
HP StoreAll Storage File System User GuideAbstractThis guide describes how to configure and manage StoreAll software file systems and how to use NFS,
1 Using StoreAll software file systemsFile system operationsThe following diagram highlights the operating principles of the StoreAll file system.The
SMB shadow copy support. StoreAll software does not have any control over the behavior of otherclients.NOTE: HP recommends that the share root is not
access to and security for Windows clients. The SMB server maintains the ACLs as requested bythe Windows clients, and emulates the inheritance of ACLs
Working with new files and directoriesThe inheritance rules of Windows assume that all directories are created on a Windows machine,where they inherit
Robocopy errors occur during node failover or failbackIf Robocopy is in use on a client while a file serving node is failed over or failed back, theap
8 Using FTPThe FTP feature allows you to create FTP file shares for data stored on the cluster. Clients accessthe FTP shares using standard FTP and FT
On the File Share page, select FTP as the File Sharing Protocol. Select the file system, which mustbe mounted, and enter the default directory path fo
On the Host Servers page, select the servers that will host the configuration profile.106 Using FTP
On the Settings page, configure the FTP parameters that apply to the share. The parameters areadded to the file serving nodes hosting the configuratio
To define permissions for a user, click Add to open the Add User to Share dialog box.Managing the FTP configurationSelect File Shares > FTP from th
Use the buttons on the panels to modify or delete the selected configuration profile or share. Youcan also add another FTP share to the selected confi
(Specifically, a segment need not be a complete, rooted directory tree). Segments can be anysize and different segments can be different sizes.2. The
Modify a configuration profile:ibrix_ftpshare -m SHARENAME -c PROFILENAME [-f FSNAME -p dirpath] -IIP-Address:port [-u USERLIST] [-S SETTINGLIST]Delet
Accessing sharesClients can access an FTP share by specifying a URL in their Web browser, such as Internet Explorer.In the following URLs, IP_address:
Table 3 Download a file by using the FTP protocolCommandUse this command when...curl ftp://IP_address/pub/server.pem -o<path to download>\<fi
Table 6 Upload a file by using the FTPS protocol for local userCommandUse this command when...curl --ftp-ssl-reqd --cacert <certificatefile> -T
9 Using HTTPThe HTTP feature allows you to create HTTP file shares for data stored on the cluster. Clients accessthe HTTP shares using standard HTTP a
Uses for the StoreAll REST APIAlthough the StoreAll REST API is not generally intended for your end users, it lets you createapplications using the St
• You must assign read, write, and execute permissions to the share’s directory path and allparent directories up to the file system mount point to al
Table 11 Checklist for creating HTTP shares (continued)Stepcompleted?Where to find moreinformationTaskStep appliesonlynlto REST APISharesStepCreate or
Creating HTTP shares from the GUIUse the Add New File Share Wizard to create the HTTP share. You can then view or modify theconfiguration as necessary
4. Configure a new profile on the Config Profile dialog box, specifying a name and theappropriate parameters for the profile. Select Host servers on t
1) The segment server initiating the operation can read files directly from the segmentacross the SAN; this is called a SAN READ.2) The segment server
5. On the “Virtual Host” page, enter the vhost name. Select the false option from the EnableStoreAll REST API menu. Fill in remaining details of SSL c
6. On the “Settings” page, enter the URL path and fill in the remaining details. Click Next. Onthe Settings page, set the appropriate parameters for t
7. On Summary page, ensure that the right parameters are displayed.Ensure that:• In the Virtual Host summary section, the value of IBRIX REST API is d
8. Click Finish.When the wizard is complete, users can access the share from a browser. For example, if youconfigured the share with the anonymous use
1. On the GUI, select File Shares from the Navigator to open the File Shares panel, and thenclick Add to start the Add New File Share Wizard.2. On the
4. The Host Servers dialog box displays differently whether you selected a previous profile oryou are create a new one. If you selected the option Cre
5. If you selected an existing profile on the Config Profile dialog box, you are shown the hostsdefined for that profile, as shown in the following fi
7. If you selected a previous profile, the Virtual Host prompts you to select a pre-existing Vhostor create an HTTP Vhost.8. If you already have Vhost
• Set the Anonymous field to false only if you want to restrict access to specific users. TheAnonymous field must be set to false when an HTTP-StoreAl
11. To allow specific users read access, write access, or both, click Add. On the Add Users toShare dialog box, assign the appropriate permissions to
attributes such as such as modification time, access time, file size, or file type. See “Usingdata tiering” (page 261).• File allocation. This feature
Use the buttons on the panels to modify or delete the selected configuration profile or virtual host.To view HTTP shares on the GUI, select the approp
Creating HTTP shares from the CLIOn the command line, HTTP shares are managed by the ibrix_httpconfig,ibrix_httpvhost, and ibrix_httpshare commands. T
Creating HTTP sharesSee “Checklist for creating HTTP shares” (page 116) for a list of prerequisites that must be completedbefore creating an HTTP shar
ibrix_httpvhost -i VHOSTNAME -c PROFILENAME [-v level]Modify a virtual host:ibrix_httpvhost -m VHOSTNAME -c PROFILENAME -I IP-Address:port [-SSETTINGL
If the pathname ends with a filename, the browser either opens the file or prompts the user to openor save the file, depending on the browser settings
Configuring Windows clients to access HTTP WebDAV sharesComplete the following steps to set up and access WebDAV enabled shares:• Verify the entry in
• Consider the assigned IP address when mapping a network drive on Windows.When mapping a network drive in Windows, if the IP address assigned to the
disconnected and re-mapped through Windows Explorer. The files are accessible on the file servingnode and through BitKinex.Use the following workaroun
10 HTTP-REST API object mode sharesThe StoreAll REST API share in object mode provides concepts similar to OpenStack Object StorageAPI to support prog
Tutorial for using the HTTP StoreAll REST API object modeThis section walks you through using the major components of object mode. You will be shownho
2 Creating and mounting file systemsThis chapter describes how to create file systems and mount or unmount them.Creating a file systemYou can create a
1. Create a container.When you first create a container, the account directory, named as the numeric user ID of theuser creating the container, is aut
As shown in the following example:curl -X PUT http://192.168.2.2/obj/qa1\\administrator/activedomaincontainer -u qa1\\administrator◦ In the second for
3. Add items to your newly created container.NOTE: Enter the following commands on one line.• To create an empty object in your new container, enter t
5. Download files from your share:NOTE: Enter the following commands on one line.curl -o <local_pathname> http://<IP_address:port>/<url
in the container. In this example, the permissions for container-a are the default 700, but thepermissions for container-b have been changed by qa1\\a
Finding the corresponding object ID from a hash nameNOTE: These steps are for someone with administrator privileges.The HTTP StoreAll REST API object
In this instance newcontainer is the container containing the hash reference.7. Enter the following command to list the contents of newcontainer.[root
The first time a user creates a container, a directory with the numeric user ID of the user representingthat account, is created to hold the container
1. Enter the following command on the StoreAll server:echo -n '<object_id>' | openssl dgst -sha1For example, if your object identifier
HTTP command:PUT /<urlpath>/<account_name>/<container_name> HTTP/1.1CURL command (Enter on one line:curl -X PUT http://<IP_addre
Configure Options dialog box. Enter a name for the file system, and specify the appropriateconfiguration options.Creating a file system 15
Delete ContainerType of Request: Container servicesDescription: Deletes the container.IMPORTANT: The container must be empty before it can be deleted.
Retrieve ObjectType of Request: Object RequestsDescription: Returns the list of containers for a user account.HTTP command:GET /<urlpath>/<ac
11 HTTP-REST API file-compatible mode sharesThe StoreAll REST API share in file-compatible mode provides programmatic access to user-storedfiles and t
the user can query all files in that directory only, or all files in all subdirectories of that directoryrecursively.Retention properties assignmentYo
• All HTTP query responses generated by the API code follow the JSON standard. No XMLresponse format is provided at this time.• HTTP request messages
error. Any request with the version field and a value less than or equal to the current version, ishandled correctly by the new API version unless the
File content transferFiles can be uploaded and downloaded with the normal StoreAll HTTP shares feature with WebDAVenabled, as described in earlier sec
Download a fileThis command transfers the contents of a file to the client from the HTTP share. Download capabilityalready exists in the StoreAll HTTP
HTTP syntaxThe HTTP request line format is:DELETE /<urlpath>/<pathname> HTTP/1.1The equivalent curl command format is:curl -X DELETE http[
HTTP syntaxThe HTTP request line format is:NOTE: Enter the following commands on a single line.PUT commandPUT /<urlpath>[/<pathname>]?[ver
WORM/Data Retention dialog box. If data retention will be used on the file system, enable it andset the retention policy. See “Managing data retention
Delete custom metadataThis command removes one or more metadata attributes from an existing file or directory in theHTTP share. Up to 15 metadata attr
System and custom metadataTwo types of metadata are supported for queries, and both can be referenced in the same query:• System metadata applies to a
WritableExampleDescriptionTypeSystem attribute (key)noThe date/time recordedin the atime field of thenumericsystem::onDiskAtime• Query criteria(second
WritableExampleDescriptionTypeSystem attribute (key)system::retentionState partial (seesystem::worm)A decimal number,such as 11 for the bitThe current
WritableExampleDescriptionTypeSystem attribute (key)system::lastActivityTime noSee “API dateformats” (page 155).The latest date/time ofthe following 5
system::onDiskAtimeThe atime inode field in StoreAll can be accessed as the system::onDiskAtime attribute fromthe API. This field represents different
WildcardsThe StoreAll REST API provides three wildcards:DescriptionWildcardA single attribute name of * returns all system and custommetadata attribut
curl -g "http[s]://<IP_address>:<port>/<urlpath>[/[<pathname>]]?nl[version=1][attributes=<attr1>[,<attr2>,…]]
Regular expressionsThe arguments to the regular expression operators (~ and !~) are POSIX regular expressions, asdescribed in POSIX 1003.1-2008 at htt
Example queriesGet selected metadata for a given fileThe following is one command line:curl -g "http://99.226.50.92/ibrix_share1/lab/images/xyz.j
You can configure the following:• Default retention period. This period determines whether you can manage WORM(non-retained) files as well as WORM-ret
issued queries to receive the first 2000 results. The client usually issues further queries until no moreresults are returned.Get selected metadata fo
Get all files that match a name patternThe following is one command line:curl -g "http://99.226.50.92/ibrix_share1/lab/images?query=nlsystem::pat
HTTP syntaxThe commands provided in this section should be entered on one line.The HTTP request line format is the following on one line:PUT/<urlpa
As part of processing this command, the file may also be set to the retained state. This will occurif the atime has already been set into the future,
12 Managing SSL certificatesServers accepting FTPS and HTTPS connections typically provide an SSL certificate that verifies theidentity and owner of t
1. Generate a private key:openssl genrsa -des3 -out server.key 1024You will be prompted to enter a passphrase. Be sure to remember the passphrase.2. R
Adding a certificate to the clusterTo add an existing certificate to the cluster, click Add on the Certificates panel. On the AddCertificate dialog bo
Exporting a certificateIf necessary, you can display a certificate and then copy and save the contents for future use. Thisstep is called exporting. S
13 Using remote replicationThis chapter describes how to configure and manage the Continuous Remote Replication (CRR)service.NOTE: Keep in mind that w
Run-once replication. This method replicates a single directory sub-tree or an entire file system fromthe source file system to the target file system
• Report Data Generation. Select this option if you want to create data retention reports. Usethe default schedule, or click Modify to open the Report
• A cluster can be a target for multiple replication tasks. For example, C1 can replicate /c1ifs1to C3:/c3ifs1/target1 and C2 can replicate /c2ifs1 to
Because of the way StoreAll replication works it is important to understand how applications usingthe system will modify files to avoid unexpectedly l
The Server Assignments section allows you to specify server assignments for the export. Check thebox adjacent to Server to use the default assignments
The Remote Replication Exports panel lists the replication exports you created for the file system.Expand Remote Replication Exports in the lower Navi
FSNAME is the target file system to be exported. The -p option exports a directory located underthe root of the specified file system (the default is
You can use CRR health reports to check the status of CRR activities on the source and target cluster.To see a list of health reports for active repli
If the health check finds an issue in the CRR operation, it generates a critical event.Reports are generated on the source cluster. If the target clus
Starting a replication taskTo start a replication task, click New on the Remote Replication Tasks panel and then use the NewReplication Task Wizard to
Source Settings dialog box for run-once replicationsFor a run-once replication of data other than a snapshot, specify the source directory on the Sour
Target Settings dialog boxFor replications to a remote cluster, select the target cluster on the Target Settings dialog box. Thiscluster must already
Default File Shares dialog box. Use this dialog box to create an NFS export and/or an SMB shareat the root of the file system. The default settings ar
For replications to the same cluster and file system, the Target Settings dialog box asks only forthe target directory. This field is required.Specify
Use the -s option to start a continuous remote replication task. The applicable options are:The source file system to be replicated.-f SRC_FSNAMEThe r
Use the -o option to start a run-once task. The -S option specifies a directory under the sourcefile system to synchronize with the target directory.S
Replicating WORM/retained filesWhen using remote replication for file systems enabled for data retention, the following requirementsmust be met:• The
3. When the Run-Once replication is complete, restore shares to their original configuration onthe local site, and verify that clients can access the
– t means the modification time is different and is being updated to the sender’s value(requires --times). An alternate value of T means that the time
14 Managing data retentionData retention is intended for sites that need to archive read-only files for business purposes, andensures that files canno
Default retention period. If a specific retention period is not applied to a file, the file will be retainedfor the default retention period. The sett
storage. A scheduled scan will quit immediately if it detects that a scan of the same file system isalready running.You can schedule periodic data val
period. The minimum value for the autocommit period is five minutes, and the maximum value isone year. If you plan to keep normal files on the file sy
© Copyright 2009, 2013 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP required for possession, use or
Configuring additional file system optionsThe New Filesystem wizard creates the file system with the default settings for several options. Youcan chan
Enable Express Query. Check this option to enable Express Query on the file system. See “ExpressQuery” (page 217), for details.Enabling data retention
The following example creates a file system with Enterprise mode retention, with a default retentionperiod of 1 month, a minimum retention period of 3
To view the retention profile from the CLI, use the ibrix_fs -i command, as in the followingexample:ibrix_fs -i -f ifs1 FileSystem: ifs1==============
Autocommit period is set and the default retention period is zero seconds:• Files remaining unchanged during the autocommit period automatically becom
NOTE: For SMB users setting the access time manually for a file, the maximum retention periodis 100 years from the date the file was retained. For NFS
To administer files from the CLI, use the ibrix_reten_adm command.IMPORTANT: Do not use the ibrix_reten_adm command on a file system that is not enabl
find /ibrixFS/mydir -type d -exec ibrix_reten_adm -h -f ibrixFS -P{/*,{}/.??*,.[!.]*Setting or removing a legal holdWhen a legal hold is set on a reta
To reset the expiration time using the CLI:ibrix_reten_adm -e expire_time -f FSNAME -P PATHLISTIf you specify an interval such as 20m (20 minutes) for
To delete a file using the CLI:ibrix_reten_adm -d -f FSNAME -P PATHLISTRunning data validation scansScheduling a validation scanWhen you use the Manag
Starting an on-demand validation scanYou can run a validation scan at any time. Select the file system on the Management Console,and then select Activ
Creating a file system using the CLIThe ibrix_fs command is used to create a file system. It can be used in the following ways:• Create a file system
To start an on-demand validation scan from the CLI, use the following command:ibrix_datavalidation -s -f FSNAME [-d PATH]Viewing, stopping, or pausing
Following is a sample validation summary file:# cat /fsIbrix/.archiving/validation/history/4-0.sumJOB_ID=4FILESYSTEM_NAME=fsIbrixFILESYSTEM_MOUNT_DIR=
Checksum corruption:If the checksums of the <filesystem/file> and <fileFromBackup> are identical, the.archiving directory may have been co
The utilization report summarizes how storage is utilized between retention states and free space.The next example shows the first page of a utilizati
Generating and managing data retention reportsTo run an unscheduled report from the Management Console, select Filesystems in the upperNavigator and t
Generating data retention reports from the CLIYou can generate reports at any time using the ibrix_reports command. Scheduled reportscan be configured
• When a legal hold is applied to a file, the legal hold is not replicated on the target. If the fileon the target should have a legal hold, you will
15 Express QueryExpress Query provides a per-file system database of system and custom metadata, and audithistories of system and file activity. When
Start the metadata service:ibrix_archiving -sStop the metadata service:ibrix_archiving -S [-F] [-t timeout secs]The -t option specifies the time (in s
Restore to an existing file system that has Express Query enabledTo restore a backup to an existing file system that has Express Query enabled:1. Disa
File limit for directoriesThe maximum number of files in a directory depends on the length of the file names, and also thenames themselves. The maximu
The options specify the following:DescriptionOptionsThe metadata configuration file. Use only this path and file name.--dbconfig/usr/local/Metabox/scr
The next command imports audit metadata exported by the ibrix_audit_reports command:MDimport -f target -t audit -nsimple_report_for_source_at_13415135
Managing auditingAuditing lets you:• Find out which events you have already captured in the Express Query database and controlwhat gets captured in re
Audit log reportsAudit log reports include metadata for selected file system events that occurred during a specifictime period. To generate an audit l
The audit reports are in CSV (comma-separated) format and are placed in the following directory:<file_system_mountpoint>/.archiving/reportsThe f
DescriptionFieldThe seconds and nanoseconds of that time, in UNIX epoch time, which is the number of secondssince the start of Jan 1, 1970 in UTC*time
16 Configuring Antivirus supportThe StoreAll Antivirus feature can be used with supported Antivirus software, which must be runon systems outside the
On the CLI, use the ibrix_avconfig command to configure Antivirus support. Use the ibrix_avcommand to update Antivirus definitions or view statistics.
To remove an external virus scan engine from the configuration, select that system on the VirusScan Engines panel and click Delete.To add an external
NOTE: All virus scan engines should have the same virus definitions. Inconsistencies in virusdefinitions can cause files to be rescanned.Be sure to co
IMPORTANT: Keep in mind:• Mount options do not persist, unless they are set at the mountpoint. Mount options that arenot set at the mountpoint are res
Defining protocol-specific policiesFor certain file sharing protocols (currently only SMB/CIFS), you can specify the file operationsthat trigger a sca
IMPORTANT: The exclusion by file extension feature is not supported for files objects stored underan HTTP StoreAll REST API share created in the objec
5. Select the appropriate type of rule:• Inherited Rule/Remove Rule. Use this option to reset or remove exclusions that wereexplicitly set on the chil
On the CLI, use the following options to specify exclusions with the ibrix_avconfig command:• -x FILE_EXTENSION — Excludes all files having the specif
Recommendations for Antivirus scans:• Run Antivirus scans when the system is not being heavily used.• Configure your Antivirus scans so that a huge nu
6. On the Schedule tab, click Schedule this task and then select the frequency (once, daily,weekly, monthly) and specify when the scan should run.CLIO
then select Active Tasks > Antivirus Scan from the lower Navigator. The Antivirus Task Summarypanel then shows current information for the scan.Sto
Stop the specified Antivirus scan task:ibrix_avscan -k -t TASKID [-F]Pause the specified Antivirus scan task:ibrix_task -p -n TASKIDResume the specifi
Limitation 2: When the following sequence of events occurs:• A virus file is created inside the snap root• A snap is taken• The original file is renam
17 Creating StoreAll software snapshotsThe StoreAll software snapshot feature allows you to capture a point-in-time copy of a file systemor directory
• path: For StoreAll clients only, mount on the specified subdirectory path of the file systeminstead of the root.• remount: Remounts a file system wi
To enable a directory tree for snapshots, click Add on the Snap Trees panel.You can create a snapshot directory tree for an entire file system or a di
IMPORTANT: A snapshot reclamation task is required for each file system containing snap treesthat have scheduled snapshots. If a snapshot reclamation
To take a snapshot from the CLI, use the following command:ibrix_snap -c -f FSNAME -P SNAPTREEPATH -n NAMEPATTERNSNAPTREEPATH is the full directory pa
The following example lists snapshots created on an hourly schedule for snap tree /ibfs1/users.Using ISO 8601 naming ensures that the snapshot directo
Restoring files from snapshotsUsers can restore files from snapshots by navigating to the appropriate snapshot directory andcopying the file or files
Reclaiming file system space previously used for snapshotsSnapshot reclamation tasks are used to reclaim file system space previously used by snapshot
On the General tab, select a reclamation strategy:• Maximum Space Reclaimed. The reclamation task recovers all snapped space eligible forrecovery. It
To stop a running reclamation task, click Stop on the Task Summary panel.Managing reclamation tasks from the CLITo start a reclamation task from the C
Moving files between snap treesFiles created on, copied, or moved to a snap tree directory can be moved to any other snap treeor non-snap tree directo
18 Creating block snapshotsThe block snapshot feature allows you to capture a point-in-time copy of a file system for onlinebackup purposes and to sim
Viewing mountpoint informationTo view mounted file systems and their mountpoints on all nodes, use the following command:ibrix_mountpoint -lMounting a
Setting up snapshotsThis section describes how to configure the cluster to take snapshots.Preparing the snapshot partitionThe block snapshot feature d
A snapshot scheme specifies the number of snapshots to keep and the number of snapshots tomount. You can create a snapshot scheme from either the Mana
Under Snapshot Configuration, select New to create a new snapshot scheme. The Create SnapshotScheme dialog box appears.252 Creating block snapshots
On the General tab, enter a name for the strategy and then specify the number of snapshots tokeep and mount on a daily, weekly, and monthly basis. Kee
For either template, enter one or more of the following variables. The variables must be enclosedin braces ({ }) and separated by underscores (_). The
Creating an automated snapshot scheme from the CLIYou can create an automated snapshot scheme with the ibrix_vs_snap_strategy command.However, you wil
Viewing automated snapshot schemesOn the Management Console, you can view snapshot schemes on the Create Snapshot dialogbox. Select Recurring as the S
Deleting snapshotsDelete snapshots to free up resources when the snapshot is no longer needed or to create a newsnapshot when you have already created
0.00 0.00 0 0 0 MIXED 7 Hrs 56 Mins 46 Secs ago4 ib50-243 ilv14_msa_snap9__snap OK, SnapUsed=8%
The next window shows an SMB client accessing the snapshot file system .fs1_snap1. Theoriginal file system is mapped to drive X.Accessing snapshot fil
Mounting and unmounting file systems locally on StoreAll clientsOn both Linux and Windows StoreAll clients, you can locally override a mount. For exam
Troubleshooting block snapshotsSnapshot reserve is full and the MSA2000 is deleting snapshot volumesWhen the snapshot reserve is full, the MSA2000 wil
19 Using data tieringA data tier is a logical grouping of file system segments. After creating tiers containing the segmentsin the file system, you ca
For a new tier, on the Manage Tier dialog box, choose Create New Tier, enter a name for the tier,and select one or more segments to be included in the
You can work on only one tier at a time. However, when you click Next, you will be asked if youwant to manage more tiers. If you answer Yes, the Manag
patterns (such as access and modification times), file size, and file type. Rules can be constrainedto operate on files owned by specific users and gr
To delete a ruleset, check the box in the rule set and click Delete.The Tiering Schedule dialog box lists all executed and running migration tasks. Cl
When you click New to create a new schedule, the default frequency for migration tasks isdisplayed. For an existing schedule, the current frequency is
Viewing tier assignments and managing segmentsOn the Management Console, select Filesystems from the Navigator and select a file system in theFilesyst
You can assign, reassign, or unassign segments from tiers using the Data Tiering Wizard. TheManagement Console also provides additional options to per
When you click OK, the rule is checked for correct syntax. If the syntax is correct, the rule is savedand appears on the Data Tiering Rules panel. The
To remove a client access entry, select the affected file system on the GUI, and then select ClientExports from the lower Navigator. Select the access
The next example migrates all mpeg4 files in the subtree. A logical “and” operator combines therules:path=testdata4 and name="*mpeg4"The nex
Configuring tiers and migrating data using the CLIUse the ibrix_tier command to manage tier assignments and to list information about tiers.Use the ib
1 ibrix01b ilv1 OK 4,096 3,811.11 . . .2 ibrix01a ilv2 OK 4,096 3,035.67 3 ibrix01b ilv3
The following rule migrates all files that have not been modified for 30 minutes from Tier1 to Tier2:[root@ibrix01a ~]# ibrix_migrator -A -f ifs1 -r &
To view summary information after the task has completed, run the ibrix_migrator -i commandagain and include the -n option, which specifies the task I
To unassign all segments and delete the tier, use the following command:ibrix_tier -d -f FSNAME -t TIERNAMEDeleting a tiering ruleBefore deleting a ru
When specifying an absolute date and/or time, the rule must use a compare type operator (< |<= | = | != | > | >=). For example:ibrix_migra
Use the following command to write a rule. The rule portion of the command must be enclosed insingle quotes.ibrix_migrator -A -f FSNAME -r 'RULE&
# ibrix_migrator -A -f ifs2 -r ' name = "*.doc" ' -S T1 -D T2# ibrix_migrator -A -f ifs2 -r ' name = "*.jpg" '
20 Using file allocationThis chapter describes how to configure and manage file allocation.OverviewStoreAll software allocates new files and directori
3 Configuring quotasQuotas can be assigned to individual users or groups, or to a directory tree. Individual quotaslimit the amount of storage or the
Standard segment preferences and allocation policiesCommentDescriptionNameThis is the default segment preference. It is suitablefor most use cases.Pre
A StoreAll client or StoreAll file serving node (referred to as “the host”) uses the following precedencerules to evaluate the file allocation setting
Setting file and directory allocation policies from the CLIAllocation policy names are case sensitive and must be entered as uppercase letters (for ex
Both methods can be in effect at the same time. For example, you can prefer a segment for a userand then prefer a pool of segments for the clients on
ibrix_fs_tune -f FSNAME {-h HOSTLIST|-g GROUPLIST} -S {SEGNUMLIST|ALL|LOCAL}Restoring the default segment preferenceThe default is for all file system
Restore the default file allocation policy:ibrix_fs_tune -f FSNAME {-h HOSTLIST|-g GROUPLIST} -p -UListing allocation policiesUse the following comman
21 Support and other resourcesContacting HPFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore con
22 Documentation feedbackHP is committed to providing documentation that meets your needs. To help us improve thedocumentation, send any errors, sugge
GlossaryACE Access control entry.ACL Access control list.ADS Active Directory Service.ALB Advanced load balancing.BMC Baseboard Management Configurati
SELinux Security-Enhanced Linux.SFU Microsoft Services for UNIX.SID Secondary controller identifier number.SMB Server Message Block. The protocol used
To change the quotas configuration, click Modify on the Quota Summary panel.On the CLI, run the following command to enable quotas on an existing file
IndexSymbols/etc/likewise/vhostmap file, 97AActive Directoryconfigure, 65configure from CLI, 72Linux static user mapping, 93synchronize with NTP serve
documentationproviding feedback on, 287EExport Control, enable, 20, 27Express Queryexport metadata, 219HTTP-StoreAll REST API shares., 118import metad
MmappingSMB shares, 92Microsoft Management Consolemanage SMB shares, 88migration, files, 270mounting, file system, 22, 25mountpointscreate from CLI, 2
validation scan results, 210view retention information, 204WORM file, 196SSegmentNotAvailable alert, 51SegmentRejected alert, 52segmentsdefined, 10del
on-demand scans, 209resolve scan errors, 211schedule scans, 208stop or pause, 210view scan results, 210volume groupsdelete, 47view information, 38Wweb
Contents1 Using StoreAll software file systems...10File system operations...
The User Quotas dialog box is used to create, modify, or delete quotas for users. To add a userquota, enter the required information and click Add. Us
The Directory Quotas dialog box is used to create, modify, or delete quotas for directories. To adda directory quota, enter the required information a
Configuring quotas from the CLIIn the commands, use -M SOFT_MEGABYTES and -m HARD_MEGABYTES to specify soft and hardlimits for the megabytes of storag
From the CLI, use the following command to import quotas from a file, where PATH is the path tothe quotas file:ibrix_edquota -t -p PATH -f FSNAMESee “
{id}The UID for a user quota or the GID for a group quota.{name}A user name, group name, or directory tree identifier.{path}The full path to the direc
The Task Summary panel displays the progress of the scan. If necessary, select Stop to stop thescan.To run an online quota check in FILESYSTEM_SCAN mo
Troubleshooting quotasRecreated directory does not appear in directory tree quotaIf you create a directory tree quota on a specific directory and dele
4 Maintaining file systemsThis chapter describes how to extend a file system, rebalance segments, delete a file system or filesystem component, and ch
Viewing physical volume informationThe following command lists detailed information about physical volumes:ibrix_pv -iFor each physical volume, the ou
DescriptionFieldFree (unallocated) space, in MB, available on this volume group.FREE(MB)Percentage of total space in the volume group allocated to log
Deleting file serving nodes and StoreAll clients...48Checking and repairing file s
DescriptionFieldNumber of times the structure of the file system has changed (for example, new segmentswere added).GENNumber of file system segments.N
DescriptionFieldPossible segment numbers for root segment replicas. This value is used internally.Root Segment Replica(s) HintSnapshot strategy, if de
Viewing disk space information from a StoreAll Linux clientBecause file systems are distributed among segments on many file serving nodes, disk space
On the CLI, use the ibrix_fs command to extend a file system. Segments are added to the fileserving nodes in a round-robin manner. If tiering rules ar
How rebalancing worksDuring a rebalance operation on a file system, files are moved from source segments to destinationsegments. StoreAll software cal
The Rebalance All dialog box allows you to rebalance all segments in the file system or in theselected tier.The Rebalance Advanced dialog box allows y
Rebalancing segments from the CLITo rebalance all segments, use the following command. Include the -a option to run the rebalanceoperation in analytic
Viewing the status of rebalance tasksUse the following commands to view status for jobs on all file systems or only on the file systemsspecified in FS
For example, to delete segments ilv1 and ilv2:ibrix_lv -d -s ilv1,ilv2To delete volume groups:bin/ibrix_vg -d -g VGLISTFor example, to delete volume g
NOTE: During an ibrix_fsck run, an INFSCK flag is set on the file system to protect it. If anerror occurs during the job, you must explicitly clear th
Differences in locking behavior...98SMB shadow copy...
1. Disable the Express Query and auditing feature for the file system, including the removal ofany StoreAll REST API shares. Disable the auditing feat
NFS clients cannot access an exported file systemAn exported file system has been unmounted from one or more file serving nodes, causing StoreAllsoftw
StoreAll Command Line Reference Guide. You can manually fail over the file serving node.See the administration guide for your system for more informat
used files (f_files - f_ffree).. 1064 Segment statistics for 690812.89 seconds : n_reads=0, kb_read=0, n_writes=0, kb_written=0, n_cre
Iad error on host glory2To work around the problem, recreate the segment on the failing LUN. To identify the LUN associatedwith the failure, run a com
5 Using NFSTo allow NFS clients to access a StoreAll file system, the file system must be exported. You canexport a file system using the GUI or CLI.
Use the Settings window to specify the clients allowed to access the share. Also select the permissionand privilege levels for the clients, and specif
The Summary window shows the configuration of the share. You can go back and revise theconfiguration if necessary. When you click Finish, the export i
Unexporting a file systemA file system should be unexported before it is unmounted.To unexport a file system:• On the GUI, select the file system, sel
To set case insensitivity from the CLI, use the following command:ibrix_caseinsensitive -s -f FSNAME -c [ON|OFF] -p PATHViewing the current setting fo
Delete Container...150Set Container Permiss
2:0:/fs_test1/samename-T/samename: TRUE2:0:DONEThe next sample log file is for a change in case insensitivity:0:0:31849:Case Insensitivity is turned O
6 Configuring authentication for SMB, FTP, and HTTPStoreAll software supports several services for authenticating users accessing shares on StoreAllfi
Using LDAP as the primary authentication methodRequirements for LDAP users and groupsStoreAll supports only OpenLDAP.Configuring LDAP for StoreAll sof
Required attributes for Samba/POSIX templatesDescriptionValueNonvirtual attributenameHelps identify the configuration version uploaded. Potentiallyuse
Click Authentication Wizard to start the wizard. On the Configure Options page, select theauthentication service to be applied to the servers in the c
• Share Administrators. See “Windows Share Administrators” (page 71).• Summary. See “Summary” (page 71).Active DirectoryEnter your domain name, the Au
LDAP ID mappingIf LDAP ID mapping is enabled and the system cannot locate a UID/GID in Active Directory, itsearches for the UID/GID in LDAP. On the LD
LDAPTo configure LDAP as the primary authentication mechanism for SMB shares, enter the server nameor IP address of the LDAP server host and the passw
NOTE: If LDAP is the primary authentication service, Windows clients such as Explorer or MMCplug-ins cannot be used to add new users.Local GroupsSpeci
NOTE: If Local Users and Groups is the primary authentication service, Windows clients such asExplorer or MMC plug-ins cannot be used to add new users
Resuming a remote replication task...192Querying remote replication t
To provide account information for the user, click Advanced. The default home directory is /home/<username> and the default shell program is /bi
NOTE: If Local Users and Groups is the primary authentication service, Windows clients such asExplorer or MMC plug-ins cannot be used to add new users
You cannot change the UID or RID for a Local User account. If it is necessary to change a UID orRID, first delete the account and then recreate it wit
IMPORTANT: Before using ibrix_ldapconfig to configure LDAP on the cluster nodes, youmust configure the remote LDAP server. For more information, see “
This command automatically enables LDAP RFC 2307 ID Mapping. The options are:The LDAP server host (server name or IP address).-h LDAPSERVERHOSTThe LDA
Add a Local User account:ibrix_localusers -a -u USERNAME -g DEFAULTGROUP -p PASSWORD [-h HOMEDIR][-s SHELL] [-i USERINFO] [-U USERID] [-S RID] [-G GRO
7 Using SMBThe SMB server implementation allows you to create file shares for data stored on the cluster. TheSMB server provides a true Windows experi
appropriate server. Select CIFS in the lower Navigator to display the CIFS panel, which showsSMB activity statistics on the server. You can start, sto
The command output reports status as follows:ConditionHealth StatusAll monitored SMB services are up and runningUpThe lwio service is running but one
IMPORTANT: Keep in mind the following:◦ If files are handled over a different protocol or directly on the StoreAll server viaPowerShell, the alternate
Modifying a snapshot schedule...241Managing software snapshots..
On the Permissions page, specify permissions for users and groups allowed to access the share.80 Using SMB
Click Add to open the New User/Group Permission Entry dialog box, where you can configurepermissions for a specific user or group. The completed entri
bitmask is 1-32. The completed entry appears on the Client IP Filters list on the Client Filteringpage.On the Advanced Settings page, enable or disabl
Configuring SMB signingThe SMB signing feature specifies whether clients must support SMB signing to access SMB shares.You can apply the setting to al
When configuring SMB signing, note the following:• SMB2 is always enabled.• Use the Required check box to specify whether SMB signing (with either SMB
On the CIFS Shares panel, click Add or Modify to open the File Shares wizard, where you cancreate a new share or modify the selected share. Click Dele
NOTE: You cannot create an SMB share with a name containing an exclamation point (!) or anumber sign (#) or both.Use the -A ALLOWCLIENTIPSLIST or -E D
Linux permissions on files created over SMBThe Linux permissions on files and folders created over SMB are not generally of interest to Windowsusers a
Gid: 1060635137SID: S-1-5-21-3681183244-3700010909-334885885-513We can find the GID assigned by the StoreAll CIFS server for any Active Directory Grou
3. On the Add/Remove Snap-in window, click Add.4. On the Add Standalone Snap-in window, select Shared Folders and click Add.5. On the Shared Folders w
21 Support and other resources...286Contacting HP...
6. Click OK to exit the Add or Remove Snap-ins window.7. Expand Shared Folders (\\<address>).8. Select Shares and manage the shares as needed.Sa
NOTE: The Browse button cannot be used to locate the file system.• The directory to be shared will be created if it does not already exist.• The permi
To add a new share, select Shares > New Share and run the Create A Shared Folder Wizard. Onthe Folder Path panel, enter the path to the share, bein
Best Practices when mapping shares:• A share should always be mapped using the User Virtual Interface (the User VIF) of a fileserving node as that int
1. Click Start, click Run, type mmc, and then click OK.2. On the MMC Console menu, click Add/Remove Snap-in.3. Click Add, and then click Active Direct
The following article provides more information about modifying attributes in the Active Directoryglobal catalog:http://support.microsoft.com/kb/24871
Synchronizing Active Directory 2008 with the NTP server used by the clusterIt is important to synchronize Active Directory with the NTP server used by
4. Create the new shares on the cluster storage and assign each share the appropriate path. Forexample, assign srv1-DATA to /srv1/data, and assign srv
SMB clientsSMB clients access shares on the StoreAll software cluster in the same way they access shares ona Windows server.Viewing quota informationW
Access Control Lists (ACLs)StoreAll SMB shadow copy behaves in the same manner as Windows shadow copy with respectto ACL restoration. When a user rest
Comentários a estes Manuais