HP StorageWorksX9000 File Serving Software File SystemUser GuideAbstractThis guide describes how to configure and manage X9000 Software file systems a
attributes such as such as modification time, access time, file size, or file type. See “Usingdata tiering” (page 108).• File allocation. This feature
For either template, enter one or more of the following variables. The variables must be enclosedin braces ({ }) and separated by underscores (_). The
To create the schedule for the automated snapshots, go to the Schedule tab and click Schedule thistask (or run now). You can set the frequency of the
The number of snapshots to keep per file system. For the P2000 G3 MSA System/MSA2000G2 array, the maximum is 32 snapshots per file system. For Dell Eq
Modifying an automated snapshot schemeA snapshot scheme can be modified only from the CLI. Use the following command:ibrix_snap_strategy -e -n NAME -k
For example, to delete snapshots ifs0_snap and ifs1_snap:<installdirectory>/bin/ibrix_snap -d -f ifs0_snap,ifs1_snapViewing snapshot information
The following table lists the output fields for ibrix_snap -i.DescriptionFieldSnapshot segment number.SEGMENTThe file serving node that owns the snaps
The next window shows a CIFS client accessing the snapshot file system .fs1_snap1. The originalfile system is mapped to drive X.106 Creating snapshots
Troubleshooting snapshotsSnapshot reserve is full and the MSA2000 is deleting snapshot volumesWhen the snapshot reserve is full, the MSA2000 will dele
13 Using data tieringThis chapter describes how to configure and manage data tiering.OverviewUse the data tiering feature to set a preferred tier wher
Note the following:• A tiering policy can contain multiple rules.• Tiering rules are based on individual file attributes.• All rules are executed when
2 Creating and mounting file systemsThis chapter describes how to create file systems and mount or unmount them.Creating a file systemYou can create a
NOTE: A tier is created whenever a segment is assigned to it. Be careful to spell the name of thetier correctly when you add segments to an existing t
Managing a tiered file system and tiering policyAfter tiers have been defined on a file system, you can:• Add segments to existing tiers.• Add or dele
For example:<installdirectory>/bin/ibrix_migrator -v -r -f ifs2The output lists the file system name, the rule ID (IDs are assigned in the order
Use the following qualifiers for fixed times and dates:• Time: Enter as three pairs of colon-separated integers using a 24-hour clock. The format ishh
Migration rule examplesWhen you write a rule, identify the following components:• File system (-f)• Source tier (-S)• Destination tier (-D)Use the fol
There is no guarantee as to the order in which the two rules will be executed; therefore, the finaldestination is ambiguous because multiple rules can
14 Using file allocationThis chapter describes how to configure and manage file allocation.OverviewX9000 Software allocates new files and directories
How file allocation settings are evaluatedX9000 clients and NFS/CIFS clients use the following precedence rules to evaluate the file allocationsetting
NOTE: If your file and directory allocation policies are different and you want to make them thesame, first verify that the file allocation policy is
<installdirectory>/bin/ibrix_fs_tune -f FSNAME {-h HOSTLIST|-g GROUPLIST}-S {SEGNUMLIST|ALL|LOCAL}Restoring the default segment preferenceThe de
If the file system will be exported through NFS, configure an NFS export record on the NFS Exportdialog box.If the file system will be made available
15 Support and other resourcesContacting HPFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore con
GlossaryACE access control entry.ACL access control list.ADS Active Directory Service.ALB Advanced load balancing.BMC Baseboard Management Configurati
SELinux Security-Enhanced Linux.SFU Microsoft Services for UNIX.SID Secondary controller identifier number.SNMP Simple Network Management Protocol.TCP
IndexSymbols/etc/likewise/vhostmap file, 6332-bit mode, disable, 3264-bit mode, enable, 11Aauthentication methodsActive Directory, 42Local Users, 42au
mountpoints, view, 15, 16NFSexport, 38unexport, 39quotas, 19remote replication, 87segmentsassign to tiers, 111defined, 8rebalance, 30remove from tiers
create from CLI, 101create on GUI, 98delete snapshot scheme, 103modify snapshot scheme, 103schedule from CLI, 102view snapshot scheme from CLI, 103cle
If clients will access the file system using HTTP or HTTPS, create an HTTP share on the HTTP Exportdialog box. An HTTP configuration profile and an HT
Review the Summary to ensure that the file system is configured properly. If necessary, you canreturn to a dialog box and make any corrections.Creatin
Spillover filesThe X9000 Software file system supports spilling over sequentially written files from one segmentto another.Managing mountpoints and mo
CLI proceduresThe CLI commands are executed immediately on file serving nodes. For X9000 clients, the commandintention is stored in the management con
<installdirectory>/bin/ibrix_umount -f FSNAME [-h HOSTLIST | -g GROUPLIST]To unmount a file system from a specific mountpoint on a file serving
To remove a client access entry, select the affected file system on the GUI, and then select ClientExports from the lower Navigator. Select the access
3 Setting up quotasQuotas can be assigned to individual users or groups, or to a directory tree. Individual quotaslimit the amount of storage or the n
© Copyright 2009, 2011 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP required for possession, use or
NOTE: For the purpose of setting quotas, no UID or GID can exceed 2,147,483,647.Setting user quotas to zero removes the quotas.NOTE: When a new NIS us
<installdirectory>/bin/ibrix_edquota -s -u “USER” -f FSNAME[-M SOFT_MEGABYTES] [-m HARD_MEGABYTES] [-I SOFT_FILES] [-i HARD_FILES]• Set a quota
The -n NAME option specifies a unique name for the directory tree quota. The name cannotcontain a comma (,) character.2. Assign usage limits to the di
specifies a user or group name, or a directory tree that has already been assigned an identifiername. The “C” format specifies a directory tree, where
ibrix_online_quotacheck –g —T groupid home_dirTo run a quota check on a specific directory tree, use the following command:ibrix_online_quotacheck –t
4 Maintaining file systemsThis chapter describes how to extend a file system, rebalance segments, delete a file system or filesystem component, and ch
To display detailed information about volume groups, use the ibrix_vg -i command. The -gVGLIST option restricts the output to the specified volume gro
The following table lists the output fields for ibrix_fs -l.DescriptionFieldFile system name.FS_NAMEState of the file system (for example, Mounted).ST
DescriptionFieldAllocation policy assigned on this file system. Defined policies are: ROUNDROBIN,STICKY, DIRECTORY, LOCAL, RANDOM, and NONE. See “File
Viewing disk space information from a Linux X9000 clientBecause file systems are distributed among segments on many file serving nodes, disk space uti
Contents1 Using X9000 Software file systems...8File system organization and access...
<installdirectory>/bin/ibrix_fs -e -f FSNAME -s LVLIST [-t TIERNAME]Extend a file system with segments created from the physical volumes in LVLI
On the Advanced tab, select the source segments, destination segments, or both for the rebalancingtask. You can also specify segments to evacuate.Reba
<installdirectory>/bin/ibrix_rebalance -r -f ifs1 -d 3,4To rebalance segments 3 and 4 only and to specify them by their logical volume names:<
NOTE: A file system using 64-bit mode cannot be changed to use 32-bit mode. If there is achance that clients will need to run a 32-bit application, do
Deleting file serving nodes and X9000 clientsBefore deleting a file serving node, unmount all file systems from it and migrate any segments thatit own
2. Execute the following commands one time each:<installdirectory>/bin/ibrix_fsck -f FSNAME -p 0 [-s LVNAME]<installdirectory>/bin/ibrix_f
1. Identify the file serving node that owns the segment. This information is reported on theFilesystem Segments page on the GUI.2. Fail over the file
dir_alloc_policy... NONE cur_segment... 0 sup_ap_on... NONE local_segments ...
5 Using NFSThis section describes how to export file systems for NFS, how to autoconnect NFS clients, andhow to set up NFS clients.Exporting a file sy
From the CLITo export a file system from the CLI, use the ibrix_exportfs command:<installdirectory>/bin/ibrix_exportfs -f FSNAME -h HOSTNAME -p
How rebalancing works...30Rebalancing segments on t
Autoconnecting NFS clientsThe Autoconnect feature enables NFS clients to mount file systems automatically whenever theyare accessed. At the same time,
2. Set permissions on the script file to make it executable. For example, for a curl script, enterthe following:chmod +x /etc/auto.cuser-manual-12180. Edit the /et
6 Configuring authentication for CIFS, FTP, and HTTPUsers accessing CIFS, FTP, or HTTP shares can be authenticated through either Active Directory orL
NOTE: When you successfully configure Active Directory authentication, the machine is partof the domain until you remove it from the domain, either wi
To configure Local Users authentication from the CLI, use the following command:ibrix_auth -N [-h HOSTLIST]To configure Active Directory authenticati
IMPORTANT: The servers hosting the agile management console must be file serving nodes. Donot use a dedicated Management Server that cannot be convert
On the CLI, use the following command to view information about all local group accounts:ibrix_localgroups -LTo see information for a specific local g
Modifying a local groupTo change the information for a local group account, select the account on the Local Groups paneand click Modify. You can then
To add a local user account from the CLI, use this command:ibrix_localusers -a -u USERNAME -g DEFAULTGROUP -p PASSWORD [-h HOMEDIR][-s SHELL] [-i USER
7 Using CIFSThe X9000 Software CIFS server implementation allows you to create file shares for data storedon the cluster. The CIFS server provides a t
Configuring Active Directory...59Assigning attributes...
which shows CIFS activity statistics on the node. You can start, stop, or restart the CIFS service byclicking the appropriate button.To start, stop, o
You can also view CIFS shares for a specific file system. Select that file system on the GUI, andthen select CIFS Shares from the lower Navigator.You
To view the current setting for SMB signing, use the following command:ibrix_cifsconfig -iTo configure SMB signing from the command line, use the foll
The Add a CIFS Share dialog box allows you to share the entire filesystem or a specific subdirectory.Enter a name and description for the share, selec
NOTE: Be sure to use the ibrix_cifs command located in <installdirectory>/bin.The ibrix_cifs command located in /usr/local/bin/init is used inte
6. Click Close > OK to exit the dialogs.7. Expand Shared Folders (\\<address>).8. Select Shares and manage the shares as needed.Windows Vista
6. Click OK to exit the Add or Remove Snap-ins window.7. Expand Shared Folders (\\<address>).8. Select Shares and manage the shares as needed.Sa
Adding CIFS sharesCIFS shares can be added with the MMC, using the share management plug-in. When addingshares, you should be aware of the following:•
To add a new share, select Shares > New Share and run the Create A Shared Folder Wizard. Onthe Folder Path page, enter the path to the share, being
Deleting CIFS sharesTo delete a CIFS share, select the share on the Computer Management window, right-click, andselect Delete.Linux static user mappin
Adding a certificate to the cluster...85Exporting a certifi
http://technet.microsoft.com/en-us/library/cc778455(WS.10).aspxTo install Identity Management for UNIX on a domain controller running Windows Server 2
The following article provides more information about modifying attributes in the Active Directoryglobal catalog:http://support.microsoft.com/kb/24871
Consolidating SMB servers with common share namesIf your SMB servers previously used the same share names, you can consolidate the servers withoutchan
also be translated to /srv1/data, but the clients will have different permissions. The client requestsfor \\srv2/data will be translated to share srv2
Differences in locking behaviorWhen CIFS clients access a share from different servers, as in the X9000 Software environment,the behavior of byte-rang
and honors ACLS. The UID/GIDs and permission bits for files on a directory tree are peripheralto this activity, and are used only as much as necessary
Changing the way CIFS inherits permissions on files accessed from Linux applicationsTo avoid the CIFS server modifying file permissions on directory t
occur for 15 to 20 minutes. The client's copy will then continue without error if the retry timeouthas not expired. To work around this situation
8 Using FTPThe FTP feature allows you to create FTP file shares for data stored on the cluster. Clients accessthe FTP shares using standard FTP and FT
• If the directory path to the share includes a subdirectory, be sure to create the subdirectoryon the file system and assign read/write/execute permi
13 Using data tiering...108Overview...
Modifying a configuration profileTo modify a configuration profile, select the profile on the Config Profiles pane, and click ModifyProfile. You can t
NOTE: The allowed ports are 21 (FTP) and 990 (FTPS).The Users tab lists the users allowed read access, write access, or both on a share directory. You
To add an FTP share from the command line, use the following command:ibrix_ftpshare -a SHARENAME –c PROFILENAME -f FSNAME -p dirpath -IIP-Address:Port
IMPORTANT: For FTP share access to work properly, the vsftpd service must be started byX9000 Software. Ensure that the chkconfig of vsftpd is set to O
The following example shows an anonymous client accessing a share.For Active Directory users (specify the user as in this example: ASM2k3.com\\ib1):•
9 Using HTTPThe HTTP feature allows you to create HTTP file shares for data stored on the cluster. Clients accessthe HTTP shares using standard HTTP a
not create the subdirectory if it does not exist, and instead adds a /pub/ directory to theshare path.)• For High Availability, when specifying IP add
On the Create Share dialog box, click Create HTTP Share and set the appropriate parameters.Note the following:• The file system selected for the share
When the wizard is complete, users can access the share from a browser. For example, if youconfigured the share with the anonymous user, specified 99.
Modifying a virtual hostTo change the properties for a virtual host, select the virtual host on the VHosts page, click ModifyVhost, and make the neces
1 Using X9000 Software file systemsFile system organization and accessThe following diagram shows how data is organized on a file system and how it is
Adding an HTTP shareTo add an HTTP share, click Add Share on the Share page. The HTTP Wizard opens at the CreateShare dialog box.To add an HTTP share
NOTE: When the HTTP configuration is changed with the management console GUI or CLI, theHTTP daemon is restarted automatically.Accessing sharesClients
For Active Directory users (specify the user as in this example: mycompany.com\\User1):• Upload a file using HTTP protocol:curl –T <filename> -u
10 Managing SSL certificatesServers accepting FTPS and HTTPS connections typically provide an SSL certificate that verifies theidentity and owner of t
1. Generate a private key:openssl genrsa -des3 -out server.key 1024You will be prompted to enter a passphrase. Be sure to remember the passphrase.2. R
NOTE: When you are ready to create a real SSL certificate, consult the following site for adescription of the procedure:http://httpd.apache.org/docs/2
scp server.pem ib87/tmpThen, on node ib87, add the certificate to the cluster:ibrix_certificate -a -c cert86 –p /tmp/server.pemExporting a certificate
11 Using remote replicationThis chapter describes how to configure and manage remote replication.OverviewRemote replication provides a transparent met
that have occurred since the last replication job are replicated from the source file system to thetarget file system.The following requirements apply
Note the following:• Several replication tasks can run in parallel.• Each replication is either a continuous or a run-once task.• The target subdirect
protocols must mount the file system from a file serving node. All requests are sent to themounting server, which performs the required routing.5. A c
NOTE: If the cluster uses an agile management console configuration, specify the virtual clustername and the IP address of the virtual interface.The G
source cluster (clusterName) containing the file system to be replicated. Include the -P optionif you do not want to set the host and NIC preferences.
To stop a task, select the task and click Stop.To pause a task, select the task and click Pause. The status of the task will change to PAUSED.Pausing
Configuring and managing replication tasks from the CLINOTE: When configuring replication tasks, be sure to following the guidelines described in“Over
Querying remote replication tasksUse the following command to list all running and stopped continuous replication jobs in the cluster,optionally restr
ibrix_exportcfrpreference command can be used to change the network interfacepreference.Troubleshooting remote replication 95
12 Creating snapshotsThe snapshot feature allows you to capture a point-in-time copy of a file system for online backuppurposes and to simplify recove
NOTE: If the snapshot store is too small, the snapshot will eventually exceed the available space(unless you detect this and manually increase storage
The type of storage array determines the maximum number of snapshots you can keep and mountper file system.Maximum number of snapshots to mountMaximum
On the General tab, enter a name for the strategy. For the Type, select either Day/Week/Monthor Regular.• For Day/Week/Month, specify the number of sn
Komentarze do niniejszej Instrukcji