HP StoreAll OS User GuideAbstractThis guide describes how to configure and manage StoreAll software file systems and how to use NFS, SMB, FTP, and HTT
Discovering LUNs in the array...369Reviewing snapshot storage
6. Click Close→OK to exit the dialogs.7. Expand Shared Folders (\\<address>).8. Select Shares and manage the shares as needed.Windows Vista, Win
6. Click OK to exit the Add or Remove Snap-ins window.7. Expand Shared Folders (\\<address>).8. Select Shares and manage the shares as needed.Sa
• Do not include any of the following special characters in the share description. If a descriptioncontains any of these special characters, the descr
When you complete the wizard, the new share appears on the Computer Management window.Deleting SMB sharesTo delete an SMB share, select the share on t
Best Practices when mapping shares:• A share should always be mapped using the User Virtual Interface (the User VIF) of a fileserving node as that int
1. Click Start, click Run, type mmc, and then click OK.2. On the MMC Console menu, click Add/Remove Snap-in.3. Click Add, and then click Active Direct
The following article provides more information about modifying attributes in the Active Directoryglobal catalog:http://support.microsoft.com/kb/24871
Synchronizing Active Directory 2008 with the NTP server used by the clusterIt is important to synchronize Active Directory with the NTP server used by
• Allows lists users and members of CIFS groups to be mapped to a single Linux user• Supports Samba status username map files and features• Support Sa
NOTE: You have the option to configure a dynamic username script, a static username map,or both while pre-configuring the username mapping solution. I
1 Using StoreAll software file systemsFile system operationsThe following diagram highlights the operating principles of the StoreAll file system.The
for a general name change from the Windows-style username to the Linux-styleusername.◦ Setting usernames using LDAP attributes: For example, if you ha
also be translated to /srv1/data, but the clients will have different permissions. The client requestsfor \\srv2\data will be translated to share srv2
SMB users cannot view directory tree quotas.Differences in locking behaviorWhen SMB clients access a share from different servers, as in the StoreAll
Restore operationsIf a file has been deleted from a directory that has Previous Versions, the user can recover a previousversion of the file by perfor
SMB shadow copy restore during node failoverIf a node fails over while an SMB shadow copy restore is in progress, the user may see a disruptionin the
but will not be inherited or propagated. The SMB server also does not map POSIX ACLs to becompatible with Windows ACLs on a file.These permission mech
behavior, the creator of a share must access the root of the share and set the desired ACLs on itmanually (using Windows Explorer or a command line to
3. To disable autocommit, you must unmount the file system, modify the data retention settings,and mount the file system again. See “Changing the rete
UID for SMB Guest account conflicts with another userIf the UID for the Guest account conflicts with another user, you can delete the Guest account an
8 Using FTPThe FTP feature allows you to create FTP file shares for data stored on the cluster. Clients accessthe FTP shares using standard FTP and FT
(Specifically, a segment need not be a complete, rooted directory tree). Segments can be anysize and different segments can be different sizes.2. The
• Enter a name for the FTP share.• Enter the path to the file system or directory that will be shared (for example, /myFS1).• Optionally, enter detail
4. On the Host Servers window, select the servers that will host the configuration profile. ClickNext to continue.Configuring FTP 121
5. On the Settings window, configure the following FTP parameters that apply to the share:NOTE: The parameters you configure are added to the nodes ho
6. On the Users window, specify the users to be given access to the share. If no users are specifiedon this window, then any user who can be authentic
The Summary window shows the configuration for the FTP share. You can go back and revise theconfiguration if necessary. When you click Finish, the sha
Accessing sharesClients can access an FTP share by specifying a URL in their Web browser, such as Internet Explorer.In the following URLs, IP_address:
Table 6 Download a file by using the FTP protocolCommandScenariocurl ftp://IP_address/pub/server.pem -o<path to download>\<filename>You do
Table 9 Upload a file by using the FTPS protocol for local userCommandScenariocurl --ftp-ssl-reqd --cacert <certificatefile> -T <filename>
9 Using Object StoreObject Store provides the flexibility of being based on the open source OpenStack Cloud Softwarewith the additional functionality
Table 12 Overview for implementing Object Store (continued)For additional informationDescriptionStep“Using cURL commands for managing Object Store”(pa
1) The segment server initiating the operation can read files directly from the segmentacross the SAN; this is called a SAN READ.2) The segment server
Prerequisite steps for creating an Object Store1. Identify a file system on which you can create an Object Store.IMPORTANT: The file system, identifie
b. Identify the bond(x) VIF:# ibrix_nic -a -n bond1 -h node1,node2,node3,node4In this instance node[1–4] is a host name.c. Assign an IP address to the
5. StoreAll uses the FM user VIF to talk to the keystone authentication service. If an FM user VIFdoes not exist for a cluster, create an FM user VIF
6. Provide an Object Store name. The Object Store name can only contain alphanumericcharacters.Click Next.Creating an Object Store 133
Provide server details1. Select a NIC for each server.2. To change the ports, click the Show Port Details button and then click the port you want toch
3. Click Next.Set the port and SSL certificate settingsTo modify the port and SSL certificate settings:1. The default port settings are displayed. You
3. Click NextConfirming Object Store settingsThe wizard displays the Summary window. Click Finish to create the Object Store with the settingsdisplaye
Permission levelsUsers can be granted administrative privileges or non-administrative privileges with read or writeaccess to a container. The followin
Table 15 Description of the permission levelsInformation on how to grant privilegesAccessible tasksPrivilege• Create administrative groups andassign u
IMPORTANT: Keep in mind the following:• The Object Store creates a default swift administrator group with a default username andpassword of swift when
• Data tiering. This feature allows you to set a preferred tier where newly created files will bestored. You can then create a tiering policy to move
8. Click OK.Add users to an administrator group using the GUIIMPORTANT: Keep in mind the following:• You cannot add a mixture of StoreAll local or sys
7. In the Admin Group Name text box provide the required value specified by the followingtable:Required value for the Admin Group Name text boxType of
The ADMINGROUP parameter must be set as follows:Required setting for ADMINGROUPType of userThe ADMINGROUP parameter must be set to swiftSystem user (A
Changing group administrative privilegesTable 17 Changing group administrative privilegesCommandTaskibrix_objectstoreadmin -a -k GROUP_NAMEGrant all m
"http://10.10.104.116:8888/v1/AUTH_7b9a902423a582c9eda266dcf3ad6974a2b98e4b21ea7c9e1e8d38f76afdf1b4"}], "endpoints_links": [], &qu
curl -X PUT -i -H "X-Auth-Token:864e40dd3ee4910934b73d0a4a399ac" -H "X-Container-Write:group1:user1 —H “X—Container—Read:group1:user1 &
Finding the Fusion Manager user VIFTo find the FM user VIF:ibrix_nic —lThe FM user VIF is listed as [Active FM Nonedit] with a status of User. The FM
How to find the proxy IP and portTo generate a list of ports and to find the proxy IP, enter the following command:ibrix_objectstore -lThe following i
IMPORTANT: For metadata, you should not exceed 90 individual key/value pairs for any oneobject and the total byte length of all key/value pairs can be
% Total % Received % Xferd Average Speed Time Time Time CurrentDload Upload Total Spent Left Speed0 70 0 70 0 0 195 0 --:--:-- --:--:-- --:--:-- 0View
2 Creating and mounting file systemsThis chapter describes how to create file systems and mount or unmount them.Creating a file systemYou can create a
HTTP/1.1 204 No ContentContent-Length: 0Content-Type: text/html; charset=UTF-8Date: Sun, 24 Nov 2013 23:48:10 GMTViewing a status of a user accountOnl
In the following sample output, the user with authentication token1bb88b944f6c4c8fb7411f85d3bd6bf4 belongs to the group named Users under the domainIB
2. Select Backup Target from the Select Type menu. You need at least one backup target listedon the Object Store configuration, but this must be the s
{root@ib48-205]# ibrix_objectstoreadmin -l -cContainer Sync Config=====================Backup Type IPAddress/FQDN------------- --------------Backu
1. Identify the source container to determine if the container has a pre-existing container syncconfiguration:curl -i <ENDPOINT>/<CONTAINER_N
In this instance, we are setting the source container:• The secretkey123 is the Sync-Key value.• Thehttp://10.2.11.10:8888/v1/AUTH_7b9a902423a582c9eda
NOTE: Even if you delete the container sync configuration at the source cluster, it is alsorecommended that you remove the source container's met
NOTE: The ibrix_objectstore command collects information from the Object Store configurednodes and lists the information. If an Object Store configure
NOTE: If you add couplets without extending Object Store in the StoreAll cluster and the FusionManager fails over to the newly added nodes, swift perm
5. Select the two newly added nodes and their corresponding virtual NIC.6. To change the ports, click the Show Port Details button and then click the
The requested operation encountered one or more failures. Creating filesystem was successful <Additional information about the feature of the fil
Rebalancing a file system that is configured for Object StoreAny time a file system configured for Object Store is expanded or storage is removed, you
1. For the object builder configuration: List the configuration, set the weight, and check the weight.a. List the object builder configuration by send
2. For the container: List the configuration, set the weight, and check the weight.a. List the container configuration by sending this command:[root@s
3. For the account: List the configuration, set the weight, and check the weight.a. List the container configuration by sending this command:[root@swi
5. Verify that the partitions are rebalanced by checking all builder file configurations(account/container/object). Send the following commands:a. [ro
To remove the server configuration1. In the HP StoreAll Management Console, navigate to Object Store.2. Select the name of the server you want to remo
IMPORTANT: HP recommends that you use certificates signed by a signing authority like VeriSignonly when you have configured load balancing for an Obje
NS44NjETMBEGA1UEAwwKMTAuMjEuMTIuKjCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEArUAesz13JqGcHzjtLFjzJCZ2CHOjmJ/zi7nX2SP3kXn00qYmjSS0O/Usct3hv5mxCrsn2LtTO/TJxb
5. When you create the Object Store, be sure to select SSL certificate on the Settings page or,if you are creating the Object Store using the CLI, mak
9. Stat (display information for) the container from the client side after extending the ObjectStore.Sample commandcurl -i https://10.21.12.25:8888/v1
3. On the Configure Options dialog box, enter a name for the file system. To mount the file system,select Mount Filesystem and specify a mountpoint. S
Sample output:SERVICE : OBJECTSTORE=====================NAME STATUS-------- ------dev-sys4 UPdev-sys3 UPdev-sys2 UPdev-sys1 UPTo list the he
To enable service monitoring:ibrix_objectstoremonitor -m [-h FMLIST]Restarting the Object Store servicesUse the following command to restart Object St
Table 22 HTTP status codes (continued)Notes/Suggested actionsDescriptionCode• Request to be granted administrative privilegesOr• Request to be added t
Table 22 HTTP status codes (continued)Notes/Suggested actionsDescriptionCode• Maximum length of container name: 256bytes• Maximum length of container
10 Using HTTPOverviewThe HTTP feature allows you to create HTTP file shares for data stored on the cluster. Clients accessthe HTTP shares using standa
Uses for the StoreAll REST APIAlthough the StoreAll REST API is not generally intended for your end users, it lets you createapplications using the St
• You must assign read, write, and execute permissions to the share’s directory path and allparent directories up to the file system mount point to al
Table 25 Checklist for creating HTTP shares (continued)Stepcompleted?Where to find moreinformationTaskStep appliesonlynlto REST APISharesStepCreate or
Creating HTTP shares from the HP StoreAll Management ConsoleUse the Add New File Share and Object Store Wizard to create the HTTP share. You can thenv
3. On the Config Profile window, do the following:• Select an existing profile or select Create a new HTTP Profile. If you select the latter, entera n
4. To enable StoreAll Express Query on the file system, select Enable Express Query on theExpress Query dialog box. Express Query is a database used t
4. If you selected Create a new HTTP Profile, provide the profile name and then modify the settingsas necessary.180 Using HTTP
5. If you are creating a profile, you are asked to select your hosts servers for the profile.Creating HTTP shares from the HP StoreAll Management Cons
6. On the Virtual Host window, enter the vhost name. Select false in the Enable StoreAll RESTAPI box. Complete the remaining details of SSL certificat
7. On the Settings window, enter the URL path and set the appropriate parameters for the share.See the following table for more infomration about each
DescriptionUI Componentbe returned in the HTTP response. An error will be returned if the user issuing the HTTPrequest does not have file system permi
9. On the Summary window, ensure that the correct parameters are displayed.Ensure that:• In the File Share summary section, the value of StoreAll REST
10. Click Finish.When the wizard is complete, users can access the share from a browser. For example, if youconfigured the share with the anonymous us
1. Select File Shares and Object Store from the Navigator to open the File Shares and ObjectStore panel, and then click Add to start the Add New File
4. The Host Servers dialog box displays differently whether you selected a previous profile oryou are create a new one. If you selected the option Cre
5. If you selected an existing profile on the Config Profile dialog box, you are shown the hostsdefined for that profile, as shown in the following fi
5. Use the WORM/DATA Retention dialog box to enable data retention and data validation.Creating a file system 19
7. If you selected a previous profile, the Virtual Host prompts you to select a pre-existing Vhostor create an HTTP Vhost.8. If you already have Vhost
DescriptionUI Componentor Object from the StoreAll REST API Mode menu. This option defines which mode's syntaxwill be accepted by this API share.
192 Using HTTP
10. On the Users page, specify the users to be given access to the share. If no users are specifiedon this page, then any user who can be authenticate
11. To allow specific users read access, write access, or both, click Add. On the Add Users toShare dialog box, assign the appropriate permissions to
Tuning the socket read block size and file write block sizeBy default, the socket read block size and file write block size used by Apache are set to
Starting or stopping the HTTP service manuallyStart the HTTP service:/usr/local/ibrix/httpd/bin/apachectl -k startStop the HTTP service:/usr/local/ibr
If the anonymous parameter set to false, you'll be required to supply a user name and passwordwhen prompted.If the pathname ends with a directory
• Download a file using HTTP protocol:curl -u <ADuser> http://IP_address:port/urlpath/pathname -o <localdestination path for download>/<
curl -i -X PUT -H "Sync-Requested: 1" "http://10.10.21.209/myshare/"HTTP/1.1 200 OK Date: Fri, 19 Jul 2013 16:56:28 GMT Server: Ap
© Copyright 2009, 2014 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP required for possession, use or
You can configure the following:• Enable Data Retention Select this option to enable data retention. For more informationon data retention, see “Manag
• Create an SSL certificate. When using basic authentication to access WebDAV-enabled HTTPshares, SSL-based access is mandatory.• Verify that the host
net use * http://192.168.1.1/smita/In this instance, the HTTP WebDAV share is 192.168.1.1/smita.HTTP WebDAV share is inaccessible through Windows Expl
Unable to rename directory under a WebDAV shareWhen a file system is enabled for data retention, any folders created under a WebDAV share onthat file
11 HTTP-REST API object mode sharesThe StoreAll REST API share in object mode provides concepts similar to OpenStack Object StorageAPI to support prog
Using the HTTP StoreAll REST API object modeThis section walks you through using the major components of object mode. You will be shownhow to:• Create
the errno value, where 0 (zero) means that sync was done successfully and any other value indicatessync did not complete and durability is not guarant
NOTE: Enter the following commands on one line.• curl -X PUT http://<IP_address:port/<urlpath>/<account_name>/<container_name> -u
The %5C is the URL encoding for a backslash.2. Set the permissions of the container.A container is always created with read-write permission by the ac
PUT /<urlpath>/<account_name>/<container_name>/<object_id> HTTP/1.1 ["Sync-Requested: 1"]4. View the list of objects
The system::size refers to the number of bytes used by the directory inode representing thecontainer on the StoreAll server (initially 4096 for any ne
(non-retained) files can be deleted at any time; WORM-retained files can be deletedonly after the file's retention period has expired.)To manage
Finding the corresponding object ID from a hash nameNOTE: These steps are for someone with administrator privileges.The HTTP StoreAll REST API object
In this instance newcontainer is the container containing the hash reference.7. Enter the following command to list the contents of newcontainer.[root
The first time a user creates a container, a directory with the numeric user ID of the user representingthat account, is created to hold the container
1. Enter the following command on the StoreAll server:echo -n '<object_id>' | openssl dgst -sha1For example, if your object identifier
HTTP command:PUT /<urlpath>/<account_name>/<container_name> HTTP/1.1 [“Sync-Requested: 1”]CURL command (Enter on one line):curl -X
Delete ContainerType of Request: Container servicesDescription: Deletes the container.IMPORTANT: The container must be empty before it can be deleted.
Retrieve ObjectType of Request: Object RequestsDescription: Returns the list of containers for a user account.HTTP command:GET /<urlpath>/<ac
12 HTTP-REST API file-compatible mode sharesThe StoreAll REST API share in file-compatible mode provides programmatic access to user-storedfiles and t
Metadata queriesYou can issue StoreAll REST API commands that query the pathname and custom and systemmetadata attributes for a set of files and direc
◦ Literal strings must be enclosed in single quotes. Non-escaped UTF-8 characters areallowed. Literals are case-sensitive. Any single quotes that are
which is enabled along with Express Query. The Filesystem Metadata Cleaner task runsdaily at 1:30 a.m. local time by default.• Schedule Data validatio
The version field is recommended, but not required. In the syntax descriptions, it is surrounded bysquare brackets to indicate that it is optional.The
as the Linux user “daemon” and group “daemon” (daemon:daemon), since that is the user theHTTP Server acts as, for anonymous operations.For retention p
Examplecurl -T temp/a1.jpg https://99.226.50.92/ibrix_share1/lab/images/xyz.jpgThis example uploads the file a1.jpg, stored on the client’s machine in
This example downloads an existing file called xyz.jpg in the lab/images subdirectory of theibrix_share1 HTTP share. The file is created with the file
curl -X PUT http[s]://<IP_address>:<port>/,<urlpath>/ --header"Sync-Requested: 1"The HTTP response will return the "S
If the urlpath does not exist, an HTTP 405 error is returned with the message (Method NotAllowed).DescriptionParameterThe name of the existing file/di
HTTP syntaxThe HTTP request line format is the following on one line:DELETE /<urlpath>[/<pathname>]?[version=2&]attributes=<attribu
With the exception of system::deleteTime, all of the system metadata attributes listed in thistable are valid for live (for example, not-yet-deleted)
WritableExampleDescriptionTypeSystem attribute (key)(page 231) for moreinformation.notier1_fastThe user-defined name ofthe StoreAll tier of storagehos
WritableExampleDescriptionTypeSystem attribute (key)system::retentionState partial (seesystem::worm)A decimal number, such as 11for the bit value 0x0B
7. Use the Default File Shares dialog box to create an NFS export and/or an SMB share at theroot of the file system. The default settings are used. Se
WritableExampleDescriptionTypeSystem attribute (key)system::lastActivityTime noSee “API date formats”(page 220).The latest date/time of thefollowing 5
system::onDiskAtimeThe atime inode field in StoreAll can be accessed as the system::onDiskAtime attribute fromthe API. This field represents different
results are easier for users to read. The disadvantage is that is not easy to follow files thatwere moved/renamed.• Bypoid mode: This mode will consid
WildcardsThe StoreAll REST API provides three wildcards:DescriptionWildcardIn bypoid mode, a single attribute name of * returns allsystem and custom m
By default, if the skip parameter is not supplied, the results will not skip any records. Similarly,if the top parameter is not supplied, the results
DescriptionParameterThe value to compare against the query_attr using the operator. The value is eithera numeric or string literal. See “General topic
JSON response formatDefault query mode exampleIf the default query mode is requested (absence of bypoid attribute), the JSON format is:[ { "m
"system::retentionExpirationTime" : 0.000000000, "system::mode" : 16895, "system::tier" : "no tier&
Example queriesGet selected metadata for a given fileThe following is one command line:curl -g "http://99.226.50.92/ibrix_share1/lab/images/xyz.j
issued queries to receive the first 2000 results. The client usually issues further queries until no moreresults are returned.Get selected metadata fo
The Data Retention tab allows you to change the data retention configuration. The file system mustbe unmounted. See “Configuring data retention on exi
Get all files that match a name patternThe following is one command line:curl -g "http://99.226.50.92/ibrix_share1/lab/images?query=nlsystem::pat
HTTP syntaxNOTE: The commands provided in this section should be entered on one line.The HTTP request line format is the following on one line:PUT /&l
DescriptionParameterA file’s state can be changed to WORM only once. A file in WORM orretained state cannot be reverted to non-WORM, and cannot be un-
Be aware that this log file can grow quickly from client HTTP accesses. Manage the size of this fileso that it does not fill up the local root file sy
13 Managing SSL certificatesServers accepting FTPS and HTTPS connections typically provide an SSL certificate that verifies theidentity and owner of t
1. Generate a private key:openssl genrsa -des3 -out server.key 1024You will be prompted to enter a passphrase. Be sure to remember the passphrase.2. R
Adding a certificate to the clusterTo add an existing certificate to the cluster, click Add on the Certificates panel. On the AddCertificate dialog bo
Deleting a certificateTo delete a certificate from the GUI, select the certificate on the Certificates panel, click Delete,and confirm the operation.D
14 Using continuous remote replicationThis chapter describes how to configure and manage the Continuous Remote Replication (CRR)service.NOTE: Be aware
and are replicated in parallel by each file serving node. There is no strict order to replication ateither the file system or segment level. The conti
File limit for directoriesThe maximum number of files in a directory depends on the length of the file names, and also thenames themselves. The maximu
The examples in the configuration rules use three StoreAll clusters: C1, C2, and C3:• C1 has two file systems, c1ifs1 and c1ifs2, mounted as /c1ifs1 a
Using intracluster replicationsThere are two forms of intracluster replication:• The same cluster and a different file system. Configure either contin
the following alphanumeric and special characters are allowed: ` ~ ! @ # $ % ^ * ( ) _- + = { } [ ] | ; < > . ? /.• Server Assignments: Select t
Viewing remote replication exportsThe Remote Replication Exports panel lists the replication exports you created for the file system.Expand Remote Rep
Source Settings for continuous replicationFor continuous replications, the Source Settings window lists the file system selected on theFilesystems pan
If you are replicating a snapshot, select Use a snapshot and then select the appropriate Snap Treeand snapshot.Click Next to continue. The Target Sett
for more information.) Then enter the target file system. Optionally, you can also specify a targetdirectory in the file system.For replications to th
displayed includes the ID assigned to the task, the type of replication, the status of the task, andthe time the task was started.From this panel, you
If the health check finds an issue in the CRR operation, it generates a critical event.Reports are generated on the source cluster. If the target clus
Viewing server tasksSelect Server Tasks to display the state of the task and other information for the servers where thetask is running.Pausing or res
Mounting a file systemIMPORTANT: Keep in mind:• Mount options do not persist, unless they are set at the mountpoint. Mount options that arenot set at
Also note the following:• Multiple hard links on retained files on the replication source are not replicated. Only the firsthard link encountered by r
Prerequisites and planning considerations for custom metadata replication• Custom metadata replication is only supported on StoreAll version 6.5 or la
The following options are available for the crr_cmd_replication.sh command:DescriptionOptionThe name of the source file system. Ensure that you enter
Example 1 Sample output from initiating a custom metadata replication task (intercluster replication)Sample output without CRR security token:crr_cmd_
Example 2 Enabling an intracluster custom metadata replication taskCommand example:sh crr_cmd_replication.sh –f SOURCE_FSNAME -F TARGET_FSNAME -NLOCAL
Example 3 Initiating an intercluster custom metadata replication taskCommand example:sh crr_cmd_replication.sh –f SOURCE_FSNAME -F TARGET_FSNAME -NTAR
task with custom metadata replication from fs1 to fs2 using the password protection.[December 09, 2013 16:19:18] [CRR ON SOURCE] Submitted CRR operat
Example 4 Disabling an intracluster custom metadata replication taskCommand example:sh crr_cmd_replication.sh –f SOURCE_FSNAME -F TARGET_FSNAME -NLOCA
Example 5 Disabling an intercluster custom metadata replication taskCommand example:sh crr_cmd_replication.sh –f SOURCE_FSNAME -F TARGET_FSNAME -NTARG
2. Select Summary→Active Tasks→Remote Replication→<Task Name>.In the Task Summary window, see the "Replicate Custom Metadata?" field.
Select the mount options that apply to your configuration:• atime: Update the inode access time when a file is accessed• nodiratime: Do not update the
– D is for a device– S is for a special file (for example, named sockets and First Ins, First Outs (FIFOs)).◦ The other letters in the %i string are t
Continuous remote replication job may hang if the target cluster goes downIf the job is hanging, files will not be replicated. In this situation, the
3. If the ibrix_cud service is not running, start the ibrix_server services:service ibrix_server start4. Start a new replication task:ibrix_crr -s -f
Issues with enabling a custom metadata replication taskEnabling custom metadata replication is a multi-step process and could fail during any of these
15 Managing data retentionData retention is intended for sites that need to archive read-only files for business purposes, andensures that files canno
Default retention period. If a specific retention period is not applied to a file, the file will be retainedfor the default retention period. The sett
storage. A scheduled scan will quit immediately if it detects that a scan of the same file system isalready running.You can schedule periodic data val
Modify the data validation scheduleModify the default schedule for running the data validation scan. Select the frequency for whenthe task should be r
default retention period is set to zero, the files become WORM. If the default retention periodis set to a value greater than zero, the files become W
Viewing the retention profile for a file systemTo view the retention profile for a file system, select the file system on the Management Console,and t
Mounting and unmounting file systems locally on StoreAll clientsOn both Linux and Windows StoreAll clients, you can locally override a mount. For exam
Autocommit period is set and the default retention period is zero seconds:• Files remaining unchanged during the autocommit period automatically becom
NOTE: For SMB users setting the access time manually for a file, the maximum retention periodis 100 years from the date the file was retained. For NFS
To administer files from the CLI, use the ibrix_reten_adm command. See the HP StoreAll OSCLI Reference Guide for more information.IMPORTANT: Do not us
find /ibrixFS/mydir -type d -exec ibrix_reten_adm -h -f ibrixFS -P{/*,{}/.??*,.[!.]*Setting or removing a legal holdWhen a legal hold is set on a reta
Removing the retention periodWhen you remove the retention period from a retained file, the file becomes a WORM file. Onthe WORM/Data Retention – File
If the retention period has expired at the time autocommit is applied, the file is not retained.Running data validation scansScheduling a validation s
Starting an on-demand validation scanYou can run a validation scan at any time. Select the file system on the Management Console,and then select Activ
Viewing, stopping, or pausing a scanScans in progress are listed on the Active Tasks panel on the Management Console. If you needto halt the scan, cli
Following is a sample validation summary file:# cat /fsIbrix/.archiving/validation/history/4-0.sumJOB_ID=4FILESYSTEM_NAME=fsIbrixFILESYSTEM_MOUNT_DIR=
Checksum corruption:If the checksums of the <filesystem/file> and <fileFromBackup> are identical, the expressquery checksum store may have
To remove a client access entry, select the affected file system, and then select Client Exports fromthe lower Navigator. Select the access entry from
The utilization report summarizes how storage is utilized between retention states and free space.The next example shows the first page of a utilizati
Generating and managing data retention reportsTo run an unscheduled report from the Management Console, select Filesystems in the upperNavigator and t
Generating data retention reports from the CLIYou can generate reports at any time using the ibrix_reports command. Scheduled reportscan be configured
• When a legal hold is applied to a file, the legal hold is not replicated on the target. If the fileon the target should have a legal hold, you will
16 Express QueryExpress Query provides a per-file system database of system and custom metadata, and audithistories of system and file activity. When
See the ibrix_archiving command in the HP StoreAll OS CLI Reference Guide for examplesof how to perform these tasks.Backing up and restoring file syst
Restore to an existing file system that has Express Query enabledTo restore a backup to an existing file system that has Express Query enabled:1. Disa
Saving and importing custom metadata and audit informationUse the following procedures to save, or export, custom metadata that is stored only in the
ibrix_audit_reports -t unordered -o all -f ibrixFSThis command saves audit data for all events in file system ibrixFS. Use the “unordered” optionfor t
NOTE:• The output file listed on the MDExport.pl command line must be in a directory that will bereplicated by CRR.• The <mountpoint>/.archiving
Contents1 Using StoreAll software file systems...11File system operations...
3 Configuring quotasQuotas can be assigned to individual users or groups, or to a directory tree. Individual quotaslimit the amount of storage or the
Modifying the audit log configurationTo change the audit log configuration, click Modify on the Audit Log panel. The Modify AuditSettings dialog box a
Table 31 Fields on the Modify Auditing Settings dialog box (continued)DescriptionFieldSet the expiration period for the audit logs (the number ofdays
Monitor the space used by the audit logs and reports in the <mount point>/.archiving/.databasetree, which includes current metadata and the audi
the system log. To resolve this issue, you must clear space on the segment either by deletingdata or running the 'rebalance' utility.When yo
The file is in a comma-separated value (CSV) format with a header row. The following table displaysthe definitions for the less obvious fields in an a
Table 34 Events by category (continued)EventCategoryEnabled, Retention Mode Changed, Retention DefaultChanged, Maximum Retention Changed, MinimumReten
If the path name limit is exceeded, the path name:• Appears in audit report logs in the format of “<TRUNCATED>/” + <last 2,548 characters oft
Auto commit filesNOTE: This task only applies to retention-enabled file systems.Use the auto-commit feature to automatically move a file to a WORM+Ret
Online Metadata SynchronizerThe Online Metadata Synchronizer can be used to:• Verify the consistency of the system metadata stored in Express Query da
The EQWSI feature searches the metadata stored in the Express Query database, which providesfast access to metadata without scanning the entire file s
To view the current quotas configuration, select the file system and then select Quotas from thelower Navigator. The Quota Summary panel specifies whe
EQWSI can only be enabled on shares that meet the following criteria:• HTTP-share required properties.◦ If multiple HTTP shares are configured, ensure
1. Select Filesystems in the upper Navigator panel in the StoreAll Management Console.2. Select the file system containing the HTTP share you want to
5. Select true from the Enable Express Query WSI menu on the Modify HTTP share dialog box.Requirements for creating a Windows Explorer Search Plug-inA
◦ Windows Server 2012 R2◦ Windows Server 2008 R2• Virtual host requirements:The client used for EQWSI searches should be able to access the HTTP virtu
Creating a Windows Explorer Search Plug-inA Windows Explorer Search Plug-in uses the HTTP share configuration settings such as the VirtualHost IP Addr
The generated Windows Explorer Search Plug-in is given the file nameHPStoreAll-sharename.osdx , and it is also saved in the /usr/local/ibrix/httpd/htd
9. When the Search Connector window displays, click OK. This window shows the IP addressof the HTTP share that shares its link.The EQWSI link appears
• EQWSI queries only support dates from 1970-01-02 (January 2, 1970). EQWSI does notsupport the explicit usage of dates lesser than or equal to 1970-0
Table 36 Supported keywords for EQWSI queries (continued)Supported Value stringsSupported OperatorsDescriptionKeywordThis keyword can be usedto search
Examples of supported EQWSI queries:• size > tiny• crtime >= 2013-12-24• atime < 2013-12-24• dtime <= 2013-12-24• rstate = 4• mode = aLL•
Setting quotas for users, groups, and directoriesBefore configuring quotas, the quota feature must be enabled on the file system and the file systemmu
Constraints with EQWSIFor any EQWSI search, a maximum of up to 100 search results are listed in the Microsoft WindowsExplorer, as a result of a Micros
4. To see a magnified view of the data with the searched file or directory displayed, hover themouse over any of the search results in Windows Explore
Summarized details of system metadata displayed in Windows ExplorerThe following table summarizes the details of the system metadata displayed on the
If the EQWSI query uses only the dtime keyword, then only the title, link and the delete time of thedeleted files or directories are displayed in the
17 Generating reportsHP StoreAll lets you generate reports of files stored on file systems that have Express Query enabled.The Reporting functionality
• provide file size details of the overall file system, such as file system size, available size, andblock size.• determine nor categorize file data t
Table 39 Supported options for reports (continued)DescriptionOptionsSlice Value (not applicable to File Extension Reports)• Retention Expiration Repor
Table 40 Filter criteria for reports (continued)ExamplesSupported operatorsDescriptionFilter Criteria Options• pathname isnotdirhome/*• pathname is *.
Table 40 Filter criteria for reports (continued)ExamplesSupported operatorsDescriptionFilter Criteria Optionstier is tier2is or =Reports can be genera
The following image shows the data from a Retention Expiration report that was generated usingthe default options.Retention Expiration reports 329
User QuotasThe User Quotas dialog box is used to create, modify, or delete quotas for users. To add a userquota, enter the required information and cl
An example of a report with slice type log selectedThis section provides the output from a report that has slice type log selected. The following tabl
Figure 2 Retention Expiration report with slice type log selected (table format)The following table provides a description of the information provided
Figure 3 Output from a sample Retention Expiration report with slice type equal selectedZero valued records are not displayed in the chart. See the ta
The following table provides a description of the information provided in the previous figure.Table 44 Description of data provided in example report
Figure 5 Last Validation report with data displayed in a bar chartFigure 6 Last Validation report with data displayed in a tableFile Size Distribution
Figure 7 File Size Distribution report with data displayed in a pie chartFile Size Distribution reports 335
Figure 8 File Size Distribution report with data displayed in a bar chart336 Generating reports
Figure 9 File Size Distribution report with data displayed in a tableFile Extension reportsFile Extension reports provides an overview of the various
Figure 10 File Extension report with data displayed in a pie chart338 Generating reports
Figure 11 File Extension report with data displayed in a bar graphFile Extension reports 339
the group. Groups having quotas are listed in the table at the bottom of the dialog box. To modifyquotas for a group, check the box preceding that gro
Figure 12 File Extension report with data displayed in a table graph340 Generating reports
18 Obtaining performance statisticsThe Performance Statistics tool (also referred as Statstool/Statistics tool) lets you generate reportscontaining hi
To generate performance reports through the StoreAll Management Console:1. In the StoreAll Management Console, select Reporting→Performance Statistics
7. To save a report, select one of the following from the Save Report menu and then click Save.• PDF• HTML• CSV (comma separated values)• TXTNOTE: Whe
Table 45 Category definitions (continued)Available ReportsDescriptionCategoryCluster Comparison/ClusterCumulative/Host-level: MemoryReports on memory
Troubleshooting the Performance Statistics tool• Data is not collected. If data is not being gathered in the common directory for the StatisticsManage
19 Configuring Antivirus supportThe StoreAll Antivirus feature can be used with supported Antivirus software, which must be runon systems outside the
Adding or removing external virus scan enginesThe Antivirus software is run on external virus scan engines. You will need to add these virus scanengin
When a virus scan engine is no longer needed, you must manually delete it from the configuration.Go to the Virus Scan Engines panel, select the applic
Defining protocol-specific policiesFor certain file sharing protocols (currently only SMB/CIFS), you can specify the file operationsthat trigger a sca
SummaryThe Summary lists the quotas configuration you specified. Click Back if any changes are needed,or click Finish to complete the wizard.To config
Defining exclusionsExclusions specify files that should be skipped during Antivirus scans. Excluding files can improveperformance, as files meeting th
5. Select the appropriate type of rule:• Inherited Rule/Remove Rule. Use this option to reset or remove exclusions that wereexplicitly set on the chil
Updating Antivirus definitionsYou should update the virus definitions on the cluster nodes periodically. On the ManagementConsole, click Update Cluste
Recommendations for Antivirus scans:• Run Antivirus scans during periods of low activity on the system.• Configure Antivirus scans to ensure that if a
6. On the Schedule tab, click Schedule this task and then select the frequency (once, daily,weekly, monthly) and specify when the scan should run.NOTE
Stopping or pausing an active taskUse the buttons on the Antivirus Task Summary panel to stop or pause a running task, or to resumea paused task.Viewi
Antivirus quarantines and software snapshotsThe quarantine utility has the following limitations when used with snapshots.Limitation 1: When the follo
20 Creating StoreAll software snapshotsThe StoreAll software snapshot feature allows you to capture a point-in-time copy of a file systemor directory
To enable a directory tree for snapshots, click Add on the Snap Trees panel.You can create a snapshot directory tree for an entire file system or a di
IMPORTANT: A snapshot reclamation task is required for each file system containing snap treesthat have scheduled snapshots. If a snapshot reclamation
Exporting quotas to a fileSelect the file system, select Quotas from the lower Navigator, and then click Export on the QuotaSummary panel.Format of th
You must manually delete on-demand snapshots when they are no longer needed.Determining space used by snapshotsSpace used by snapshots counts towards
The following example lists snapshots created on an hourly schedule for snap tree /ibfs1/users.Using ISO 8601 naming ensures that the snapshot directo
Restoring files from snapshotsUsers can restore files from snapshots by navigating to the appropriate snapshot directory andcopying the file or files
Using the Management Console, you can schedule a snapshot reclamation task to run at a specifictime on a recurring basis. The reclamation task runs on
On the General tab, select a reclamation strategy:• Maximum Space Reclaimed. The reclamation task recovers all snapped space eligible forrecovery. It
Removing snapshot authorization for a snap treeBefore removing snapshot authorization from a snap tree, you must delete all snapshots in the snaptree
Backups with the tar utilityThe tar symbolic link (h) option can copy snapshots. For example, the following command copiesthe /snapfs1/test3 directory
21 Creating block snapshotsOverviewThe block snapshot feature allows you to capture a point-in-time copy of a file system for onlinebackup purposes an
NOTE: By default, snapshots are read only. HP recommends that you do not allow writes to anysnapshots.To manage block snapshots, select Filesystems in
Planning for snapshotsThis section describes how to configure the cluster to take snapshots.Preparing the snapshot partitionThe block snapshot feature
NOTE: When a quotas file is imported, the quotas are stored in a different, internal format.When a quotas file is exported, it contains lines using th
Automated block snapshotsIf you plan to take a snapshot of a file system on a regular basis, you can automate the snapshots.To do this, first define a
Once you create a snapshot scheme, return to the Create Snapshot dialog box to set up a schedulefor it.Select the Schedule tab. Click Schedule this ta
Creating a snapshot schemeUnder Snapshot Configuration, select an existing scheme or click New to create a new snapshotscheme. The Create Snapshot Sch
On the General tab, enter a name for the strategy and then specify the number of snapshots tokeep and mount on a daily, weekly, and monthly basis. Kee
Viewing automated snapshot schemesOn the Management Console, you can view snapshot schemes on the Create Snapshot dialogbox. Select Recurring as the S
The next window shows an SMB client accessing the snapshot file system .fs1_snap1. Theoriginal file system is mapped to drive X.Accessing snapshot fil
Troubleshooting block snapshotsSnapshot reserve is full and the MSA2000 is deleting snapshot volumesWhen the snapshot reserve is full, the MSA2000 wil
22 Using data tieringA data tier is a logical grouping of file system segments. After creating tiers containing the segmentsin the file system, you ca
Manage tierOn the Manage Tier dialog box, do one of the following:• Create a tier:1. Select Create New Tier.2. Enter a name for the tier.3. Select one
Primary tierAll new files are written to the primary tier. On the Primary Tier dialog box, select the tier thatshould receive these files. You can als
The Task Summary panel displays the progress of the scan. If necessary, select Stop to stop thescan.To run an online quota check from the CLI, use the
patterns (such as access and modification times), file size, and file type. Rules can be constrainedto operate on files owned by specific users and gr
To add a new tiering policy, click New. On the New Data Tiering Policy dialog box, select thesource and destination tiers. Initially RuleSet1 is empty
When you click New to create a new schedule, the default frequency for migration tasks isdisplayed. For an existing schedule, the current frequency is
Viewing tier assignments and managing segmentsOn the Management Console, select Filesystems from the Navigator and select a file system in theFilesyst
You can assign, reassign, or unassign segments from tiers using the Data Tiering Wizard. TheManagement Console also provides additional options to per
When you click OK, the rule is checked for correct syntax. If the syntax is correct, the rule is savedand appears on the Data Tiering Rules panel. The
DescriptionRuleMigrates all mpeg4 files in the testdata4 subtree. Use the"and" operator to combine rules.path=testdata4 and name="*mpeg
Configuring tiers and migrating data using the CLIUse the following command to define the primary tier:ibrix_fs_tune -f FILESYSTEM -h SERVERS -t TIERN
Rule attributesEach rule identifies file attributes to be matched. It also specifies the source tier to scan and thedestination tier where files that
Rule keywordsThe following keywords can be used in rules.DescriptionKeywordAccess time, used in a rule as a fixed or relative time.atimeChange time, u
Moving directoriesAfter moving a directory into or out of a directory containing quotas, run theibrix_onlinequotacheck command as follows:• After movi
The following example uses the path keyword. It moves files greater than or equal to 5M that areunder the directory /ifs2/tiering_test from TIER1 to
23 Using file allocationThis chapter describes how to configure and manage file allocation.OverviewStoreAll software allocates new files and directori
Standard segment preferences and allocation policiesCommentDescriptionNameThis is the default segment preference. It is suitablefor most use cases.Pre
A StoreAll client or StoreAll file serving node (referred to as “the host”) uses the following precedencerules to evaluate the file allocation setting
Setting file and directory allocation policies from the CLIAllocation policy names are case sensitive and must be entered as uppercase letters (for ex
Both methods can be in effect at the same time. For example, you can prefer a segment for a userand then prefer a pool of segments for the clients on
ibrix_fs_tune -f FSNAME {-h HOSTLIST|-g GROUPLIST} -S {SEGNUMLIST|ALL|LOCAL}Restoring the default segment preferenceThe default is for all file system
Restore the default file allocation policy:ibrix_fs_tune -f FSNAME {-h HOSTLIST|-g GROUPLIST} -p -UListing allocation policiesUse the following comman
24 Support and other resourcesContacting HPFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore con
25 Documentation feedbackHP is committed to providing documentation that meets your needs. To help us improve thedocumentation, send any errors, sugge
Deleting segments, volume groups, and physical volumes...50Deleting file serving nodes and StoreA
4 Maintaining file systemsThis chapter describes how to extend a file system, rebalance segments, delete a file system or filesystem component, and ch
GlossaryACE Access control entry.ACL Access control list.ADS Active Directory Service.ALB Advanced load balancing.BMC Baseboard Management Configurati
SELinux Security-Enhanced Linux.SFU Microsoft Services for UNIX.SID Secondary controller identifier number.SMB Server Message Block. The protocol used
IndexSymbols/etc/likewise/vhostmap file, 111AActive Directoryconfigure, 69Linux static user mapping, 104synchronize with NTP server, 107use with LDAP
documentationproviding feedback on, 399EenablingEQWSI, 310EQWSI.Windows Explorer Search Plug-in requirements, 312enabling, 310enabling requirements, 3
configure, 74remote LDAP server, configure, 64requirements, 64LDAP ID mappingconfigure, 70use with Active Directory, 66Linux static user mapping, 104L
remove WORM attribute, 284set or remove legal hold, 283file states, 274hard links, 292import metadata, 298legal holds, 283metadata service, 294on-dema
client application, 176creating shares, 176data retention, 177features, 175object mode, 203share types, 174uses, 175subscription service, HP, 398Ttech
Viewing physical volume informationThe following command lists detailed information about physical volumes:ibrix_pv -iFor each physical volume, the ou
DescriptionFieldFree (unallocated) space, in MB, available on this volume group.FREE(MB)Percentage of total space in the volume group allocated to log
DescriptionFieldNumber of times the structure of the file system has changed (for example, new segmentswere added).GENNumber of file system segments.N
DescriptionFieldTime the audit report is run each day (for example, Daily at 02:00 AM)Audit Report ScheduleThe expiration limit for audit reports (for
• .audit• .webdav1There are a few exceptions in the .archiving directory. Some files in this directory are createdfor user consumption in certain subd
On the CLI, use the ibrix_fs command to extend a file system. Segments are added to the fileserving nodes in a round-robin manner. If tiering rules ar
IMPORTANT: Rebalancing is a storage and file system intensive process which, in somecircumstances, can take days to complete. Rebalancing tasks are be
The Rebalance All dialog box allows you to rebalance all segments in the file system or in theselected tier.The Rebalance Advanced dialog box allows y
Rebalancing segments from the CLITo rebalance all segments, use the following command. Include the -a option to run the rebalanceoperation in analytic
SMB shares...87Creating SMB sh
Viewing the status of rebalance tasksUse the following commands to view status for jobs on all file systems or only on the file systemsspecified in FS
For example, to delete segments ilv1 and ilv2:ibrix_lv -d -s ilv1,ilv2To delete volume groups:ibrix_vg -d -g VGLISTFor example, to delete volume group
NOTE: During an ibrix_fsck run, an INFSCK flag is set on the file system to protect it. If anerror occurs during the job, you must explicitly clear th
Troubleshooting file systemsDeleting file systems that are enabled for data retentionWhen you delete a file system that is enabled for data validation
filter = [ "a|^/dev/sd.*|", "r|^.*|" ]Contact HP Support if you need assistance.Cannot mount on a StoreAll clientVerify the follow
1. Identify the file serving node that owns the segment. This information is reported on theFilesystem Segments panel on the Management Console.2. Run
host_name ... ib50-87 <-- Verify owner of segment ref_counter ... 1038 state_flags ...
Segment evacuation task might fail after an upgradeAfter upgrading the StoreAll operating system, the segment evacuation task might fail with themessa
5 Using NFSTo allow NFS clients to access a StoreAll file system, the file system must be exported. You canexport a file system using the GUI or CLI.
3. On the Settings window, enter or select the following:• The clients allowed to access the share• The permission level for the clients• The privileg
Downloading an object from a container...148Viewing the contents of a contain
4. On the Advanced Settings window, you can select additional options on the NFS share. Whenfinished making selections, click Next.60 Using NFS
5. On the Host Servers window, select the servers that will host the NFS share. By default, theshare is hosted by all servers that have mounted the fi
files with the same name but different case might be confusing, and the Windows users may beable to access only one of the files.CAUTION: The case ins
To set case insensitivity from the CLI, use the ibrix_caseinsensitive command. To view taskinformation related to case insensitivity, use the ibrix _t
6 Configuring authentication for SMB, FTP, and HTTPOverviewStoreAll software supports several services for authenticating users accessing shares on St
sh /opt/likewise/bin/gen_ldap-lwtools.sh ldap-conf.conf -nIf the configuration looks correct, run the command with added security by removing all temp
Required attributes for templatesDescriptionValueNonvirtual attributenameHelps identify the configuration version uploaded. Potentiallyused for report
IMPORTANT: If the user’s primary group in AD is not resolved to a GID number from either ActiveDirectory or LDAP, the user will be denied access to St
7. Verify that NIS has been configured by running to the following command to list the usersfrom the NIS passwd map:[root@ib14-1 ~]# ypcat passwd nisu
NOTE: CIFS in the GUI has not been rebranded to SMB yet. CIFS is just a different name forSMB.The wizard displays the window that corresponds to the o
Delete Container...215Set Container Permiss
Linux static use mapping is optional. Do one of the following:IMPORTANT: See “ID Mapping Name Service Selection” (page 70) for information about enabl
Enter the required name service in this field . Supported name services are NIS, FILES, andLDAP.1st Name ServiceIf more than one name service is requi
LDAP ID MappingIf LDAP ID mapping is enabled and the system cannot locate a UID/GID in Active Directory, itsearches for the UID/GID in LDAP.On the LDA
NIS ID MappingWhen case insensitive match is enabled, the NIS service will search for a matching case namethrough the Max Entries limit and use that n
LDAPTo configure LDAP as the primary authentication mechanism for SMB shares, enter the server nameor IP address of the LDAP server host and the passw
Enter the following information in the remaining fields:Enter the LDAP user account used to authenticate to the LDAP server to read data, such ascn=hp
When finished, click OK to return to the LDAP window in the wizard. Click Next on the LDAPwindow to continue.Local GroupsNOTE: If Local Users and Grou
Local UsersNOTE: If Local Users and Groups is the primary authentication service, Windows clients such asExplorer or MMC plug-ins cannot be used to ad
Local Users dialog boxTo provide account information for the user, click Advanced, which opens the Local Users (1st)dialog box.78 Configuring authenti
Enter the following information for the user and click OK when finished.Enter the UID for this account. If you do not enter a value, the system will a
Pausing or resuming a replication task...259Stopping a replication task..
To add an Active Directory or LDAP share administrator, enter the administrator name (such asdomain\user1 or domain\group1) and click Add to add the a
You cannot change the UID or RID for a Local User account. If it is necessary to change a UID orRID, first delete the account and then recreate it wit
NOTE: The following command is displayed on two lines, but the command should beentered on one line:sh /usr/local/ibrix/bin/set_provider_loadorder \ -
Configuring delegated users for an Active Directory domainIf you are adding delegated users to an Active Directory (AD) domain and the DNS host namesd
4. On the Permissions window of the wizard:1. Select General in the Show these permissions box.2. In the Permissions box, select the following:• Reset
6. Click Finish to close the wizard.NOTE: If the host is already in Active Directory and you are unable to join users due to anACCESS_DENIED error, de
7 Using SMBThe SMB server implementation allows you to create file shares for data stored on the cluster. TheSMB server provides a true Windows experi
appropriate server. Select CIFS in the lower Navigator to display the CIFS panel, which showsSMB activity statistics on the server. You can start, sto
Everyone user may have more access rights than necessary. The administrator should set ACLson the SMB share to ensure that users have only the appropr
◦ SE_RESTORE_PRIVILEGE◦ SE_TAKE_OWNERSHIP_PRIVILEGESee the Microsoft documentation for more information about these privileges.Creating SMB shares wit
Enabling EQWSI on a pre-existing HTTP share...310Requirements for creating a Windows
4. On the Permissions window, specify permissions for users and groups allowed to access theshare.Click Add to open the New User/Group Permission Entr
• To modify permissions for an existing user or group, select the appropriate entry from theUser/Group Entries list and click Modify. You can then cha
Click Add to open the New Client IP Address Entry dialog box, where you can allow or denyaccess to a specific IP address or a range of addresses. Ente
6. On the Advanced Settings window, you can set the following options:• Access Based Enumeration: When enabled (on), users can only see the files and
8. The Summary window shows the configuration for the CIFS share. You can go back and revisethe configuration if necessary. When you click Finish, the
When configuring SMB signing, note the following:• SMB2 is always enabled.• Use the Required check box to specify whether SMB signing (with either SMB
On the CIFS Shares panel, click Add or Modify to open the File Shares wizard, where you cancreate a new share or modify the selected share.Click Delet
NOTE: You cannot create an SMB share with a name containing an exclamation point (!) or anumber sign (#) or both.Use the -A ALLOWCLIENTIPSLIST or -E D
Shell: /bin/shHome dir: /home/local/IB/testuser1Logon restriction: NODo a reverse lookup with the UID by entering the following command:[root@ibrix01a
In this command:• The -m option specifies we are going to modify the setting.• The -s option specifies the resource name of the share.• The -D option
Kommentare zu diesen Handbüchern