule scans, 144stop or pause, 146view scan results, 146data valid
MMicrosoft Management Consolemanage CIFS shares, 78migration, files, 185mounting, file system, 18, 20mountpointscreate from CLI, 20delete, 19, 20view,
create, 176defined, 169delete, 176discover LUNs, 170list storage allocation, 170mount, 176register the snapshot partition, 170set up the snapshot part
NOTE: A file system must be mounted on the file serving node that owns the root segment (thatis, segment 1) before it can be mounted on any other host
Limiting file system access for X9000 clientsBy default, all X9000 clients can mount a file system after a mountpoint has been created. To limitaccess
In addition, when specifying a hostgroup, the root user can be limited to RO access by addingthe root_ro parameter.Using Export Control 23
3 Setting up quotasQuotas can be assigned to individual users or groups, or to a directory tree. Individual quotaslimit the amount of storage or the n
On the GUI, select the file system and then select Quotas from the lower Navigator. On the QuotaSummary bottom panel, click Modify.To enable quotas fr
To configure a group quota, select the file system where the quotas will be configured. Next, selectQuotas > Group Quotas from the lower Navigator,
CLI procedureUse the following commands to set quotas for users and groups:• Set a quota for a single user:ibrix_edquota -s -u “USER” -f FSNAME [-M SO
To change a directory tree quota, select the directory tree on the Quota Usage Limits bottom panel,and then click Modify.CLI procedureTo create a dire
Using a quotas fileQuota limits can be imported into the cluster from the quotas file, and existing quotas can beexported to the file. See “Format of
Contents1 Using X9000 Software file systems...8File system operations...
A,{type},{block_hardlimit},{block_soft-limit},{inode_hardlimit},{inode_softlimit},{id}B,{type},{block_hardlimit},{block_soft-limit},{inode_hardlimit},
To run an online quota check from the GUI, select the file system and then select Online quotacheck from the lower Navigator.On the Task Summary panel
Troubleshooting quotasRecreated directory does not appear in directory tree quotaIf you create a directory tree quota on a specific directory and dele
4 Maintaining file systemsThis chapter describes how to extend a file system, rebalance segments, delete a file system or filesystem component, and ch
Viewing physical volume informationUse the following command to view information about physical volumes:ibrix_pv -lThe following table lists the outpu
Viewing logical volume informationTo view information about logical volumes, use the ibrix_lv -l command. The following tablelists the output fields f
DescriptionFieldYes if enabled; No if not.EXPORT_CONTROL_ENABLEDYes if enabled; No if not.QUOTA_ENABLEDIf data retention is enabled, the retention pol
DescriptionFieldBackup host name.BACKUPSegment type. MIXED means the segment can contain both files and directories.TYPETier to which the segment was
On the CLI, use the ibrix_fs command to extend a file system. Segments are added to the fileserving nodes in a round-robin manner. If tiering rules ar
segments, and then moves files from sources to destinations to bring each candidate source segmentas close as possible to the calculated utilization t
Deleting segments, volume groups, and physical volumes...42Deleting file serving nodes and X9000
Rebalancing segments from the CLITo rebalance all segments, use the following command. Include the -a option to run the rebalanceoperation in analytic
Viewing the status of rebalance tasksUse the following commands to view status for jobs on all file systems or only on the file systemsspecified in FS
To delete a file system, use the following command:ibrix_fs -d [—R] f FSLISTFor example, to delete file systems ifs1 and ifs2:ibrix_fs -d -f ifs1,ifs2
The ibrix_fsck command can detect and repair file system inconsistencies. File systeminconsistencies can occur for many reasons, including hardware fa
Run phase 2:ibrix_fsck -p 2 -f FSNAME [-s LVNAME] [-c] [-o "options"]The command can be run on the specified file system or optionally only
File system alert is displayed after a segment is evacuatedWhen a segment is successfully evacuated, a segment unavailable alert is displayed in the G
state_flags ... SEGMENT_LOCAL SEGMENT_PREFERED SEGMENT_DHB <SEGMENT_ ORPHAN_LIST_CREATED (0x00100061) write_WM ...
ibrix_fs -c failed with "Bad magic number in super-block"If a file system creation command fails with an error such as the following, the co
5 Using NFSTo allow NFS clients to access an X9000 file system, the file system must be exported. You canexport a file system using the GUI or CLI. By
Use the Settings window to specify the clients allowed to access the share. Also select the permissionand privilege levels for the clients, and specif
Permissions in a cross-protocol CIFS environment...90How the CIFS server handles
The Summary window shows the configuration of the share. You can go back and revise theconfiguration if necessary. When you click Finish, the export i
Unexporting a file systemA file system should be unexported before it is unmounted. On the GUI, select the file system, selectNFS Exports from the low
To set case insensitivity from the CLI, use the following command:ibrix_caseinsensitive -s -f FSNAME -c [ON|OFF] -p PATHViewing the current setting fo
2:0:/fs_test1/samename-T/samename: TRUE2:0:DONEThe next sample log file is for a change in case insensitivity:0:0:31849:Case Insensitivity is turned O
6 Configuring authentication for CIFS, FTP, and HTTPX9000 software supports several services for authenticating users accessing shares on X9000 filesy
Using LDAP as the primary authentication methodRequirements for LDAP users and groupsX9000 supports only OpenLDAP. If you are using LDAP or LDAP ID ma
DescriptionValueNonvirtual attributenameLimited write DN credentials. HP recommends that you do notuse cn=Manager credentials. Instead, use an account
The wizard displays the configuration pages corresponding to the option you selected.• Active Directory. See “Active Directory” (page 57).• LDAP. See
If you want to use LDAP ID mapping as a secondary lookup for Active Directory, select Enabledwith LDAP ID Mapping and AD in the Linux Static User Mapp
Enter the following information on the dialog box:Enter the server name or IP address of the LDAP server host.LDAP Server HostEnter the LDAP server po
Pausing a remote replication task...131Resuming a remote replicati
Enter the following information in the remaining fields:Enter the LDAP user account used to authenticate to the LDAP server to read data, such ascn=hp
NOTE: If LDAP is the primary authentication service, Windows clients such as Explorer or MMCplugins cannot be used to add new users.Local GroupsSpecif
NOTE: If Local Users and Groups is the primary authentication service, Windows clients such asExplorer or MMC plugins cannot be used to add new users.
To provide account information for the user, click Advanced. The default home directory is /home/<username> and the default shell program is /bi
NOTE: If Local Users and Groups is the primary authentication service, Windows clients such asExplorer or MMC plugins cannot be used to add new users.
You cannot change the UID or RID for a Local User account. If it is necessary to change a UID orRID, first delete the account and then recreate it wit
ibrix_ldapconfig -a -h LDAPSERVERHOST [-P LDAPSERVERPORT] -b LDAPBINDDN-p LDAPBINDDNPASSWORD -w LDAPWRITEOU -B LDAPBASEOFSEARCH -n NETBIOS -EENABLESSL
The LDAP bind password.-p LDAPBINDDNPASSWORDThe maximum amount of time to allow the search to run.-m MAXWAITTIMEThe maximum number of entries (the def
Delete a Local Group account:ibrix_localgroups -d -g GROUPNAME68 Configuring authentication for CIFS, FTP, and HTTP
7 Using CIFSThe IBRIX CIFS server implementation allows you to create file shares for data stored on the cluster.The CIFS server provides a true Windo
Preparing the snapshot partition...169Registering for snapshots..
NOTE: Click CIFS Settings to configure SMB signing on this server. See “Configuring SMB signing” (page 75) for more information.To start, stop, or res
ConditionHealth StatusMonitoring is disabledNot MonitoredThe active Fusion Manager could not communicate with other file serving nodes in the clusterN
On the Permissions page, specify permissions for users and groups allowed to access the share.72 Using CIFS
Click Add to open the New User/Group Permission Entry dialog box, where you can configurepermissions for a specific user or group. The completed entri
bitmask is 1–32. The completed entry appears on the Client IP Filters list on the Client Filteringpage.On the Advanced Settings page, enable or disabl
Configuring SMB signingThe SMB signing feature specifies whether clients must support SMB signing to access CIFS shares.You can apply the setting to a
When configuring SMB signing, note the following:• SMB2 is always enabled.• Use the Required check box to specify whether SMB signing (with either SMB
On the CIFS Shares panel, click Add or Modify to open the File Shares wizard, where you cancreate a new share or modify the selected share. Click Dele
Use the -A ALLOWCLIENTIPSLIST or –E DENYCLIENTIPSLIST options to list client IP addressesallowed or denied access to the share. Use commas to separate
NOTE: To use MMC to manage CIFS shares, you must be authenticated as a user with sharemodification permissions.NOTE: If you will be adding users with
1 Using X9000 Software file systemsFile system operationsThe following diagram highlights the operating principles of the X9000 file system.The topolo
Windows Vista, Windows 2008, Windows 7:Complete the following steps:1. Open the Start menu and enter mmc in the Start Search box. You can also enter m
The following example gives share management privileges to a single user:ibrix_auth -t -S 'share admins=[domain\user1]'If you specify multip
To add a new share, select Shares > New Share and run the Create A Shared Folder Wizard. Onthe Folder Path panel, enter the path to the share, bein
Deleting CIFS sharesTo delete a CIFS share, select the share on the Computer Management window, right-click, andselect Delete.Linux static user mappin
Installing Identity Management for UNIXTo install Identity Management for UNIX on a domain controller running Windows Server 2003R2, see the following
The following article provides more information about modifying attributes in the Active Directoryglobal catalog:http://support.microsoft.com/kb/24871
Consolidating SMB servers with common share namesIf your SMB servers previously used the same share names, you can consolidate the servers withoutchan
Client utilities such as net use will report the requested share name, not the new share name.Mapping old share names to new share namesMappings are d
CIFS users cannot view directory tree quotas.Differences in locking behaviorWhen CIFS clients access a share from different servers, as in the X9000 S
Restore operationsIf a file has been deleted from a directory that has Previous Versions, the user can recover a previousversion of the file by perfor
(Specifically, a segment need not be a complete, rooted directory tree). Segments can be anysize and different segments can be different sizes.2. The
CIFS shadow copy restore during node failoverIf a node fails over while a CIFS shadow copy restore is in progress, the user may see a disruptionin the
but will not be inherited or propagated. The CIFS server also does not map POSIX ACLs to becompatible with Windows ACLs on a file.These permission mec
the share, and are not inherited downward into the share directory tree. For true Windows-likebehavior, the creator of a share must access the root of
occur for 15 to 20 minutes. The client's copy will then continue without error if the retry timeouthas not expired. To work around this situation
8 Using FTPThe FTP feature allows you to create FTP file shares for data stored on the cluster. Clients accessthe FTP shares using standard FTP and FT
On the Config Profile page, select an existing configuration profile or create a new profile,specifying a name and defining the appropriate parameters
On the Host Servers page, select the servers that will host the configuration profile.On the Settings page, configure the FTP parameters that apply to
On the Users page, specify the users to be given access to the share.IMPORTANT: Ensure that all users who are given read or write access to shares hav
To define permissions for a user, click Add to open the Add User to Share dialog box.Managing the FTP configurationSelect File Shares > FTP from th
Use the buttons on the panels to modify or delete the selected configuration profile or share. Youcan also add another FTP share to the selected confi
Kommentare zu diesen Handbüchern