Hp StoreAll Storage Bedienungsanleitung Seite 1

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Lager Hp StoreAll Storage herunter. HP StoreAll Storage User Manual [en] Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 406
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
HP StoreAll OS User Guide
Abstract
This guide describes how to configure and manage StoreAll software file systems and how to use NFS, SMB, FTP, and HTTP
to access file system data. The guide also describes the following file system features: quotas, remote replication, snapshots,
data retention and validation, data tiering, and file allocation. The guide is intended for system administrators managing 9300
Storage Gateway, 9320 Storage, X9720 Storage, 9730 Storage, 8800 Storage, and 8200 Storage. For the latest StoreAll
guides, browse to
nl
http://www.hp.com/support/StoreAllManuals.
HP Part Number: TA768-96306
Published: February 2014
Edition: 12
Seitenansicht 0
1 2 3 4 5 6 ... 405 406

Inhaltsverzeichnis

Seite 1 - HP StoreAll OS User Guide

HP StoreAll OS User GuideAbstractThis guide describes how to configure and manage StoreAll software file systems and how to use NFS, SMB, FTP, and HTT

Seite 2

Discovering LUNs in the array...369Reviewing snapshot storage

Seite 3 - Contents

6. Click Close→OK to exit the dialogs.7. Expand Shared Folders (\\<address>).8. Select Shares and manage the shares as needed.Windows Vista, Win

Seite 4 - 4 Contents

6. Click OK to exit the Add or Remove Snap-ins window.7. Expand Shared Folders (\\<address>).8. Select Shares and manage the shares as needed.Sa

Seite 5 - Contents 5

• Do not include any of the following special characters in the share description. If a descriptioncontains any of these special characters, the descr

Seite 6 - 6 Contents

When you complete the wizard, the new share appears on the Computer Management window.Deleting SMB sharesTo delete an SMB share, select the share on t

Seite 7 - Contents 7

Best Practices when mapping shares:• A share should always be mapped using the User Virtual Interface (the User VIF) of a fileserving node as that int

Seite 8 - 8 Contents

1. Click Start, click Run, type mmc, and then click OK.2. On the MMC Console menu, click Add/Remove Snap-in.3. Click Add, and then click Active Direct

Seite 9 - Contents 9

The following article provides more information about modifying attributes in the Active Directoryglobal catalog:http://support.microsoft.com/kb/24871

Seite 10 - 10 Contents

Synchronizing Active Directory 2008 with the NTP server used by the clusterIt is important to synchronize Active Directory with the NTP server used by

Seite 11 - File system operations

• Allows lists users and members of CIFS groups to be mapped to a single Linux user• Supports Samba status username map files and features• Support Sa

Seite 12

NOTE: You have the option to configure a dynamic username script, a static username map,or both while pre-configuring the username mapping solution. I

Seite 13 - Configuring file systems

1 Using StoreAll software file systemsFile system operationsThe following diagram highlights the operating principles of the StoreAll file system.The

Seite 14 - Accessing file systems

for a general name change from the Windows-style username to the Linux-styleusername.◦ Setting usernames using LDAP attributes: For example, if you ha

Seite 15 - Creating a file system

also be translated to /srv1/data, but the clients will have different permissions. The client requestsfor \\srv2\data will be translated to share srv2

Seite 16

SMB users cannot view directory tree quotas.Differences in locking behaviorWhen SMB clients access a share from different servers, as in the StoreAll

Seite 17 - Creating a file system 17

Restore operationsIf a file has been deleted from a directory that has Previous Versions, the user can recover a previousversion of the file by perfor

Seite 18

SMB shadow copy restore during node failoverIf a node fails over while an SMB shadow copy restore is in progress, the user may see a disruptionin the

Seite 19 - Creating a file system 19

but will not be inherited or propagated. The SMB server also does not map POSIX ACLs to becompatible with Windows ACLs on a file.These permission mech

Seite 20

behavior, the creator of a share must access the root of the share and set the desired ACLs on itmanually (using Windows Explorer or a command line to

Seite 21 - Creating a file system 21

3. To disable autocommit, you must unmount the file system, modify the data retention settings,and mount the file system again. See “Changing the rete

Seite 22

UID for SMB Guest account conflicts with another userIf the UID for the Guest account conflicts with another user, you can delete the Guest account an

Seite 23 - Creating a file system 23

8 Using FTPThe FTP feature allows you to create FTP file shares for data stored on the cluster. Clients accessthe FTP shares using standard FTP and FT

Seite 24

(Specifically, a segment need not be a complete, rooted directory tree). Segments can be anysize and different segments can be different sizes.2. The

Seite 25 - File limit for directories

• Enter a name for the FTP share.• Enter the path to the file system or directory that will be shared (for example, /myFS1).• Optionally, enter detail

Seite 26 - Mounting a file system

4. On the Host Servers window, select the servers that will host the configuration profile. ClickNext to continue.Configuring FTP 121

Seite 27

5. On the Settings window, configure the following FTP parameters that apply to the share:NOTE: The parameters you configure are added to the nodes ho

Seite 28 - Windows StoreAll clients

6. On the Users window, specify the users to be given access to the share. If no users are specifiedon this window, then any user who can be authentic

Seite 29 - Using Export Control

The Summary window shows the configuration for the FTP share. You can go back and revise theconfiguration if necessary. When you click Finish, the sha

Seite 30 - 3 Configuring quotas

Accessing sharesClients can access an FTP share by specifying a URL in their Web browser, such as Internet Explorer.In the following URLs, IP_address:

Seite 31 - Enabling and disabling quotas

Table 6 Download a file by using the FTP protocolCommandScenariocurl ftp://IP_address/pub/server.pem -o<path to download>\<filename>You do

Seite 32 - 32 Configuring quotas

Table 9 Upload a file by using the FTPS protocol for local userCommandScenariocurl --ftp-ssl-reqd --cacert <certificatefile> -T <filename>

Seite 33 - Group Quotas

9 Using Object StoreObject Store provides the flexibility of being based on the open source OpenStack Cloud Softwarewith the additional functionality

Seite 34 - Directory Quotas

Table 12 Overview for implementing Object Store (continued)For additional informationDescriptionStep“Using cURL commands for managing Object Store”(pa

Seite 35 - Using a quotas file

1) The segment server initiating the operation can read files directly from the segmentacross the SAN; this is called a SAN READ.2) The segment server

Seite 36 - Format of the quotas file

Prerequisite steps for creating an Object Store1. Identify a file system on which you can create an Object Store.IMPORTANT: The file system, identifie

Seite 37 - Using online quota check

b. Identify the bond(x) VIF:# ibrix_nic -a -n bond1 -h node1,node2,node3,node4In this instance node[1–4] is a host name.c. Assign an IP address to the

Seite 38 - Troubleshooting quotas

5. StoreAll uses the FM user VIF to talk to the keystone authentication service. If an FM user VIFdoes not exist for a cluster, create an FM user VIF

Seite 39 - Moving directories

6. Provide an Object Store name. The Object Store name can only contain alphanumericcharacters.Click Next.Creating an Object Store 133

Seite 40 - 4 Maintaining file systems

Provide server details1. Select a NIC for each server.2. To change the ports, click the Show Port Details button and then click the port you want toch

Seite 41 - # ibrix_pv -i

3. Click Next.Set the port and SSL certificate settingsTo modify the port and SSL certificate settings:1. The default port settings are displayed. You

Seite 42

3. Click NextConfirming Object Store settingsThe wizard displays the Summary window. Click Finish to create the Object Store with the settingsdisplaye

Seite 43

Permission levelsUsers can be granted administrative privileges or non-administrative privileges with read or writeaccess to a container. The followin

Seite 44 - Lost+found directory

Table 15 Description of the permission levelsInformation on how to grant privilegesAccessible tasksPrivilege• Create administrative groups andassign u

Seite 45 - Extending a file system

IMPORTANT: Keep in mind the following:• The Object Store creates a default swift administrator group with a default username andpassword of swift when

Seite 46 - 46 Maintaining file systems

• Data tiering. This feature allows you to set a preferred tier where newly created files will bestored. You can then create a tiering policy to move

Seite 47 - How rebalancing works

8. Click OK.Add users to an administrator group using the GUIIMPORTANT: Keep in mind the following:• You cannot add a mixture of StoreAll local or sys

Seite 48 - 48 Maintaining file systems

7. In the Admin Group Name text box provide the required value specified by the followingtable:Required value for the Admin Group Name text boxType of

Seite 49

The ADMINGROUP parameter must be set as follows:Required setting for ADMINGROUPType of userThe ADMINGROUP parameter must be set to swiftSystem user (A

Seite 50 - Deleting a file system

Changing group administrative privilegesTable 17 Changing group administrative privilegesCommandTaskibrix_objectstoreadmin -a -k GROUP_NAMEGrant all m

Seite 51

"http://10.10.104.116:8888/v1/AUTH_7b9a902423a582c9eda266dcf3ad6974a2b98e4b21ea7c9e1e8d38f76afdf1b4"}], "endpoints_links": [], &qu

Seite 52 - 52 Maintaining file systems

curl -X PUT -i -H "X-Auth-Token:864e40dd3ee4910934b73d0a4a399ac" -H "X-Container-Write:group1:user1 —H “X—Container—Read:group1:user1 &

Seite 53 - Troubleshooting file systems

Finding the Fusion Manager user VIFTo find the FM user VIF:ibrix_nic —lThe FM user VIF is listed as [Active FM Nonedit] with a status of User. The FM

Seite 54 - 54 Maintaining file systems

How to find the proxy IP and portTo generate a list of ports and to find the proxy IP, enter the following command:ibrix_objectstore -lThe following i

Seite 55 - SegmentRejected is reported

IMPORTANT: For metadata, you should not exceed 90 individual key/value pairs for any oneobject and the total byte length of all key/value pairs can be

Seite 56

% Total % Received % Xferd Average Speed Time Time Time CurrentDload Upload Total Spent Left Speed0 70 0 70 0 0 195 0 --:--:-- --:--:-- --:--:-- 0View

Seite 57

2 Creating and mounting file systemsThis chapter describes how to create file systems and mount or unmount them.Creating a file systemYou can create a

Seite 58 - 5 Using NFS

HTTP/1.1 204 No ContentContent-Length: 0Content-Type: text/html; charset=UTF-8Date: Sun, 24 Nov 2013 23:48:10 GMTViewing a status of a user accountOnl

Seite 59 - Exporting a file system 59

In the following sample output, the user with authentication token1bb88b944f6c4c8fb7411f85d3bd6bf4 belongs to the group named Users under the domainIB

Seite 60 - 60 Using NFS

2. Select Backup Target from the Select Type menu. You need at least one backup target listedon the Object Store configuration, but this must be the s

Seite 61 - Unexporting a file system

{root@ib48-205]# ibrix_objectstoreadmin -l -cContainer Sync Config=====================Backup Type IPAddress/FQDN------------- --------------Backu

Seite 62 - 3:0:DONE

1. Identify the source container to determine if the container has a pre-existing container syncconfiguration:curl -i <ENDPOINT>/<CONTAINER_N

Seite 63

In this instance, we are setting the source container:• The secretkey123 is the Sync-Key value.• Thehttp://10.2.11.10:8888/v1/AUTH_7b9a902423a582c9eda

Seite 64

NOTE: Even if you delete the container sync configuration at the source cluster, it is alsorecommended that you remove the source container's met

Seite 65

NOTE: The ibrix_objectstore command collects information from the Object Store configurednodes and lists the information. If an Object Store configure

Seite 66

NOTE: If you add couplets without extending Object Store in the StoreAll cluster and the FusionManager fails over to the newly added nodes, swift perm

Seite 67 - Configuring NIS

5. Select the two newly added nodes and their corresponding virtual NIC.6. To change the ports, click the Show Port Details button and then click the

Seite 68 - Configure Options

The requested operation encountered one or more failures. Creating filesystem was successful <Additional information about the feature of the fil

Seite 69 - Active Directory

Rebalancing a file system that is configured for Object StoreAny time a file system configured for Object Store is expanded or storage is removed, you

Seite 70

1. For the object builder configuration: List the configuration, set the weight, and check the weight.a. List the object builder configuration by send

Seite 71 - • “NIS ID Mapping” (page 73)

2. For the container: List the configuration, set the weight, and check the weight.a. List the container configuration by sending this command:[root@s

Seite 72 - LDAP ID Mapping

3. For the account: List the configuration, set the weight, and check the weight.a. List the container configuration by sending this command:[root@swi

Seite 73 - FILES ID Mapping

5. Verify that the partitions are rebalanced by checking all builder file configurations(account/container/object). Send the following commands:a. [ro

Seite 74

To remove the server configuration1. In the HP StoreAll Management Console, navigate to Object Store.2. Select the name of the server you want to remo

Seite 75 - LDAP dialog box

IMPORTANT: HP recommends that you use certificates signed by a signing authority like VeriSignonly when you have configured load balancing for an Obje

Seite 76 - Local Groups

NS44NjETMBEGA1UEAwwKMTAuMjEuMTIuKjCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEArUAesz13JqGcHzjtLFjzJCZ2CHOjmJ/zi7nX2SP3kXn00qYmjSS0O/Usct3hv5mxCrsn2LtTO/TJxb

Seite 77 - Local Users

5. When you create the Object Store, be sure to select SSL certificate on the Settings page or,if you are creating the Object Store using the CLI, mak

Seite 78 - Local Users dialog box

9. Stat (display information for) the container from the client side after extending the ObjectStore.Sample commandcurl -i https://10.21.12.25:8888/v1

Seite 79 - Windows Share Administrators

3. On the Configure Options dialog box, enter a name for the file system. To mount the file system,select Mount Filesystem and specify a mountpoint. S

Seite 80

Sample output:SERVICE : OBJECTSTORE=====================NAME STATUS-------- ------dev-sys4 UPdev-sys3 UPdev-sys2 UPdev-sys1 UPTo list the he

Seite 81 - Provider stacking

To enable service monitoring:ibrix_objectstoremonitor -m [-h FMLIST]Restarting the Object Store servicesUse the following command to restart Object St

Seite 82 - Configuring shell access

Table 22 HTTP status codes (continued)Notes/Suggested actionsDescriptionCode• Request to be granted administrative privilegesOr• Request to be added t

Seite 83

Table 22 HTTP status codes (continued)Notes/Suggested actionsDescriptionCode• Maximum length of container name: 256bytes• Maximum length of container

Seite 84

10 Using HTTPOverviewThe HTTP feature allows you to create HTTP file shares for data stored on the cluster. Clients accessthe HTTP shares using standa

Seite 85

Uses for the StoreAll REST APIAlthough the StoreAll REST API is not generally intended for your end users, it lets you createapplications using the St

Seite 86 - 7 Using SMB

• You must assign read, write, and execute permissions to the share’s directory path and allparent directories up to the file system mount point to al

Seite 87 - SMB shares

Table 25 Checklist for creating HTTP shares (continued)Stepcompleted?Where to find moreinformationTaskStep appliesonlynlto REST APISharesStepCreate or

Seite 88 - 88 Using SMB

Creating HTTP shares from the HP StoreAll Management ConsoleUse the Add New File Share and Object Store Wizard to create the HTTP share. You can thenv

Seite 89 - ◦ SE_TAKE_OWNERSHIP_PRIVILEGE

3. On the Config Profile window, do the following:• Select an existing profile or select Create a new HTTP Profile. If you select the latter, entera n

Seite 90 - 90 Using SMB

4. To enable StoreAll Express Query on the file system, select Enable Express Query on theExpress Query dialog box. Express Query is a database used t

Seite 91 - SMB shares 91

4. If you selected Create a new HTTP Profile, provide the profile name and then modify the settingsas necessary.180 Using HTTP

Seite 92 - 92 Using SMB

5. If you are creating a profile, you are asked to select your hosts servers for the profile.Creating HTTP shares from the HP StoreAll Management Cons

Seite 93 - SMB shares 93

6. On the Virtual Host window, enter the vhost name. Select false in the Enable StoreAll RESTAPI box. Complete the remaining details of SSL certificat

Seite 94 - Configuring SMB signing

7. On the Settings window, enter the URL path and set the appropriate parameters for the share.See the following table for more infomration about each

Seite 95 - SMB shares 95

DescriptionUI Componentbe returned in the HTTP response. An error will be returned if the user issuing the HTTPrequest does not have file system permi

Seite 96 - 96 Using SMB

9. On the Summary window, ensure that the correct parameters are displayed.Ensure that:• In the File Share summary section, the value of StoreAll REST

Seite 97 - SMB shares 97

10. Click Finish.When the wizard is complete, users can access the share from a browser. For example, if youconfigured the share with the anonymous us

Seite 98 - 98 Using SMB

1. Select File Shares and Object Store from the Navigator to open the File Shares and ObjectStore panel, and then click Add to start the Add New File

Seite 99 - Connecting to cluster nodes

4. The Host Servers dialog box displays differently whether you selected a previous profile oryou are create a new one. If you selected the option Cre

Seite 100 - 100 Using SMB

5. If you selected an existing profile on the Config Profile dialog box, you are shown the hostsdefined for that profile, as shown in the following fi

Seite 101 - Adding SMB shares

5. Use the WORM/DATA Retention dialog box to enable data retention and data validation.Creating a file system 19

Seite 102 - 102 Using SMB

7. If you selected a previous profile, the Virtual Host prompts you to select a pre-existing Vhostor create an HTTP Vhost.8. If you already have Vhost

Seite 103 - Mapping SMB shares

DescriptionUI Componentor Object from the StoreAll REST API Mode menu. This option defines which mode's syntaxwill be accepted by this API share.

Seite 105

10. On the Users page, specify the users to be given access to the share. If no users are specifiedon this page, then any user who can be authenticate

Seite 106 - Assigning attributes

11. To allow specific users read access, write access, or both, click Add. On the Add Users toShare dialog box, assign the appropriate permissions to

Seite 107 - HP-SMB user name mapping

Tuning the socket read block size and file write block sizeBy default, the socket read block size and file write block size used by Apache are set to

Seite 108 - 108 Using SMB

Starting or stopping the HTTP service manuallyStart the HTTP service:/usr/local/ibrix/httpd/bin/apachectl -k startStop the HTTP service:/usr/local/ibr

Seite 109 - ◦ Single item entry:

If the anonymous parameter set to false, you'll be required to supply a user name and passwordwhen prompted.If the pathname ends with a directory

Seite 110 - 110 Using SMB

• Download a file using HTTP protocol:curl -u <ADuser> http://IP_address:port/urlpath/pathname -o <localdestination path for download>/<

Seite 111 - SMB clients

curl -i -X PUT -H "Sync-Requested: 1" "http://10.10.21.209/myshare/"HTTP/1.1 200 OK Date: Fri, 19 Jul 2013 16:56:28 GMT Server: Ap

Seite 112 - SMB shadow copy

© Copyright 2009, 2014 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP required for possession, use or

Seite 113 - Windows Clients Behavior

You can configure the following:• Enable Data Retention Select this option to enable data retention. For more informationon data retention, see “Manag

Seite 114 - 114 Using SMB

• Create an SSL certificate. When using basic authentication to access WebDAV-enabled HTTPshares, SSL-based access is mandatory.• Verify that the host

Seite 115 - New directories and files

net use * http://192.168.1.1/smita/In this instance, the HTTP WebDAV share is 192.168.1.1/smita.HTTP WebDAV share is inaccessible through Windows Expl

Seite 116 - 116 Using SMB

Unable to rename directory under a WebDAV shareWhen a file system is enabled for data retention, any folders created under a WebDAV share onthat file

Seite 117 - Troubleshooting SMB

11 HTTP-REST API object mode sharesThe StoreAll REST API share in object mode provides concepts similar to OpenStack Object StorageAPI to support prog

Seite 118 - 118 Using SMB

Using the HTTP StoreAll REST API object modeThis section walks you through using the major components of object mode. You will be shownhow to:• Create

Seite 119 - 8 Using FTP

the errno value, where 0 (zero) means that sync was done successfully and any other value indicatessync did not complete and durability is not guarant

Seite 120 - 120 Using FTP

NOTE: Enter the following commands on one line.• curl -X PUT http://<IP_address:port/<urlpath>/<account_name>/<container_name> -u

Seite 121 - Next to continue

The %5C is the URL encoding for a backslash.2. Set the permissions of the container.A container is always created with read-write permission by the ac

Seite 122 - 122 Using FTP

PUT /<urlpath>/<account_name>/<container_name>/<object_id> HTTP/1.1 ["Sync-Requested: 1"]4. View the list of objects

Seite 123 - Configuring FTP 123

The system::size refers to the number of bytes used by the directory inode representing thecontainer on the StoreAll server (initially 4096 for any ne

Seite 124 - The vsftpd service

(non-retained) files can be deleted at any time; WORM-retained files can be deletedonly after the file's retention period has expired.)To manage

Seite 125 - Accessing shares

Finding the corresponding object ID from a hash nameNOTE: These steps are for someone with administrator privileges.The HTTP StoreAll REST API object

Seite 126

In this instance newcontainer is the container containing the hash reference.7. Enter the following command to list the contents of newcontainer.[root

Seite 127

The first time a user creates a container, a directory with the numeric user ID of the user representingthat account, is created to hold the container

Seite 128 - 9 Using Object Store

1. Enter the following command on the StoreAll server:echo -n '<object_id>' | openssl dgst -sha1For example, if your object identifier

Seite 129 - Creating an Object Store

HTTP command:PUT /<urlpath>/<account_name>/<container_name> HTTP/1.1 [“Sync-Requested: 1”]CURL command (Enter on one line):curl -X

Seite 130 - 130 Using Object Store

Delete ContainerType of Request: Container servicesDescription: Deletes the container.IMPORTANT: The container must be empty before it can be deleted.

Seite 131

Retrieve ObjectType of Request: Object RequestsDescription: Returns the list of containers for a user account.HTTP command:GET /<urlpath>/<ac

Seite 132 - 132 Using Object Store

12 HTTP-REST API file-compatible mode sharesThe StoreAll REST API share in file-compatible mode provides programmatic access to user-storedfiles and t

Seite 133 - Click Next

Metadata queriesYou can issue StoreAll REST API commands that query the pathname and custom and systemmetadata attributes for a set of files and direc

Seite 134 - Provide server details

◦ Literal strings must be enclosed in single quotes. Non-escaped UTF-8 characters areallowed. Literals are case-sensitive. Any single quotes that are

Seite 135

which is enabled along with Express Query. The Filesystem Metadata Cleaner task runsdaily at 1:30 a.m. local time by default.• Schedule Data validatio

Seite 136 - 136 Using Object Store

The version field is recommended, but not required. In the syntax descriptions, it is surrounded bysquare brackets to indicate that it is optional.The

Seite 137 - Permission levels

as the Linux user “daemon” and group “daemon” (daemon:daemon), since that is the user theHTTP Server acts as, for anonymous operations.For retention p

Seite 138

Examplecurl -T temp/a1.jpg https://99.226.50.92/ibrix_share1/lab/images/xyz.jpgThis example uploads the file a1.jpg, stored on the client’s machine in

Seite 139

This example downloads an existing file called xyz.jpg in the lab/images subdirectory of theibrix_share1 HTTP share. The file is created with the file

Seite 140 - 140 Using Object Store

curl -X PUT http[s]://<IP_address>:<port>/,<urlpath>/ --header"Sync-Requested: 1"The HTTP response will return the "S

Seite 141

If the urlpath does not exist, an HTTP 405 error is returned with the message (Method NotAllowed).DescriptionParameterThe name of the existing file/di

Seite 142 - Sample commands

HTTP syntaxThe HTTP request line format is the following on one line:DELETE /<urlpath>[/<pathname>]?[version=2&]attributes=<attribu

Seite 143

With the exception of system::deleteTime, all of the system metadata attributes listed in thistable are valid for live (for example, not-yet-deleted)

Seite 144 - Keystone token flush

WritableExampleDescriptionTypeSystem attribute (key)(page 231) for moreinformation.notier1_fastThe user-defined name ofthe StoreAll tier of storagehos

Seite 145

WritableExampleDescriptionTypeSystem attribute (key)system::retentionState partial (seesystem::worm)A decimal number, such as 11for the bit value 0x0B

Seite 146 - Format of the endpoint

7. Use the Default File Shares dialog box to create an NFS export and/or an SMB share at theroot of the file system. The default settings are used. Se

Seite 147 - Posting metadata to an object

WritableExampleDescriptionTypeSystem attribute (key)system::lastActivityTime noSee “API date formats”(page 220).The latest date/time of thefollowing 5

Seite 148 - 148 Using Object Store

system::onDiskAtimeThe atime inode field in StoreAll can be accessed as the system::onDiskAtime attribute fromthe API. This field represents different

Seite 149 - Deleting a container

results are easier for users to read. The disadvantage is that is not easy to follow files thatwere moved/renamed.• Bypoid mode: This mode will consid

Seite 150 - Listing tenants

WildcardsThe StoreAll REST API provides three wildcards:DescriptionWildcardIn bypoid mode, a single attribute name of * returns allsystem and custom m

Seite 151 - Synchronization of containers

By default, if the skip parameter is not supplied, the results will not skip any records. Similarly,if the top parameter is not supplied, the results

Seite 152 - Command succeeded!

DescriptionParameterThe value to compare against the query_attr using the operator. The value is eithera numeric or string literal. See “General topic

Seite 153

JSON response formatDefault query mode exampleIf the default query mode is requested (absence of bypoid attribute), the JSON format is:[ { "m

Seite 154 - 154 Using Object Store

"system::retentionExpirationTime" : 0.000000000, "system::mode" : 16895, "system::tier" : "no tier&

Seite 155 - # curl -i -X POST

Example queriesGet selected metadata for a given fileThe following is one command line:curl -g "http://99.226.50.92/ibrix_share1/lab/images/xyz.j

Seite 156 - 156 Using Object Store

issued queries to receive the first 2000 results. The client usually issues further queries until no moreresults are returned.Get selected metadata fo

Seite 157 - Extend an Object Store

The Data Retention tab allows you to change the data retention configuration. The file system mustbe unmounted. See “Configuring data retention on exi

Seite 158 - To extend an Object Store

Get all files that match a name patternThe following is one command line:curl -g "http://99.226.50.92/ibrix_share1/lab/images?query=nlsystem::pat

Seite 159

HTTP syntaxNOTE: The commands provided in this section should be entered on one line.The HTTP request line format is the following on one line:PUT /&l

Seite 160

DescriptionParameterA file’s state can be changed to WORM only once. A file in WORM orretained state cannot be reverted to non-WORM, and cannot be un-

Seite 161

Be aware that this log file can grow quickly from client HTTP accesses. Manage the size of this fileso that it does not fill up the local root file sy

Seite 162 - 162 Using Object Store

13 Managing SSL certificatesServers accepting FTPS and HTTPS connections typically provide an SSL certificate that verifies theidentity and owner of t

Seite 163

1. Generate a private key:openssl genrsa -des3 -out server.key 1024You will be prompted to enter a passphrase. Be sure to remember the passphrase.2. R

Seite 164 - 164 Using Object Store

Adding a certificate to the clusterTo add an existing certificate to the cluster, click Add on the Certificates panel. On the AddCertificate dialog bo

Seite 165 - Enabling HTTPS access

Deleting a certificateTo delete a certificate from the GUI, select the certificate on the Certificates panel, click Delete,and confirm the operation.D

Seite 166

14 Using continuous remote replicationThis chapter describes how to configure and manage the Continuous Remote Replication (CRR)service.NOTE: Be aware

Seite 167

and are replicated in parallel by each file serving node. There is no strict order to replication ateither the file system or segment level. The conti

Seite 168 - 168 Using Object Store

File limit for directoriesThe maximum number of files in a directory depends on the length of the file names, and also thenames themselves. The maximu

Seite 169 - Object service monitoring

The examples in the configuration rules use three StoreAll clusters: C1, C2, and C3:• C1 has two file systems, c1ifs1 and c1ifs2, mounted as /c1ifs1 a

Seite 170 - 170 Using Object Store

Using intracluster replicationsThere are two forms of intracluster replication:• The same cluster and a different file system. Configure either contin

Seite 171 - Troubleshooting Object Store

the following alphanumeric and special characters are allowed: ` ~ ! @ # $ % ^ * ( ) _- + = { } [ ] | ; < > . ? /.• Server Assignments: Select t

Seite 172

Viewing remote replication exportsThe Remote Replication Exports panel lists the replication exports you created for the file system.Expand Remote Rep

Seite 173

Source Settings for continuous replicationFor continuous replications, the Source Settings window lists the file system selected on theFilesystems pan

Seite 174 - 10 Using HTTP

If you are replicating a snapshot, select Use a snapshot and then select the appropriate Snap Treeand snapshot.Click Next to continue. The Target Sett

Seite 175

for more information.) Then enter the target file system. Optionally, you can also specify a targetdirectory in the file system.For replications to th

Seite 176

displayed includes the ID assigned to the task, the type of replication, the status of the task, andthe time the task was started.From this panel, you

Seite 177

If the health check finds an issue in the CRR operation, it generates a critical event.Reports are generated on the source cluster. If the target clus

Seite 178 - Creating standard HTTP shares

Viewing server tasksSelect Server Tasks to display the state of the task and other information for the servers where thetask is running.Pausing or res

Seite 179

Mounting a file systemIMPORTANT: Keep in mind:• Mount options do not persist, unless they are set at the mountpoint. Mount options that arenot set at

Seite 180 - 180 Using HTTP

Also note the following:• Multiple hard links on retained files on the replication source are not replicated. Only the firsthard link encountered by r

Seite 181

Prerequisites and planning considerations for custom metadata replication• Custom metadata replication is only supported on StoreAll version 6.5 or la

Seite 182 - 182 Using HTTP

The following options are available for the crr_cmd_replication.sh command:DescriptionOptionThe name of the source file system. Ensure that you enter

Seite 183

Example 1 Sample output from initiating a custom metadata replication task (intercluster replication)Sample output without CRR security token:crr_cmd_

Seite 184

Example 2 Enabling an intracluster custom metadata replication taskCommand example:sh crr_cmd_replication.sh –f SOURCE_FSNAME -F TARGET_FSNAME -NLOCAL

Seite 185 - Ensure that:

Example 3 Initiating an intercluster custom metadata replication taskCommand example:sh crr_cmd_replication.sh –f SOURCE_FSNAME -F TARGET_FSNAME -NTAR

Seite 186 - 186 Using HTTP

task with custom metadata replication from fs1 to fs2 using the password protection.[December 09, 2013 16:19:18] [CRR ON SOURCE] Submitted CRR operat

Seite 187

Example 4 Disabling an intracluster custom metadata replication taskCommand example:sh crr_cmd_replication.sh –f SOURCE_FSNAME -F TARGET_FSNAME -NLOCA

Seite 188 - 188 Using HTTP

Example 5 Disabling an intercluster custom metadata replication taskCommand example:sh crr_cmd_replication.sh –f SOURCE_FSNAME -F TARGET_FSNAME -NTARG

Seite 189

2. Select Summary→Active Tasks→Remote Replication→<Task Name>.In the Task Summary window, see the "Replicate Custom Metadata?" field.

Seite 190

Select the mount options that apply to your configuration:• atime: Update the inode access time when a file is accessed• nodiratime: Do not update the

Seite 191

– D is for a device– S is for a special file (for example, named sockets and First Ins, First Outs (FIFOs)).◦ The other letters in the %i string are t

Seite 192 - 192 Using HTTP

Continuous remote replication job may hang if the target cluster goes downIf the job is hanging, files will not be replicated. In this situation, the

Seite 193

3. If the ibrix_cud service is not running, start the ibrix_server services:service ibrix_server start4. Start a new replication task:ibrix_crr -s -f

Seite 194 - 194 Using HTTP

Issues with enabling a custom metadata replication taskEnabling custom metadata replication is a multi-step process and could fail during any of these

Seite 195

15 Managing data retentionData retention is intended for sites that need to archive read-only files for business purposes, andensures that files canno

Seite 196 - 196 Using HTTP

Default retention period. If a specific retention period is not applied to a file, the file will be retainedfor the default retention period. The sett

Seite 197

storage. A scheduled scan will quit immediately if it detects that a scan of the same file system isalready running.You can schedule periodic data val

Seite 198 - Durability

Modify the data validation scheduleModify the default schedule for running the data validation scan. Select the frequency for whenthe task should be r

Seite 199

default retention period is set to zero, the files become WORM. If the default retention periodis set to a value greater than zero, the files become W

Seite 200 - Troubleshooting HTTP

Viewing the retention profile for a file systemTo view the retention profile for a file system, select the file system on the Management Console,and t

Seite 201 - Troubleshooting HTTP 201

Mounting and unmounting file systems locally on StoreAll clientsOn both Linux and Windows StoreAll clients, you can locally override a mount. For exam

Seite 202 - 202 Using HTTP

Autocommit period is set and the default retention period is zero seconds:• Files remaining unchanged during the autocommit period automatically becom

Seite 203

NOTE: For SMB users setting the access time manually for a file, the maximum retention periodis 100 years from the date the file was retained. For NFS

Seite 204 - Durability on disk

To administer files from the CLI, use the ibrix_reten_adm command. See the HP StoreAll OSCLI Reference Guide for more information.IMPORTANT: Do not us

Seite 205 - [ync-Requested: 1]

find /ibrixFS/mydir -type d -exec ibrix_reten_adm -h -f ibrixFS -P{/*,{}/.??*,.[!.]*Setting or removing a legal holdWhen a legal hold is set on a reta

Seite 206

Removing the retention periodWhen you remove the retention period from a retained file, the file becomes a WORM file. Onthe WORM/Data Retention – File

Seite 207

If the retention period has expired at the time autocommit is applied, the file is not retained.Running data validation scansScheduling a validation s

Seite 208

Starting an on-demand validation scanYou can run a validation scan at any time. Select the file system on the Management Console,and then select Activ

Seite 209

Viewing, stopping, or pausing a scanScans in progress are listed on the Active Tasks panel on the Management Console. If you needto halt the scan, cli

Seite 210

Following is a sample validation summary file:# cat /fsIbrix/.archiving/validation/history/4-0.sumJOB_ID=4FILESYSTEM_NAME=fsIbrixFILESYSTEM_MOUNT_DIR=

Seite 211

Checksum corruption:If the checksums of the <filesystem/file> and <fileFromBackup> are identical, the expressquery checksum store may have

Seite 212

To remove a client access entry, select the affected file system, and then select Client Exports fromthe lower Navigator. Select the access entry from

Seite 213 - Commands for object mode

The utilization report summarizes how storage is utilized between retention states and free space.The next example shows the first page of a utilizati

Seite 214 - List Objects

Generating and managing data retention reportsTo run an unscheduled report from the Management Console, select Filesystems in the upperNavigator and t

Seite 215 - Create/Update Object

Generating data retention reports from the CLIYou can generate reports at any time using the ibrix_reports command. Scheduled reportscan be configured

Seite 216 - Filesystem flush

• When a legal hold is applied to a file, the legal hold is not replicated on the target. If the fileon the target should have a legal hold, you will

Seite 217 - Component overview

16 Express QueryExpress Query provides a per-file system database of system and custom metadata, and audithistories of system and file activity. When

Seite 218 - Metadata queries

See the ibrix_archiving command in the HP StoreAll OS CLI Reference Guide for examplesof how to perform these tasks.Backing up and restoring file syst

Seite 219 - URL encoding

Restore to an existing file system that has Express Query enabledTo restore a backup to an existing file system that has Express Query enabled:1. Disa

Seite 220 - API date formats

Saving and importing custom metadata and audit informationUse the following procedures to save, or export, custom metadata that is stored only in the

Seite 221 - File content transfer

ibrix_audit_reports -t unordered -o all -f ibrixFSThis command saves audit data for all events in file system ibrixFS. Use the “unordered” optionfor t

Seite 222 - Download a file

NOTE:• The output file listed on the MDExport.pl command line must be in a directory that will bereplicated by CRR.• The <mountpoint>/.archiving

Seite 223 - File system flush

Contents1 Using StoreAll software file systems...11File system operations...

Seite 224 - Custom metadata assignment

3 Configuring quotasQuotas can be assigned to individual users or groups, or to a directory tree. Individual quotaslimit the amount of storage or the

Seite 225 - Delete custom metadata

Modifying the audit log configurationTo change the audit log configuration, click Modify on the Audit Log panel. The Modify AuditSettings dialog box a

Seite 226

Table 31 Fields on the Modify Auditing Settings dialog box (continued)DescriptionFieldSet the expiration period for the audit logs (the number ofdays

Seite 227

Monitor the space used by the audit logs and reports in the <mount point>/.archiving/.databasetree, which includes current metadata and the audi

Seite 228

the system log. To resolve this issue, you must clear space on the segment either by deletingdata or running the 'rebalance' utility.When yo

Seite 229

The file is in a comma-separated value (CSV) format with a header row. The following table displaysthe definitions for the less obvious fields in an a

Seite 230

Table 34 Events by category (continued)EventCategoryEnabled, Retention Mode Changed, Retention DefaultChanged, Maximum Retention Changed, MinimumReten

Seite 231 - Query mode

If the path name limit is exceeded, the path name:• Appears in audit report logs in the format of “<TRUNCATED>/” + <last 2,548 characters oft

Seite 232

Auto commit filesNOTE: This task only applies to retention-enabled file systems.Use the auto-commit feature to automatically move a file to a WORM+Ret

Seite 233 - Pagination

Online Metadata SynchronizerThe Online Metadata Synchronizer can be used to:• Verify the consistency of the system metadata stored in Express Query da

Seite 234 - HTTP syntax

The EQWSI feature searches the metadata stored in the Express Query database, which providesfast access to metadata without scanning the entire file s

Seite 235 - Regular expressions

To view the current quotas configuration, select the file system and then select Quotas from thelower Navigator. The Quota Summary panel specifies whe

Seite 236 - JSON response format

EQWSI can only be enabled on shares that meet the following criteria:• HTTP-share required properties.◦ If multiple HTTP shares are configured, ensure

Seite 237 - Metadata queries 237

1. Select Filesystems in the upper Navigator panel in the StoreAll Management Console.2. Select the file system containing the HTTP share you want to

Seite 238 - Example queries

5. Select true from the Enable Express Query WSI menu on the Modify HTTP share dialog box.Requirements for creating a Windows Explorer Search Plug-inA

Seite 239 - Metadata queries 239

◦ Windows Server 2012 R2◦ Windows Server 2008 R2• Virtual host requirements:The client used for EQWSI searches should be able to access the HTTP virtu

Seite 240

Creating a Windows Explorer Search Plug-inA Windows Explorer Search Plug-in uses the HTTP share configuration settings such as the VirtualHost IP Addr

Seite 241

The generated Windows Explorer Search Plug-in is given the file nameHPStoreAll-sharename.osdx , and it is also saved in the /usr/local/ibrix/httpd/htd

Seite 242 - HTTP Status Codes

9. When the Search Connector window displays, click OK. This window shows the IP addressof the HTTP share that shares its link.The EQWSI link appears

Seite 243

• EQWSI queries only support dates from 1970-01-02 (January 2, 1970). EQWSI does notsupport the explicit usage of dates lesser than or equal to 1970-0

Seite 244 - 13 Managing SSL certificates

Table 36 Supported keywords for EQWSI queries (continued)Supported Value stringsSupported OperatorsDescriptionKeywordThis keyword can be usedto search

Seite 245

Examples of supported EQWSI queries:• size > tiny• crtime >= 2013-12-24• atime < 2013-12-24• dtime <= 2013-12-24• rstate = 4• mode = aLL•

Seite 246 - Exporting a certificate

Setting quotas for users, groups, and directoriesBefore configuring quotas, the quota feature must be enabled on the file system and the file systemmu

Seite 247 - Deleting a certificate

Constraints with EQWSIFor any EQWSI search, a maximum of up to 100 search results are listed in the Microsoft WindowsExplorer, as a result of a Micros

Seite 248 - Overview

4. To see a magnified view of the data with the searched file or directory displayed, hover themouse over any of the search results in Windows Explore

Seite 249 - Planning considerations

Summarized details of system metadata displayed in Windows ExplorerThe following table summarizes the details of the system metadata displayed on the

Seite 250

If the EQWSI query uses only the dtime keyword, then only the title, link and the delete time of thedeleted files or directories are displayed in the

Seite 251

17 Generating reportsHP StoreAll lets you generate reports of files stored on file systems that have Express Query enabled.The Reporting functionality

Seite 252

• provide file size details of the overall file system, such as file system size, available size, andblock size.• determine nor categorize file data t

Seite 253 - Starting a replication task

Table 39 Supported options for reports (continued)DescriptionOptionsSlice Value (not applicable to File Extension Reports)• Retention Expiration Repor

Seite 254

Table 40 Filter criteria for reports (continued)ExamplesSupported operatorsDescriptionFilter Criteria Options• pathname isnotdirhome/*• pathname is *.

Seite 255 - Target Settings window

Table 40 Filter criteria for reports (continued)ExamplesSupported operatorsDescriptionFilter Criteria Optionstier is tier2is or =Reports can be genera

Seite 256 - Viewing replication tasks

The following image shows the data from a Retention Expiration report that was generated usingthe default options.Retention Expiration reports 329

Seite 257 - Viewing CRR health reports

User QuotasThe User Quotas dialog box is used to create, modify, or delete quotas for users. To add a userquota, enter the required information and cl

Seite 258 - Viewing task status

An example of a report with slice type log selectedThis section provides the output from a report that has slice type log selected. The following tabl

Seite 259 - Stopping a replication task

Figure 2 Retention Expiration report with slice type log selected (table format)The following table provides a description of the information provided

Seite 260

Figure 3 Output from a sample Retention Expiration report with slice type equal selectedZero valued records are not displayed in the chart. See the ta

Seite 261

The following table provides a description of the information provided in the previous figure.Table 44 Description of data provided in example report

Seite 262

Figure 5 Last Validation report with data displayed in a bar chartFigure 6 Last Validation report with data displayed in a tableFile Size Distribution

Seite 263

Figure 7 File Size Distribution report with data displayed in a pie chartFile Size Distribution reports 335

Seite 264

Figure 8 File Size Distribution report with data displayed in a bar chart336 Generating reports

Seite 265

Figure 9 File Size Distribution report with data displayed in a tableFile Extension reportsFile Extension reports provides an overview of the various

Seite 266 - protection

Figure 10 File Extension report with data displayed in a pie chart338 Generating reports

Seite 267

Figure 11 File Extension report with data displayed in a bar graphFile Extension reports 339

Seite 268

the group. Groups having quotas are listed in the table at the bottom of the dialog box. To modifyquotas for a group, check the box preceding that gro

Seite 269

Figure 12 File Extension report with data displayed in a table graph340 Generating reports

Seite 270

18 Obtaining performance statisticsThe Performance Statistics tool (also referred as Statstool/Statistics tool) lets you generate reportscontaining hi

Seite 271

To generate performance reports through the StoreAll Management Console:1. In the StoreAll Management Console, select Reporting→Performance Statistics

Seite 272

7. To save a report, select one of the following from the Save Report menu and then click Save.• PDF• HTML• CSV (comma separated values)• TXTNOTE: Whe

Seite 273

Table 45 Category definitions (continued)Available ReportsDescriptionCategoryCluster Comparison/ClusterCumulative/Host-level: MemoryReports on memory

Seite 274 - 15 Managing data retention

Troubleshooting the Performance Statistics tool• Data is not collected. If data is not being gathered in the common directory for the StatisticsManage

Seite 275 - Data validation scans

19 Configuring Antivirus supportThe StoreAll Antivirus feature can be used with supported Antivirus software, which must be runon systems outside the

Seite 276 - New file systems

Adding or removing external virus scan enginesThe Antivirus software is run on external virus scan engines. You will need to add these virus scanengin

Seite 277

When a virus scan engine is no longer needed, you must manually delete it from the configuration.Go to the Virus Scan Engines panel, select the applic

Seite 278 - 278 Managing data retention

Defining protocol-specific policiesFor certain file sharing protocols (currently only SMB/CIFS), you can specify the file operationsthat trigger a sca

Seite 279

SummaryThe Summary lists the quotas configuration you specified. Click Back if any changes are needed,or click Finish to complete the wizard.To config

Seite 280 - Setting the atime

Defining exclusionsExclusions specify files that should be skipped during Antivirus scans. Excluding files can improveperformance, as files meeting th

Seite 281 - File administration

5. Select the appropriate type of rule:• Inherited Rule/Remove Rule. Use this option to reset or remove exclusions that wereexplicitly set on the chil

Seite 282 - Specifying path lists

Updating Antivirus definitionsYou should update the virus definitions on the cluster nodes periodically. On the ManagementConsole, click Update Cluste

Seite 283 - Changing a retention period

Recommendations for Antivirus scans:• Run Antivirus scans during periods of low activity on the system.• Configure Antivirus scans to ensure that if a

Seite 284 - Removing the retention period

6. On the Schedule tab, click Schedule this task and then select the frequency (once, daily,weekly, monthly) and specify when the scan should run.NOTE

Seite 285 - Running data validation scans

Stopping or pausing an active taskUse the buttons on the Antivirus Task Summary panel to stop or pause a running task, or to resumea paused task.Viewi

Seite 286 - 286 Managing data retention

Antivirus quarantines and software snapshotsThe quarantine utility has the following limitations when used with snapshots.Limitation 1: When the follo

Seite 287

20 Creating StoreAll software snapshotsThe StoreAll software snapshot feature allows you to capture a point-in-time copy of a file systemor directory

Seite 288 - 288 Managing data retention

To enable a directory tree for snapshots, click Add on the Snap Trees panel.You can create a snapshot directory tree for an entire file system or a di

Seite 289 - File corruption

IMPORTANT: A snapshot reclamation task is required for each file system containing snap treesthat have scheduled snapshots. If a snapshot reclamation

Seite 290 - 290 Managing data retention

Exporting quotas to a fileSelect the file system, select Quotas from the lower Navigator, and then click Export on the QuotaSummary panel.Format of th

Seite 291

You must manually delete on-demand snapshots when they are no longer needed.Determining space used by snapshotsSpace used by snapshots counts towards

Seite 292 - Using remote replication

The following example lists snapshots created on an hourly schedule for snap tree /ibfs1/users.Using ISO 8601 naming ensures that the snapshot directo

Seite 293

Restoring files from snapshotsUsers can restore files from snapshots by navigating to the appropriate snapshot directory andcopying the file or files

Seite 294 - 16 Express Query

Using the Management Console, you can schedule a snapshot reclamation task to run at a specifictime on a recurring basis. The reclamation task runs on

Seite 295

On the General tab, select a reclamation strategy:• Maximum Space Reclaimed. The reclamation task recovers all snapped space eligible forrecovery. It

Seite 296 - 296 Express Query

Removing snapshot authorization for a snap treeBefore removing snapshot authorization from a snap tree, you must delete all snapshots in the snaptree

Seite 297 - Saving audit journal metadata

Backups with the tar utilityThe tar symbolic link (h) option can copy snapshots. For example, the following command copiesthe /snapfs1/test3 directory

Seite 298

21 Creating block snapshotsOverviewThe block snapshot feature allows you to capture a point-in-time copy of a file system for onlinebackup purposes an

Seite 299 - Managing auditing

NOTE: By default, snapshots are read only. HP recommends that you do not allow writes to anysnapshots.To manage block snapshots, select Filesystems in

Seite 300

Planning for snapshotsThis section describes how to configure the cluster to take snapshots.Preparing the snapshot partitionThe block snapshot feature

Seite 301

NOTE: When a quotas file is imported, the quotas are stored in a different, internal format.When a quotas file is exported, it contains lines using th

Seite 302 - Managing audit log reports

Automated block snapshotsIf you plan to take a snapshot of a file system on a regular basis, you can automate the snapshots.To do this, first define a

Seite 303 - Managing auditing 303

Once you create a snapshot scheme, return to the Create Snapshot dialog box to set up a schedulefor it.Select the Schedule tab. Click Schedule this ta

Seite 304 - Table 34 Events by category

Creating a snapshot schemeUnder Snapshot Configuration, select an existing scheme or click New to create a new snapshotscheme. The Create Snapshot Sch

Seite 305 - Truncated path names

On the General tab, enter a name for the strategy and then specify the number of snapshots tokeep and mount on a daily, weekly, and monthly basis. Kee

Seite 306 - Filesystem Metadata Cleaner

Viewing automated snapshot schemesOn the Management Console, you can view snapshot schemes on the Create Snapshot dialogbox. Select Recurring as the S

Seite 307

The next window shows an SMB client accessing the snapshot file system .fs1_snap1. Theoriginal file system is mapped to drive X.Accessing snapshot fil

Seite 308 - Online Metadata Synchronizer

Troubleshooting block snapshotsSnapshot reserve is full and the MSA2000 is deleting snapshot volumesWhen the snapshot reserve is full, the MSA2000 wil

Seite 309 - EQWSI provides:

22 Using data tieringA data tier is a logical grouping of file system segments. After creating tiers containing the segmentsin the file system, you ca

Seite 310 - 310 Express Query

Manage tierOn the Manage Tier dialog box, do one of the following:• Create a tier:1. Select Create New Tier.2. Enter a name for the tier.3. Select one

Seite 311

Primary tierAll new files are written to the primary tier. On the Primary Tier dialog box, select the tier thatshould receive these files. You can als

Seite 312 - ◦ Windows 8

The Task Summary panel displays the progress of the scan. If necessary, select Stop to stop thescan.To run an online quota check from the CLI, use the

Seite 313

patterns (such as access and modification times), file size, and file type. Rules can be constrainedto operate on files owned by specific users and gr

Seite 314 - 314 Express Query

To add a new tiering policy, click New. On the New Data Tiering Policy dialog box, select thesource and destination tiers. Initially RuleSet1 is empty

Seite 315

When you click New to create a new schedule, the default frequency for migration tasks isdisplayed. For an existing schedule, the current frequency is

Seite 316 - 316 Express Query

Viewing tier assignments and managing segmentsOn the Management Console, select Filesystems from the Navigator and select a file system in theFilesyst

Seite 317

You can assign, reassign, or unassign segments from tiers using the Data Tiering Wizard. TheManagement Console also provides additional options to per

Seite 318

When you click OK, the rule is checked for correct syntax. If the syntax is correct, the rule is savedand appears on the Data Tiering Rules panel. The

Seite 319

DescriptionRuleMigrates all mpeg4 files in the testdata4 subtree. Use the"and" operator to combine rules.path=testdata4 and name="*mpeg

Seite 320 - Running an EQWSI query

Configuring tiers and migrating data using the CLIUse the following command to define the primary tier:ibrix_fs_tune -f FILESYSTEM -h SERVERS -t TIERN

Seite 321

Rule attributesEach rule identifies file attributes to be matched. It also specifies the source tier to scan and thedestination tier where files that

Seite 322

Rule keywordsThe following keywords can be used in rules.DescriptionKeywordAccess time, used in a rule as a fixed or relative time.atimeChange time, u

Seite 323 - EQWSI search

Moving directoriesAfter moving a directory into or out of a directory containing quotas, run theibrix_onlinequotacheck command as follows:• After movi

Seite 324 - 17 Generating reports

The following example uses the path keyword. It moves files greater than or equal to 5M that areunder the directory /ifs2/tiering_test from TIER1 to

Seite 325

23 Using file allocationThis chapter describes how to configure and manage file allocation.OverviewStoreAll software allocates new files and directori

Seite 326

Standard segment preferences and allocation policiesCommentDescriptionNameThis is the default segment preference. It is suitablefor most use cases.Pre

Seite 327

A StoreAll client or StoreAll file serving node (referred to as “the host”) uses the following precedencerules to evaluate the file allocation setting

Seite 328 - Retention Expiration reports

Setting file and directory allocation policies from the CLIAllocation policy names are case sensitive and must be entered as uppercase letters (for ex

Seite 329

Both methods can be in effect at the same time. For example, you can prefer a segment for a userand then prefer a pool of segments for the clients on

Seite 330

ibrix_fs_tune -f FSNAME {-h HOSTLIST|-g GROUPLIST} -S {SEGNUMLIST|ALL|LOCAL}Restoring the default segment preferenceThe default is for all file system

Seite 331

Restore the default file allocation policy:ibrix_fs_tune -f FSNAME {-h HOSTLIST|-g GROUPLIST} -p -UListing allocation policiesUse the following comman

Seite 332 - 332 Generating reports

24 Support and other resourcesContacting HPFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore con

Seite 333 - Last Validation reports

25 Documentation feedbackHP is committed to providing documentation that meets your needs. To help us improve thedocumentation, send any errors, sugge

Seite 334 - 334 Generating reports

Deleting segments, volume groups, and physical volumes...50Deleting file serving nodes and StoreA

Seite 335

4 Maintaining file systemsThis chapter describes how to extend a file system, rebalance segments, delete a file system or filesystem component, and ch

Seite 336 - 336 Generating reports

GlossaryACE Access control entry.ACL Access control list.ADS Active Directory Service.ALB Advanced load balancing.BMC Baseboard Management Configurati

Seite 337 - File Extension reports

SELinux Security-Enhanced Linux.SFU Microsoft Services for UNIX.SID Secondary controller identifier number.SMB Server Message Block. The protocol used

Seite 338 - 338 Generating reports

IndexSymbols/etc/likewise/vhostmap file, 111AActive Directoryconfigure, 69Linux static user mapping, 104synchronize with NTP server, 107use with LDAP

Seite 339 - File Extension reports 339

documentationproviding feedback on, 399EenablingEQWSI, 310EQWSI.Windows Explorer Search Plug-in requirements, 312enabling, 310enabling requirements, 3

Seite 340 - 340 Generating reports

configure, 74remote LDAP server, configure, 64requirements, 64LDAP ID mappingconfigure, 70use with Active Directory, 66Linux static user mapping, 104L

Seite 341

remove WORM attribute, 284set or remove legal hold, 283file states, 274hard links, 292import metadata, 298legal holds, 283metadata service, 294on-dema

Seite 342

client application, 176creating shares, 176data retention, 177features, 175object mode, 203share types, 174uses, 175subscription service, HP, 398Ttech

Seite 343 - Category descriptions

Viewing physical volume informationThe following command lists detailed information about physical volumes:ibrix_pv -iFor each physical volume, the ou

Seite 344

DescriptionFieldFree (unallocated) space, in MB, available on this volume group.FREE(MB)Percentage of total space in the volume group allocated to log

Seite 345 - Log files

DescriptionFieldNumber of times the structure of the file system has changed (for example, new segmentswere added).GENNumber of file system segments.N

Seite 346

DescriptionFieldTime the audit report is run each day (for example, Daily at 02:00 AM)Audit Report ScheduleThe expiration limit for audit reports (for

Seite 347

• .audit• .webdav1There are a few exceptions in the .archiving directory. Some files in this directory are createdfor user consumption in certain subd

Seite 348

On the CLI, use the ibrix_fs command to extend a file system. Segments are added to the fileserving nodes in a round-robin manner. If tiering rules ar

Seite 349

IMPORTANT: Rebalancing is a storage and file system intensive process which, in somecircumstances, can take days to complete. Rebalancing tasks are be

Seite 350 - Defining exclusions

The Rebalance All dialog box allows you to rebalance all segments in the file system or in theselected tier.The Rebalance Advanced dialog box allows y

Seite 351

Rebalancing segments from the CLITo rebalance all segments, use the following command. Include the -a option to run the rebalanceoperation in analytic

Seite 352 - Managing Antivirus scans

SMB shares...87Creating SMB sh

Seite 353 - Managing Antivirus scans 353

Viewing the status of rebalance tasksUse the following commands to view status for jobs on all file systems or only on the file systemsspecified in FS

Seite 354 - Viewing an active task

For example, to delete segments ilv1 and ilv2:ibrix_lv -d -s ilv1,ilv2To delete volume groups:ibrix_vg -d -g VGLISTFor example, to delete volume group

Seite 355 - Viewing Antivirus statistics

NOTE: During an ibrix_fsck run, an INFSCK flag is set on the file system to protect it. If anerror occurs during the job, you must explicitly clear th

Seite 356

Troubleshooting file systemsDeleting file systems that are enabled for data retentionWhen you delete a file system that is enabled for data validation

Seite 357

filter = [ "a|^/dev/sd.*|", "r|^.*|" ]Contact HP Support if you need assistance.Cannot mount on a StoreAll clientVerify the follow

Seite 358

1. Identify the file serving node that owns the segment. This information is reported on theFilesystem Segments panel on the Management Console.2. Run

Seite 359 - Managing software snapshots

host_name ... ib50-87 <-- Verify owner of segment ref_counter ... 1038 state_flags ...

Seite 360

Segment evacuation task might fail after an upgradeAfter upgrading the StoreAll operating system, the segment evacuation task might fail with themessa

Seite 361 - Accessing snapshots using SMB

5 Using NFSTo allow NFS clients to access a StoreAll file system, the file system must be exported. You canexport a file system using the GUI or CLI.

Seite 362 - Deleting snapshots

3. On the Settings window, enter or select the following:• The clients allowed to access the share• The permission level for the clients• The privileg

Seite 363

Downloading an object from a container...148Viewing the contents of a contain

Seite 364 - Deleting snap trees

4. On the Advanced Settings window, you can select additional options on the NFS share. Whenfinished making selections, click Next.60 Using NFS

Seite 365 - Backing up snapshots

5. On the Host Servers window, select the servers that will host the NFS share. By default, theshare is hosted by all servers that have mounted the fi

Seite 366 - Backups with the tar utility

files with the same name but different case might be confusing, and the Windows users may beable to access only one of the files.CAUTION: The case ins

Seite 367 - 21 Creating block snapshots

To set case insensitivity from the CLI, use the ibrix_caseinsensitive command. To view taskinformation related to case insensitivity, use the ibrix _t

Seite 368 - 368 Creating block snapshots

6 Configuring authentication for SMB, FTP, and HTTPOverviewStoreAll software supports several services for authenticating users accessing shares on St

Seite 369 - Planning for snapshots

sh /opt/likewise/bin/gen_ldap-lwtools.sh ldap-conf.conf -nIf the configuration looks correct, run the command with added security by removing all temp

Seite 370 - Automated block snapshots

Required attributes for templatesDescriptionValueNonvirtual attributenameHelps identify the configuration version uploaded. Potentiallyused for report

Seite 371 - Automated block snapshots 371

IMPORTANT: If the user’s primary group in AD is not resolved to a GID number from either ActiveDirectory or LDAP, the user will be denied access to St

Seite 372 - Creating a snapshot scheme

7. Verify that NIS has been configured by running to the following command to list the usersfrom the NIS passwd map:[root@ib14-1 ~]# ypcat passwd nisu

Seite 373

NOTE: CIFS in the GUI has not been rebranded to SMB yet. CIFS is just a different name forSMB.The wizard displays the window that corresponds to the o

Seite 374 - Managing block snapshots

Delete Container...215Set Container Permiss

Seite 375

Linux static use mapping is optional. Do one of the following:IMPORTANT: See “ID Mapping Name Service Selection” (page 70) for information about enabl

Seite 376 - 376 Creating block snapshots

Enter the required name service in this field . Supported name services are NIS, FILES, andLDAP.1st Name ServiceIf more than one name service is requi

Seite 377 - 22 Using data tiering

LDAP ID MappingIf LDAP ID mapping is enabled and the system cannot locate a UID/GID in Active Directory, itsearches for the UID/GID in LDAP.On the LDA

Seite 378 - Manage tier

NIS ID MappingWhen case insensitive match is enabled, the NIS service will search for a matching case namethrough the Max Entries limit and use that n

Seite 379 - Tiering policy

LDAPTo configure LDAP as the primary authentication mechanism for SMB shares, enter the server nameor IP address of the LDAP server host and the passw

Seite 380 - 380 Using data tiering

Enter the following information in the remaining fields:Enter the LDAP user account used to authenticate to the LDAP server to read data, such ascn=hp

Seite 381 - Tiering schedule

When finished, click OK to return to the LDAP window in the wizard. Click Next on the LDAPwindow to continue.Local GroupsNOTE: If Local Users and Grou

Seite 382 - Data tiering schedule

Local UsersNOTE: If Local Users and Groups is the primary authentication service, Windows clients such asExplorer or MMC plug-ins cannot be used to ad

Seite 383

Local Users dialog boxTo provide account information for the user, click Advanced, which opens the Local Users (1st)dialog box.78 Configuring authenti

Seite 384 - Viewing data tiering rules

Enter the following information for the user and click OK when finished.Enter the UID for this account. If you do not enter a value, the system will a

Seite 385 - Additional rule examples

Pausing or resuming a replication task...259Stopping a replication task..

Seite 386 - Running a migration task

To add an Active Directory or LDAP share administrator, enter the administrator name (such asdomain\user1 or domain\group1) and click Add to add the a

Seite 387 - Writing tiering rules

You cannot change the UID or RID for a Local User account. If it is necessary to change a UID orRID, first delete the account and then recreate it wit

Seite 388 - Rule attributes

NOTE: The following command is displayed on two lines, but the command should beentered on one line:sh /usr/local/ibrix/bin/set_provider_loadorder \ -

Seite 389 - Migration rule examples

Configuring delegated users for an Active Directory domainIf you are adding delegated users to an Active Directory (AD) domain and the DNS host namesd

Seite 390 - Ambiguous rules

4. On the Permissions window of the wizard:1. Select General in the Show these permissions box.2. In the Permissions box, select the following:• Reset

Seite 391 - 23 Using file allocation

6. Click Finish to close the wizard.NOTE: If the host is already in Active Directory and you are unable to join users due to anACCESS_DENIED error, de

Seite 392

7 Using SMBThe SMB server implementation allows you to create file shares for data stored on the cluster. TheSMB server provides a true Windows experi

Seite 393

appropriate server. Select CIFS in the lower Navigator to display the CIFS panel, which showsSMB activity statistics on the server. You can start, sto

Seite 394 - Setting segment preferences

Everyone user may have more access rights than necessary. The administrator should set ACLson the SMB share to ensure that users have only the appropr

Seite 395

◦ SE_RESTORE_PRIVILEGE◦ SE_TAKE_OWNERSHIP_PRIVILEGESee the Microsoft documentation for more information about these privileges.Creating SMB shares wit

Seite 396 - 396 Using file allocation

Enabling EQWSI on a pre-existing HTTP share...310Requirements for creating a Windows

Seite 397 - Listing allocation policies

4. On the Permissions window, specify permissions for users and groups allowed to access theshare.Click Add to open the New User/Group Permission Entr

Seite 398 - Subscription service

• To modify permissions for an existing user or group, select the appropriate entry from theUser/Group Entries list and click Modify. You can then cha

Seite 399 - 25 Documentation feedback

Click Add to open the New Client IP Address Entry dialog box, where you can allow or denyaccess to a specific IP address or a range of addresses. Ente

Seite 400 - Glossary

6. On the Advanced Settings window, you can set the following options:• Access Based Enumeration: When enabled (on), users can only see the files and

Seite 401

8. The Summary window shows the configuration for the CIFS share. You can go back and revisethe configuration if necessary. When you click Finish, the

Seite 402 - 402 Index

When configuring SMB signing, note the following:• SMB2 is always enabled.• Use the Required check box to specify whether SMB signing (with either SMB

Seite 403

On the CIFS Shares panel, click Add or Modify to open the File Shares wizard, where you cancreate a new share or modify the selected share.Click Delet

Seite 404 - 404 Index

NOTE: You cannot create an SMB share with a name containing an exclamation point (!) or anumber sign (#) or both.Use the -A ALLOWCLIENTIPSLIST or -E D

Seite 405

Shell: /bin/shHome dir: /home/local/IB/testuser1Logon restriction: NODo a reverse lookup with the UID by entering the following command:[root@ibrix01a

Seite 406 - 406 Index

In this command:• The -m option specifies we are going to modify the setting.• The -s option specifies the resource name of the share.• The -D option

Kommentare zu diesen Handbüchern

Keine Kommentare