Hp StoreAll Storage User Manual

Browse online or download User Manual for Storage Hp StoreAll Storage. HP StoreAll Storage User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 254
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
HP IBRIX 9000 Storage File System User
Guide
Abstract
This guide describes how to configure and manage IBRIX software file systems and how to use NFS, SMB, FTP, and HTTP to
access file system data. The guide also describes the following file system features: quotas, remote replication, snapshots, data
retention and validation, data tiering, and file allocation. The guide is intended for system administrators managing 9300
Storage Gateway, 9320 Storage, 9720 Storage, and 9730 Storage. For the latest IBRIX guides, browse to
nl
http://www.hp.com/support/IBRIXManuals.
HP Part Number: TA768-96076
Published: December 2012
Edition: 9
Page view 0
1 2 3 4 5 6 ... 253 254

Summary of Contents

Page 1 - Abstract

HP IBRIX 9000 Storage File System UserGuideAbstractThis guide describes how to configure and manage IBRIX software file systems and how to use NFS, SM

Page 2

(Specifically, a segment need not be a complete, rooted directory tree). Segments can be anysize and different segments can be different sizes.2. The

Page 3 - Contents

On the Host Servers page, select the servers that will host the configuration profile.100 Using FTP

Page 4 - 4 Contents

On the Settings page, configure the FTP parameters that apply to the share. The parameters areadded to the file serving nodes hosting the configuratio

Page 5 - Contents 5

To define permissions for a user, click Add to open the Add User to Share dialog box.Managing the FTP configurationSelect File Shares > FTP from th

Page 6 - 6 Contents

Use the buttons on the panels to modify or delete the selected configuration profile or share. Youcan also add another FTP share to the selected confi

Page 7 - Contents 7

Modify a configuration profile:ibrix_ftpshare -m SHARENAME –c PROFILENAME [-f FSNAME -p dirpath] -IIP-Address:Port [–u USERLIST] [-S SETTINGLIST]Delet

Page 8 - 8 Contents

Accessing sharesClients can access an FTP share by specifying a URL in their browser (Internet Explorer or MozillaFirefox). In the following URLs, IP_

Page 9 - File system operations

Table 3 Download a file by using the FTP protocolCommandUse this command when...curl ftp://IP_address/pub/server.pem -o<path to download>\<fi

Page 10

Table 6 Upload a file by using the FTPS protocol for local userCommandUse this command when...curl --ftp-ssl-reqd --cacert <certificatefile> -T

Page 11 - Configuring file systems

9 Using HTTPThe HTTP feature allows you to create HTTP file shares for data stored on the cluster. Clients accessthe HTTP shares using standard HTTP a

Page 12 - Accessing file systems

NOTE: Some of the steps listed in the following table only apply to HTTP-StoreAll REST API shares.If you are creating standard HTTP shares, you can sk

Page 13 - Creating a file system

1) The segment server initiating the operation can read files directly from the segmentacross the SAN; this is called a SAN READ.2) The segment server

Page 14

On the GUI, select File Shares from the Navigator to open the File Shares panel, and then clickAdd to start the Add New File Share Wizard. On the File

Page 15 - Creating a file system 15

The Host Servers dialog box displays differently whether you selected a previous profile or youare create a new one. If you selected the option Create

Page 16

If you selected an existing profile on the Config Profile dialog box, you are shown the hosts definedfor that profile, as shown in the following figur

Page 17 - Creating a file system 17

If you already have Vhosts defined, you can select an existing Vhost from theOn the Settings page, set the appropriate parameters for the share. Note

Page 18

On the Users page, specify the users to be given access to the share.IMPORTANT: Ensure that all users who are given read or write access to shares hav

Page 19 - File limit for directories

To allow specific users read access, write access, or both, click Add. On the Add Users to Sharedialog box, assign the appropriate permissions to the

Page 20

The users will see an index of the share (if the browsable property of the share is set to true), andcan open and save files. For more information abo

Page 21 - CLI procedures

ibrix_httpconfig –a profile1 –h node1,node2 -S“wblocksize=<value>,rblocksize=<value>”You can also set the values on the Modify HTTP Profil

Page 22 - Unmounting a file system

Managing the HTTP configurationView a configuration profile:ibrix_httpconfig -i PROFILENAME [-v level]Modify a configuration profile:ibrix_httpconfig

Page 23 - Windows IBRIX 9000 clients

Accessing sharesClients access an HTTP share by specifying a URL in their browser (Internet Explorer or MozillaFirefox). In the following URLs, IP_add

Page 24 - Using Export Control

• Data retention and validation. Data retention ensures that files cannot be modified or deletedfor a specific retention period. Data validation scans

Page 25 - 3 Configuring quotas

• Download a file using HTTP protocol:curl -u <ADuser> http://IP_address/dils/urlpath -o path todownload>/<filename>/• Download a file

Page 26 - 26 Configuring quotas

• Create an SSL certificate. When using basic authentication to access WebDAV-enabled HTTPshares, SSL-based access is mandatory.• Verify that the host

Page 27

disconnected and re-mapped through Windows Explorer. The files are accessible on the file servingnode and through BitKinex.Use the following workaroun

Page 28 - 28 Configuring quotas

10 Managing SSL certificatesServers accepting FTPS and HTTPS connections typically provide an SSL certificate that verifies theidentity and owner of t

Page 29 - Using a quotas file

1. Generate a private key:openssl genrsa -des3 -out server.key 1024You will be prompted to enter a passphrase. Be sure to remember the passphrase.2. R

Page 30 - Format of the quotas file

Adding a certificate to the clusterTo add an existing certificate to the cluster, click Add on the Certificates panel. On the AddCertificate dialog bo

Page 31 - Using online quota check

Exporting a certificateIf necessary, you can display a certificate and then copy and save the contents for future use. Thisstep is called exporting. S

Page 32 - Deleting quotas

11 Using remote replicationThis chapter describes how to configure and manage the Continuous Remote Replication (CRR)service.NOTE: Keep in mind that w

Page 33 - Troubleshooting quotas

Run-once replication. This method replicates a single directory sub-tree or an entire file system fromthe source file system to the target file system

Page 34 - 4 Maintaining file systems

• A cluster can be a target for multiple replication tasks. For example, C1 can replicate /c1ifs1to C3:/c3ifs1/target1 and C2 can replicate /c2ifs1 to

Page 35 - # ibrix_pv -i

2 Creating and mounting file systemsThis chapter describes how to create file systems and mount or unmount them.Creating a file systemYou can create a

Page 36

a mapping between the source cluster and the target export that receives the replicated data.This mapping ensures that only the specified source clust

Page 37

If the remote cluster is running an earlier version of IBRIX software, you will be asked to enter theclustername for the remote cluster. This name app

Page 38 - Lost+found directory

1. Register the source and target clusters with each other using the ibrix_cluster -rcommand if needed. To list the known remote clusters, run ibrix_c

Page 39 - Extending a file system

When specifying resources, note the following:• Specify servers by their host name or IP address (use commas to separate the names or IPaddresses). A

Page 40 - How rebalancing works

Select a report from the CRR Health Reports dialog box and click OK to see details about thatreplication task.If the health check finds an issue in th

Page 41

List reports:ibrix_crrhealth -lShow details for a report:ibrix_crrhealth –i –n REPORTNAMETo see other reports for a specific task, expand Active Tasks

Page 42 - 42 Maintaining file systems

Source Settings dialog box for continuous replicationsFor continuous replications, the Source Settings dialog box lists the file system selected on th

Page 43

If you are replicating a snapshot, click Use a snapshot and then select the appropriate Snap Treeand snapshot.Target Settings dialog boxFor replicatio

Page 44 - Deleting a file system

For replications to the same cluster and different file system, the Target Settings dialog box asksfor the target file system. Optionally, you can als

Page 45

Configuring and managing replication tasks from the CLINOTE: When configuring replication tasks, be sure to following the guidelines described in“Over

Page 46 - Troubleshooting file systems

WORM/Data Retention dialog box. If data retention will be used on the file system, enable it andset the retention policy. See “Managing data retention

Page 47

ibrix_crr –s -o –f srcFs –S a/b/c –C tcluster –F destFs –X 1/2/3 –Pa/b/cThe replication now goes to /destFs/1/2/3/a/b/c{contents_under_c}.Starting an

Page 48 - 48 Maintaining file systems

ibrix_crr -i [-f SRC_FSNAME] [-h HOSTNAME] [-C SRC_CLUSTERNAME]The following command prints detailed information about replication tasks matching the

Page 49

Troubleshooting remote replicationContinuous remote replication fails when a private network is usedContinuous remote replication will fail if the con

Page 50

12 Managing data retentionData retention is intended for sites that need to archive read-only files for business purposes, andensures that files canno

Page 51 - 5 Using NFS

Default retention period. If a specific retention period is not applied to a file, the file will be retainedfor the default retention period. The sett

Page 52 - 52 Using NFS

storage. A scheduled scan will quit immediately if it detects that a scan of the same file system isalready running.You can schedule periodic data val

Page 53 - Shares panel

Enable Data Validation. Check this option to schedule periodic scans on the file system. Use thedefault schedule, or select Modify to open the Data Va

Page 54 - Unexporting a file system

Auditing Options. Use this dialog box to enable auditing, if desired. to set the expiration scheduleand policy for audit log reports, to set the expir

Page 55

To enable data retention on an existing file system using the CLI, run this command:ibrix_fs -W -f FSNAME -o "retenMode=<mode>,retenDefPeri

Page 56 - Log files

ibrix_fs -i -f ifs1 FileSystem: ifs1========================= { … } RETENTION : Enterprise [default=15d,mininum=1d,maximum=5y]Cha

Page 57

You can configure the following:• Default retention period. This period determines whether you can manage WORM(non-retained) files as well as WORM-ret

Page 58

See the touch(1) documentation for the time/date formats allowed with the -d option. You canalso enter the following on a Linux command line to see th

Page 59

To administer files from the CLI, use the ibrix_reten_adm command.IMPORTANT: Do not use the ibrix_reten_adm command on a file system that is not enabl

Page 60

Setting or removing a legal holdWhen a legal hold is set on a retained or WORM file, the file cannot be deleted until the hold isreleased, even if the

Page 61

system is in Relaxed retention mode (not Enterprise), the exact date/time can be in the past, inwhich case the file immediately expires from retention

Page 62 - LDAP ID mapping

Go to the Schedule tab to specify when you want to run the scan.Starting an on-demand validation scanYou can run a validation scan at any time. Select

Page 63

To start an on-demand validation scan from the CLI, use the following command:ibrix_datavalidation -s -f FSNAME [-d PATH]Viewing, stopping, or pausing

Page 64

KICKOFF_TIME=Wed Jul 18 05:18:12 2012STOP_TIME=Mon Jul 23 14:36:59 2012NUM_JOB_ERRORS=0NUM_FILES_VALIDATED=1000000NUM_FILES_SKIPPED=0NUM_CONTENT_INCON

Page 65 - Local Groups

3. Clean up the existing checksums.4. Start a new data validation scan on the entire file system to compute the checksums.File corruptionIf the checks

Page 66 - Local Users

The utilization report summarizes how storage is utilized between retention states and free space.The next example shows the first page of a utilizati

Page 67

If an error occurs during report generation, a message appears in red text on the report. Simplyrun the report again.Generating data retention reports

Page 68 - Windows Share Administrators

• Express Query. Check this option to enable StoreAll Express Query on the file system. ExpressQuery is a database used to record metadata state chang

Page 69 - Configuring LDAP

Using hard links with WORM filesYou can use the Linux ln command without the -s option to create a hard link to a normal(non-WORM) file on an retentio

Page 70 - Configuring LDAP ID mapping

retained file on the target cluster, or in environments where the filters on the target cluster aredifferent from the source cluster.• Data stream err

Page 71

13 Express QueryExpress Query provides a per-file system database of system and custom metadata, and audithistories of system and file activity. When

Page 72 - Delete a Local Group account:

The -F option forcefully stops the archiving daemons and disables database access to all filesystems enabled for Express Query. When you restart the s

Page 73 - 7 Using SMB

1. . Disable the express query feature for the file system, including the removal of any StoreAllRESTAPI shares. Disable auditing feature before you d

Page 74 - Monitoring SMB services

The options specify the following:DescriptionOptionsThe metadata configuration file. Use only this path and file name.--dbconfig/usr/local/Metabox/scr

Page 75 - SMB shares

The next command imports audit metadata exported by the ibrix_audit_reports command:MDimport –f target -t audit -nsimple_report_for_source_at_13415135

Page 76 - ◦ SE_TAKE_OWNERSHIP_PRIVILEGE

Managing auditingAuditing lets you:• Find out which events you have already captured in the Express Query database and controlwhat gets captured in re

Page 77 - SMB shares 77

Audit log reportsAudit log reports include metadata for selected file system events that occurred during a specifictime period. To generate an audit l

Page 78 - 78 Using SMB

The audit reports are in CSV (comma-separated) format and are placed in the following directory:<file_system_mountpoint>/.archiving/reportsThe f

Page 79 - SMB shares 79

Default File Shares dialog box. Use this dialog box to create an NFS export and/or an SMB shareat the root of the file system. The default settings ar

Page 80 - Configuring SMB signing

DescriptionFieldThe seconds and nanoseconds of that time, in UNIX epoch time, which is the number of secondssince the start of Jan 1, 1970 in UTC*time

Page 81 - SMB shares 81

the share name is displayed with its peer share name in parentheses in the share name column.For example, if you have a StoreAll REST API-enabled HTTP

Page 82 - 82 Using SMB

Metadata queriesYou can issue StoreAll REST API commands that query the pathname and custom and systemmetadata attributes for a set of files and direc

Page 83 - Connecting to cluster nodes

◦ Literal strings must be enclosed in single quotes. Non-escaped UTF-8 characters areallowed. Literals are case-sensitive. Any single quotes that are

Page 84 - 84 Using SMB

The version field is recommended, but not required. In the syntax descriptions, it is surrounded bysquare brackets to indicate that it is optional.Cha

Page 85 - Adding SMB shares

satisfied, the operation will not be allowed. Retention properties can never be assigned byanonymous users on anonymous shares, but they can be assign

Page 86 - 86 Using SMB

If the local file does not exist, the response behavior depends on the client tool. In the case ofcurl, it returns an error message, such as the follo

Page 87 - Deleting SMB shares

The HTTP command is sent in the form of an HTTP DELETE request.HTTP syntaxThe HTTP request line format is:DELETE /<urlpath>/<pathname> HTT

Page 88

HTTP syntaxThe HTTP request line format is:NOTE: Enter the following commands on a single line.PUT commandPUT /<urlpath>[/<pathname>]?[ver

Page 89 - Assigning attributes

Delete custom metadataThis command removes one or more metadata attributes from an existing file or directory in theHTTP share. Up to 15 metadata attr

Page 90 - 90 Using SMB

The Data Retention tab allows you to change the data retention configuration. The file system mustbe unmounted. See “Configuring data retention on exi

Page 91 - 99.30.8.24

System and custom metadataTwo types of metadata are supported for queries, and both can be referenced in the same query:• System metadata applies to a

Page 92 - SMB clients

WriteableExampleDescriptionTypeSystem attribute (key)noThe date/time recordedin the atime field of thenumericsystem::onDiskAtime• Query criteria(secon

Page 93 - Windows Clients Behavior

WriteableExampleDescriptionTypeSystem attribute (key)0x02: Retainednl0x04: (not used)nl0x08: Under legal holdThis attribute appliesonly to files, retu

Page 94 - 94 Using SMB

WriteableExampleDescriptionTypeSystem attribute (key)that the last activityon this file was asystem::lastActivityTime,which is a combinationof the fol

Page 95 - New directories and files

system::modeThe following system::mode bits are defined (in octal):0140000 socket0120000 symbolic link0100000 regular file0060000 block device

Page 96 - Troubleshooting SMB

The skip and top parameters can be combined. For example, supplying both skip=100 andtop=2000 returns records 101 through 2100. By combining these two

Page 97 - Troubleshooting SMB 97

DescriptionParameter> (greater than)>= (greater than or equal to)Only for custom attributes and string-valued system attributes (for example,sys

Page 98 - 8 Using FTP

"system::lastChangedTime" : 1346896235.000000000, "system::lastModifiedTime" : 1346895753.000000000, "system::rete

Page 99 - Managing FTP from the GUI 99

This example queries all files in the lab/images subdirectory of the ibrix_share1 HTTP share,in addition to the files in all subdirectories, recursive

Page 100 - 100 Using FTP

curl -g "http://99.226.50.92/ibrix_share1/lab/images/?attributes=custom::*&query=physician~'^S.*'&recurse"This example que

Page 101 - Managing FTP from the GUI 101

In the commands, the –t option specifies a tier. TIERNAME can be any alphanumeric, case-sensitive,text string. Tier assignment is not affected by othe

Page 102 - 102 Using FTP

PUT/<urlpath>/<pathname>?assign=[system::retentionExpirationTime=<retentionExpirationTime>][,system::worm='true'] HTTP/1.1

Page 103 - Managing FTP from the CLI

Example: Set a file to WORM and retained with a retention expiration date/timecurl -g –X PUT"https://99.226.50.92/ibrix_share1/lab/images/xyz.jpg

Page 104 - The vsftpd service

14 Configuring Antivirus supportThe IBRIX Antivirus feature can be used with supported Antivirus software, which must be run onsystems outside the clu

Page 105 - Accessing shares

On the CLI, use the ibrix_avconfig command to configure Antivirus support. Use the ibrix_avcommand to update Antivirus definitions or view statistics.

Page 106

To remove an external virus scan engine from the configuration, select that system on the VirusScan Engines panel and click Delete.To add an external

Page 107

NOTE: All virus scan engines should have the same virus definitions. Inconsistencies in virusdefinitions can cause files to be rescanned.Be sure to co

Page 108 - 9 Using HTTP

Defining protocol-specific policiesFor certain file sharing protocols (currently only SMB/CIFS), you can specify the file operationsthat trigger a sca

Page 109 - Managing HTTP from the GUI

1. Select an appropriate AV-enabled file system from the list.2. Click Exclusion on the AV Enable/Disable Filesystem panel.3. On the Exclusion dialog

Page 110 - 110 Using HTTP

5. Select the appropriate type of rule:• Inherited Rule/Remove Rule. Use this option to reset or remove exclusions that wereexplicitly set on the chil

Page 111

ibrix_avconfig -l -E -f FSNAME -P DIR_PATHRemove all exclusions from a directory:ibrix_avconfig -r -E -f FSNAME -P DIR_PATHManaging Antivirus scansYou

Page 112 - 112 Using HTTP

© Copyright 2009, 2012 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP required for possession, use or

Page 113

mounted the file system, the name of the mountpoint, the access (RW or RO) allowed to the host,and whether the file system is mounted.To mount or remo

Page 114 - 114 Using HTTP

4. Complete the Scan Settings tab on the New Antivirus Scan Task dialog box. Specify thedirectory path to be scanned and the maximum number of hours (

Page 115

Viewing, pausing, resuming, or stopping Antivirus scan tasksViewing an active taskTo view an active scan task on a file system, select the file system

Page 116 - 116 Using HTTP

CLI commands for viewing, stopping or Pausing Antivirus scansOn the CLI, use the following commands to view, stop, pause, or resume Antivirus scans.Vi

Page 117 - Managing HTTP from the CLI

Limitation 1: When the following sequence of events occurs:• A virus file is created inside the snap root• A snap is taken• The original file is renam

Page 118 - 118 Using HTTP

15 Creating IBRIX software snapshotsThe IBRIX software snapshot feature allows you to capture a point-in-time copy of a file system ordirectory for on

Page 119

To enable a directory tree for snapshots, click Add on the Snap Trees panel.You can create a snapshot directory tree for an entire file system or a di

Page 120 - 120 Using HTTP

Modifying a snapshot scheduleYou can change the snapshot schedule at any time. On the Snap Trees panel, select the appropriatesnap tree, select Modify

Page 121 - Troubleshooting HTTP

To take a snapshot from the CLI, use the following command:ibrix_snap -c -f FSNAME -P SNAPTREEPATH -n NAMEPATTERNSNAPTREEPATH is the full directory pa

Page 122 - 122 Using HTTP

2011-06-01T140000_hourly 2011-06-01T220000_hourly 2011-06-02T060000_hourly2011-06-01T150000_hourly 2011-06-01T230000_hourly 2011-06-02T070000_hour

Page 123 - 10 Managing SSL certificates

to copy files from the snapshot directory to a local or remote directory (see “Starting a replicationtask ” (page 135)).Deleting snapshotsScheduled sn

Page 124 - 124 Managing SSL certificates

• nodquotstatfs: Disable file system reporting based on directory tree quota limits• path: For IBRIX 9000 clients only, mount on the specified subdire

Page 125

Select New on the Task Summary panel to open the New Snapshot Space Reclamation Task dialogbox.On the General tab, select a reclamation strategy:• Max

Page 126 - Deleting a certificate

To stop a running reclamation task, click Stop on the Task Summary panel.Managing reclamation tasks from the CLITo start a reclamation task from the C

Page 127 - 11 Using remote replication

Moving files between snap treesFiles created on, copied, or moved to a snap tree directory can be moved to any other snap treeor non-snap tree directo

Page 128 - 128 Using remote replication

16 Creating block snapshotsThe block snapshot feature allows you to capture a point-in-time copy of a file system for onlinebackup purposes and to sim

Page 129

NOTE: If the snapshot store is too small, the snapshot will eventually exceed the available space(unless you detect this and manually increase storage

Page 130 - GUI procedure

The type of storage array determines the maximum number of snapshots you can keep and mountper file system.Maximum number of snapshots to mountMaximum

Page 131 - CLI procedure

Under Snapshot Configuration, select New to create a new snapshot scheme. The Create SnapshotScheme dialog box appears.216 Creating block snapshots

Page 132 - Creating the target export

On the General tab, enter a name for the strategy and then specify the number of snapshots tokeep and mount on a daily, weekly, and monthly basis. Kee

Page 133 - Viewing replication tasks

For either template, enter one or more of the following variables. The variables must be enclosedin braces ({ }) and separated by underscores (_). The

Page 134 - 134 Using remote replication

ibrix_vs_snap_strategy -c -n NAME -k KEEP -m MOUNT [-N NAMESPEC] [-M MOUNTSPEC]The options are:The name for the snapshot scheme.-n NAMEThe number of s

Page 135 - Starting a replication task

To delete a mountpoint from specific hostgroups, use the following command:ibrix_mountpoint -d -g GROUPLIST -m MOUNTPOINTViewing mountpoint informatio

Page 136 - Settings dialog box

To see details about a specific automated snapshot scheme, use the following command:ibrix_vs_snap_strategy -i -n NAMEDeleting an automated snapshot s

Page 137 - Target Settings dialog box

Viewing snapshot informationUse the following commands to view snapshot information from the CLI.Listing snapshot information for all hostsThe ibrix_v

Page 138 - Stopping a replication task

The following table lists the output fields for ibrix_vs_snap -i.DescriptionFieldSnapshot segment number.SEGMENTThe file serving node that owns the sn

Page 139

The next window shows an SMB client accessing the snapshot file system .fs1_snap1. Theoriginal file system is mapped to drive X.Accessing snapshot fil

Page 140 - 140 Using remote replication

Troubleshooting block snapshotsSnapshot reserve is full and the MSA2000 is deleting snapshot volumesWhen the snapshot reserve is full, the MSA2000 wil

Page 141

17 Using data tieringA data tier is a logical grouping of file system segments. After creating tiers containing the segmentsin the file system, you ca

Page 142 - 142 Using remote replication

For a new tier, on the Manage Tier dialog box, choose Create New Tier, enter a name for the tier,and select one or more segments to be included in the

Page 143 - 12 Managing data retention

You can work on only one tier at a time. However, when you click Next, you will be asked if youwant to manage more tiers. If you answer Yes, the Manag

Page 144 - Data validation scans

To add a new tiering policy, click New. On the New Data Tiering Policy dialog box, select thesource and destination tiers. Initially RuleSet1 is empty

Page 145 - New file systems

The Tiering Schedule dialog box lists all executed and running migration tasks. Click New to adda new schedule, click Edit to reschedule the selected

Page 146 - 146 Managing data retention

Linux IBRIX 9000 clientsTo mount a file system locally, use the following command on the Linux 9000 client. A FusionManager name (fmname) is required

Page 147

Viewing tier assignments and managing segmentsOn the GUI, select Filesystems from the Navigator and select a file system in the Filesystems panel.In t

Page 148 - 148 Managing data retention

Usassign a segment from a tier: Select the file system from the Filesystems panel and expandSegments in the lower Navigator to list the tiers in the f

Page 149 - Setting the atime

Additional rule examplesThe following rule migrates all files from Tier2 to Tier1:name="*"The following rule migrates all files in the subtr

Page 150 - File administration

Click Details to see summary information about the task.Configuring tiers and migrating data using the CLIUse the ibrix_tier command to manage tier as

Page 151 - Specifying path lists

NOTE: Be sure to spell the name of the tier correctly when you add segments to an existing tier.If you spell the name incorrectly, a new tier is creat

Page 152 - Changing a retention period

========FS Name Id Rule Source Tier Destination Tier------- -- --------------------------- ----------- --------

Page 153 - Running data validation scans

Avg Mb Per Sec : 16 Number of errors : 0Stopping a migration taskTo stop a migration task, use the following command:ibrix_

Page 154 - 154 Managing data retention

Note the following:• Tiering rules are based on individual file attributes.• All rules are executed when the tiering policy is applied during executio

Page 155

Rule keywordsThe following keywords can be used in rules.DescriptionKeywordAccess time, used in a rule as a fixed or relative time.atimeChange time, u

Page 156 - Checksum corruption:

The following example uses the path keyword. It moves files greater than or equal to 5M that areunder the directory /ifs2/tiering_test from TIER1 to

Page 157 - File corruption

To see all access entries that have been created, use the following command:ibrix_exportfs –c –lTo remove an access entry, use the following command:i

Page 158 - 158 Managing data retention

18 Using file allocationThis chapter describes how to configure and manage file allocation.OverviewIBRIX software allocates new files and directories

Page 159

Standard segment preferences and allocation policiesCommentDescriptionNameThis is the default segment preference. It is suitablefor most use cases.Pre

Page 160 - Using remote replication

An IBRIX 9000 client or IBRIX file serving node (referred to as “the host”) uses the followingprecedence rules to evaluate the file allocation setting

Page 161

Setting file and directory allocation policies from the CLIAllocation policy names are case sensitive and must be entered as uppercase letters (for ex

Page 162 - 13 Express Query

Creating a pool of preferred segments from the CLIA segment pool can consist of individually selected segments, all segments local to a file servingno

Page 163

Tuning allocation policy settingsTo optimize system performance, you can globally change the following allocation policy settingsfor a file system:• F

Page 164 - 164 Express Query

HOSTNAME FSNAME POLICY STARTSEG DIRPOLICY DIRSEG SEGBITS READAHEAD PREALLOC HWM SWMmak01.hp.com ifs1 RANDOM 0 NONE 0

Page 165 - Saving audit journal metadata

19 Support and other resourcesContacting HPFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore con

Page 166 - 166 Express Query

20 Documentation feedbackHP is committed to providing documentation that meets your needs. To help us improve thedocumentation, send any errors, sugge

Page 167 - Managing auditing

GlossaryACE Access control entry.ACL Access control list.ADS Active Directory Service.ALB Advanced load balancing.BMC Baseboard Management Configurati

Page 168 - Audit log reports

3 Configuring quotasQuotas can be assigned to individual users or groups, or to a directory tree. Individual quotaslimit the amount of storage or the

Page 169

SELinux Security-Enhanced Linux.SFU Microsoft Services for UNIX.SID Secondary controller identifier number.SMB Server Message Block. The protocol used

Page 170 - StoreAll REST API

IndexSymbols/etc/likewise/vhostmap file, 91AActive Directoryconfigure, 62configure from CLI, 69Linux static user mapping, 87synchronize with NTP serve

Page 171 - Component overview

EExport Control, enable, 17, 24Express Queryexport metadata, 164HTTP-StoreAll REST API shares., 109import metadata, 165save audit metadata, 165Ffile a

Page 172 - Metadata queries

create from CLI, 21delete, 21view, 20, 22NNew Filesystem Wizard, 13NFScase-insensitive filenames, 54configure NFS server threads, 51export file system

Page 173 - Optional version parameter

SMB signing, 80start or stop SMB service, 73troubleshooting, 96SMB server consolidation, 90SMB sharesadd with MMC, 85configure with GUI, 76delete with

Page 174 - API date formats

To change the quotas configuration, click Modify on the Quota Summary panel.On the CLI, run the following command to enable quotas on an existing file

Page 175 - File content transfer

The User Quotas dialog box is used to create, modify, or delete quotas for users. To add a userquota, enter the required information and click Add. Us

Page 176 - Delete a file

quotas for a group, check the box preceding that group. You can then adjust the quotas as needed.To delete quotas for a group, check the box and click

Page 177 - Custom metadata assignment

summaryConfiguring quotas from the CLIIn the commands, use -M SOFT_MEGABYTES and -m HARD_MEGABYTES to specify soft and hardlimits for the megabytes of

Page 178

Contents1 Using IBRIX software file systems...9File system operations...

Page 179

From the CLI, use the following command to import quotas from a file, where PATH is the path tothe quotas file:ibrix_edquota -t -p PATH -f FSNAMESee “

Page 180 - System metadata available

{id}The UID for a user quota or the GID for a group quota.{name}A user name, group name, or directory tree identifier.{path}The full path to the direc

Page 181

The Task Summary panel displays the progress of the scan. If necessary, select Stop to stop thescan.To run an online quota check in FILESYSTEM_SCAN mo

Page 182

Troubleshooting quotasRecreated directory does not appear in directory tree quotaIf you create a directory tree quota on a specific directory and dele

Page 183

4 Maintaining file systemsThis chapter describes how to extend a file system, rebalance segments, delete a file system or filesystem component, and ch

Page 184 - Pagination

Viewing physical volume informationThe following command lists detailed information about physical volumes:ibrix_pv -iFor each physical volume, the ou

Page 185 - HTTP syntax

DescriptionFieldFree (unallocated) space, in MB, available on this volume group.FREE(MB)Percentage of total space in the volume group allocated to log

Page 186 - JSON response format

DescriptionFieldNumber of times the structure of the file system has changed (for example, new segmentswere added).GENNumber of file system segments.N

Page 187 - Example queries

DescriptionFieldPossible segment numbers for root segment replicas. This value is used internally.Root Segment Replica(s) HintSnapshot strategy, if de

Page 188 - 188 Express Query

Viewing disk space information from a Linux 9000 clientBecause file systems are distributed among segments on many file serving nodes, disk space util

Page 189

Analyzing the integrity of a file system on all segments...46Clearing the INFSCK flag on a fil

Page 190

On the CLI, use the ibrix_fs command to extend a file system. Segments are added to the fileserving nodes in a round-robin manner. If tiering rules ar

Page 191 - HTTP Status Codes

segments, and then moves files from sources to destinations to bring each candidate source segmentas close as possible to the calculated utilization t

Page 192

The Rebalance All dialog box allows you to rebalance all segments in the file system or in theselected tier.The Rebalance Advanced dialog box allows y

Page 193

Rebalancing segments from the CLITo rebalance all segments, use the following command. Include the -a option to run the rebalanceoperation in analytic

Page 194

Viewing the status of rebalance tasksUse the following commands to view status for jobs on all file systems or only on the file systemsspecified in FS

Page 195

For example, to delete segments ilv1 and ilv2:ibrix_lv -d -s ilv1,ilv2To delete volume groups:bin/ibrix_vg -d -g VGLISTFor example, to delete volume g

Page 196 - Defining exclusions

NOTE: During an ibrix_fsck run, an INFSCK flag is set on the file system to protect it. If anerror occurs during the job, you must explicitly clear th

Page 197

1. Disable the Express Query and auditing feature for the file system, including the removal ofany StoreAll REST API (also known as IBRIX Object API)

Page 198

NFS clients cannot access an exported file systemAn exported file system has been unmounted from one or more file serving nodes, causing IBRIXsoftware

Page 199 - Managing Antivirus scans

verify segment maps by comparing the file system generation numbers and the ownership for thosesegments being rejected by the clients.Use the followin

Page 200

How the SMB server handles UIDs and GIDs...94Permissions, UIDs/GIDs, and ACLs...

Page 201 - Viewing an active task

node issue. If a state flag is stale or indicates that a segment is in migration, call HP Support fora recovery procedure.Otherwise, the alert indicat

Page 202 - Viewing Antivirus statistics

5 Using NFSTo allow NFS clients to access an IBRIX file system, the file system must be exported. You canexport a file system using the GUI or CLI. By

Page 203

Use the Settings window to specify the clients allowed to access the share. Also select the permissionand privilege levels for the clients, and specif

Page 204

On the Host Servers window, select the servers that will host the NFS share. By default, the shareis hosted by all servers that have mounted the file

Page 205

Export a file system using the CLITo export a file system from the CLI, use the ibrix_exportfs command:ibrix_exportfs -f FSNAME -h HOSTNAME -p CLIENT1

Page 206 - Managing software snapshots

Before enabling the case-insensitive feature, be sure the following requirements are met:• The file system or directory must be created under the IBRI

Page 207 - [root@9000n1 .snapshot]# ls

Log filesA new task is created when you change case insensitivity or query its status recursively. A log fileis created for each task and an ID is ass

Page 208 - Accessing snapshots using SMB

• Remote replication• xcopy• robocopy• Restoring directories and folders from snapshotsThe case-insensitive setting of the source directories is not r

Page 209 - Deleting snapshots

6 Configuring authentication for SMB, FTP, and HTTPIBRIX software supports several services for authenticating users accessing shares on IBRIX filesys

Page 210

Using LDAP as the primary authentication methodRequirements for LDAP users and groupsIBRIX supports only OpenLDAP.Configuring LDAP for IBRIX softwareT

Page 211

Starting a remote replication task to a remote cluster...139Starting an intracluster remote r

Page 212 - Backing up snapshots

Required attributes for Samba/POSIX templatesDescriptionValueNonvirtual attributenameHelps identify the configuration version uploaded. Potentiallyuse

Page 213 - 16 Creating block snapshots

Click Authentication Wizard to start the wizard. On the Configure Options page, select theauthentication service to be applied to the servers in the c

Page 214 - Automated block snapshots

• Local Users. See “Local Users” (page 66).• Share Administrators. See “Windows Share Administrators” (page 68).• Summary. See “Summary” (page 68).Act

Page 215

Enter the following information on the dialog box:Enter the server name or IP address of the LDAP server host.LDAP Server HostEnter the LDAP server po

Page 216 - Scheme dialog box appears

Enter the following information in the remaining fields:Enter the LDAP user account used to authenticate to the LDAP server to read data, such ascn=hp

Page 217 - Automated block snapshots 217

NOTE: If LDAP is the primary authentication service, Windows clients such as Explorer or MMCplug-ins cannot be used to add new users.Local GroupsSpeci

Page 218 - 218 Creating block snapshots

NOTE: If Local Users and Groups is the primary authentication service, Windows clients such asExplorer or MMC plug-ins cannot be used to add new users

Page 219

To provide account information for the user, click Advanced. The default home directory is /home/<username> and the default shell program is /bi

Page 220 - 220 Creating block snapshots

NOTE: If Local Users and Groups is the primary authentication service, Windows clients such asExplorer or MMC plug-ins cannot be used to add new users

Page 221 - Viewing snapshot information

You cannot change the UID or RID for a Local User account. If it is necessary to change a UID orRID, first delete the account and then recreate it wit

Page 222

14 Configuring Antivirus support...192Adding or removing external virus scan engines...

Page 223

ibrix_ldapconfig -a -h LDAPSERVERHOST [-P LDAPSERVERPORT] -b LDAPBINDDN-p LDAPBINDDNPASSWORD -w LDAPWRITEOU -B LDAPBASEOFSEARCH -n NETBIOS -EENABLESSL

Page 224 - 224 Creating block snapshots

The LDAP bind Distinguished Name (the default is anonymous). For example:cn=hp9000-readonly-user,dc=entx,dc=net.-b LDAPBINDDNThe LDAP bind password.-p

Page 225 - 17 Using data tiering

ibrix_localgroups -l -g GROUPNAMEDelete a Local Group account:ibrix_localgroups -d -g GROUPNAME72 Configuring authentication for SMB, FTP, and HTTP

Page 226 - 226 Using data tiering

7 Using SMBThe SMB server implementation allows you to create file shares for data stored on the cluster. TheSMB server provides a true Windows experi

Page 227

appropriate server. Select CIFS in the lower Navigator to display the CIFS panel, which showsSMB activity statistics on the server. You can start, sto

Page 228 - 228 Using data tiering

The command output reports status as follows:ConditionHealth StatusAll monitored SMB services are up and runningUpThe lwio service is running but one

Page 229

◦ SE_MACHINE_ACCOUNT_PRIVILEGE◦ SE_MACHINE_VOLUME_PRIVILEGE◦ SE_RESTORE_PRIVILEGE◦ SE_TAKE_OWNERSHIP_PRIVILEGESee the Microsoft documentation for more

Page 230 - 230 Using data tiering

Click Add to open the New User/Group Permission Entry dialog box, where you can configurepermissions for a specific user or group. The completed entri

Page 231 - Viewing data tiering rules

Click Add to open the New Client UP Address Entry dialog box, where you can allow or denyaccess to a specific IP address or a range of addresses. Ente

Page 232 - Running a migration task

On the Host Servers page, select the servers that will host the share.SMB shares 79

Page 233 - Assigning segments to tiers

18 Using file allocation...240Overview...

Page 234 - Listing tiering rules

Configuring SMB signingThe SMB signing feature specifies whether clients must support SMB signing to access SMB shares.You can apply the setting to al

Page 235

To disable SMB signing, enter settingname= with no value. For example:ibrix_cifsconfig –t –S “smb signing enabled=,smb signing required="IMPORTAN

Page 236 - Writing tiering rules

Configuring and managing SMB shares with the CLIAdding, modifying, or deleting sharesUse the ibrix_cifs command to add, modify, or delete shares. For

Page 237 - Writing tiering rules 237

Managing user and group permissionsUse the ibrix_cifsperms command to manage share-level permissions for users and groups.Add a user or group to a sha

Page 238 - Migration rule examples

6. Click Close > OK to exit the dialogs.7. Expand Shared Folders (\\<address>).8. Select Shares and manage the shares as needed.Windows Vista

Page 239 - Ambiguous rules

6. Click OK to exit the Add or Remove Snap-ins window.7. Expand Shared Folders (\\<address>).8. Select Shares and manage the shares as needed.Sa

Page 240 - 18 Using file allocation

NOTE: The Browse button cannot be used to locate the file system.• The directory to be shared will be created if it does not already exist.• The permi

Page 241

To add a new share, select Shares > New Share and run the Create A Shared Folder Wizard. Onthe Folder Path panel, enter the path to the share, bein

Page 242 - 242 Using file allocation

You can also assign UIDs, GIDs, and other POSIX attributes such as the home directory, primarygroup and shell to users and groups in Active Directory.

Page 243 - Setting segment preferences

The next dialog box shows the properties for the gidNumber attribute.The following article provides more information about modifying attributes in the

Page 244 - 244 Using file allocation

1 Using IBRIX software file systemsFile system operationsThe following diagram highlights the operating principles of the IBRIX file system.The topolo

Page 245 - Listing allocation policies

Attributes tab. For users, you can set the UID, login shell, home directory, and primary group. Forgroups, set the GID.Synchronizing Active Directory

Page 246 - 246 Using file allocation

4. Create the new shares on the cluster storage and assign each share the appropriate path. Forexample, assign srv1-DATA to /srv1/data, and assign srv

Page 247 - Subscription service

SMB clientsSMB clients access shares on the IBRIX software cluster in the same way they access shares on aWindows server.Viewing quota informationWhen

Page 248 - 20 Documentation feedback

Access Control Lists (ACLs)IBRIX SMB shadow copy behaves in the same manner as Windows shadow copy with respect toACL restoration. When a user restore

Page 249 - Glossary

SMB shadow copy support. IBRIX software does not have any control over the behavior of otherclients.NOTE: HP recommends that the share root is not at

Page 250 - 250 Glossary

access to and security for Windows clients. The SMB server maintains the ACLs as requested bythe Windows clients, and emulates the inheritance of ACLs

Page 251

Working with new files and directoriesThe inheritance rules of Windows assume that all directories are created on a Windows machine,where they inherit

Page 252 - 252 Index

Robocopy errors occur during node failover or failbackIf Robocopy is in use on a client while a file serving node is failed over or failed back, theap

Page 253

8 Using FTPThe FTP feature allows you to create FTP file shares for data stored on the cluster. Clients accessthe FTP shares using standard FTP and FT

Page 254 - 254 Index

On the File Share page, select FTP as the File Sharing Protocol. Select the file system, which mustbe mounted, and enter the default directory path fo

Comments to this Manuals

No comments