HP X9000 File Serving Software File SystemUser GuideAbstractThis guide describes how to configure and manage X9000 Software file systems and how to us
protocols must mount the file system from a file serving node. All requests are sent to themounting server, which performs the required routing.5. A c
11 Using remote replicationThis chapter describes how to configure and manage the Continuous Remote Replication (CRR)service.OverviewThe CRR service p
NOTE:Run-once can also be used to replicate a single software snapshot. This must be done on the GUI.Remote cluster or intracluster replicationsYou ca
File system snapshot replicationYou can use the run-once replication mode to replicate a single file system snapshot. If a snapshotreplication is not
The Server Assignments section allows you to specify server assignments for the export. Check thebox adjacent to Server to use the default assignments
Creating the target exportTo create a mapping between the source cluster and the target export that receives the replicateddata, execute the following
Viewing replication tasksTo view replication tasks for a particular file system, select that file system on the GUI and thenselect Active Tasks > R
Remote cluster replicationsRemote cluster replications can be configured for continuous or run-once mode.For a run-once replication, either specify th
For a run-once replication, either specify the source directory or click Use a snapshot and thenselect the appropriate Snap Tree and snapshot.For both
Pausing or resuming a replication taskTo pause a task, select it on the Remote Replication Tasks panel and click Pause. When you pausea task, the stat
option, the replication starts at the root of the file system. The run-once job terminates after thereplication is complete; however, the job can be s
deletion. Users can access the filesystem or directory as it appeared at the instant of thesnapshot. See “Creating X9000 software snapshots” (page 126
Querying remote replication tasksUse the following command to list all active replication tasks in the cluster, optionally restricted bythe specified
1. Stop write traffic to the remote site.2. Set up Run-Once remote replication, with the remote site acting as the source and the localsite acting as
12 Managing data retention and validationThe data retention and validation feature is intended for sites that need to archive read-only filesfor busin
• File access permissions• File modification timeAlso, no new hard links can be made to the file and the extended attributes cannot be added,modified,
New file systemsThe New Filesystem Wizard includes a WORM/Retention dialog box that allows you to enabledata retention and define a retention profile
Check Enable Data Validation to schedule periodic scans on the file system. Click Next to acceptthe default schedule, or select Modify to open the Dat
–o "retenMode=<mode>,retenDefPeriod=<period>,retenMinPeriod=<period>,retenMaxPeriod=<period>"The retenMode option is
To enable data retention on an existing file system using the CLI, run this command:ibrix_fs -W -f FSNAME -o "retenMode=<mode>,retenDefPeri
To view the retention profile from the CLI, use the ibrix_fs -i command, as in the followingexample:ibrix_fs -i -f ifs1 FileSystem: ifs1==============
NOTE: For CIFS users setting the access time manually for a file, the maximum retention periodis100 years from the date the file was retained. For NFS
2 Creating and mounting file systemsThis chapter describes how to create file systems and mount or unmount them.Creating a file systemYou can create a
IMPORTANT: Do not use the ibrix_reten_adm command on a file system that is not enabledfor data retention.Setting or removing a legal holdWhen a legal
See the Linux date(1) man page for a description of the valid date/time formats for theexpire_time parameter.Removing the retention periodWhen you rem
Go to the Schedule tab to specify when you want to run the scan.Starting an on-demand validation scanYou can run a validation scan at any time. Select
To start an on-demand validation scan from the CLI, use the following command:ibrix_datavalidation -c -f FSNAME [-d PATH]Viewing, stopping, or pausing
Meta hash: 80f68a53bb4a49d0ca19af1dec18e2ff0cf965daData hash: d64492d19786dddf50b5a7c3bebd3fc8930fc493The showvms command displays the hash sums store
Also note the following:• Multiple hard links on retained files on the replication source are not replicated. Only the firsthard link encountered by r
13 Creating X9000 software snapshotsThe X9000 software snapshot feature allows you to capture a point-in-time copy of a file systemor directory for on
You can create a snapshot directory tree for an entire file system or a directory in that file system.When entering the directory path, do not specify
Modifying a snapshot scheduleYou can change the snapshot schedule at any time. On the Snap Trees panel, select the appropriatesnap tree, select Modify
To take a snapshot from the CLI, use the following command:ibrix_snap -c -f FSNAME -P SNAPTREEPATH -n NAMEPATTERNSNAPTREEPATH is the full directory pa
On the Configure Options dialog box, supply a name for the file system, and specify the appropriateconfiguration options.If data retention will be use
2011-06-01T140000_hourly 2011-06-01T220000_hourly 2011-06-02T060000_hourly2011-06-01T150000_hourly 2011-06-01T230000_hourly 2011-06-02T070000_hour
to copy files from the snapshot directory to a local or remote directory (see “Starting a replicationtask” (page 105)).Deleting snapshotsScheduled sna
On the General tab, select a reclamation strategy:• Maximum Space Reclaimed. The reclamation task recovers all snapped space eligible forrecovery. It
To stop a running reclamation task, click Stop on the Task Summary panel.Managing reclamation tasks from the CLITo start a reclamation task from the C
1. Disable any schedules on the snap tree. Select the snap tree on the Snap Trees panel, selectModify, and remove the Frequency settings on the Modify
14 Creating block snapshotsThe block snapshot feature allows you to capture a point-in-time copy of a file system for onlinebackup purposes and to sim
NOTE: If the snapshot store is too small, the snapshot will eventually exceed the available space(unless you detect this and manually increase storage
The type of storage array determines the maximum number of snapshots you can keep and mountper file system.Maximum number of snapshots to mountMaximum
Under Snapshot Configuration, select New to create a new snapshot scheme. The Create SnapshotScheme dialog box appears.138 Creating block snapshots
On the General tab, enter a name for the strategy and then specify the number of snapshots tokeep and mount on a daily, weekly, and monthly basis. Kee
The default retention period determines whether you can manage WORM (non-retained) files aswell as WORM-retained files. (WORM (non-retained) files can
For either template, enter one or more of the following variables. The variables must be enclosedin braces ({ }) and separated by underscores (_). The
Creating an automated snapshot scheme from the CLIYou can create an automated snapshot scheme with the ibrix_vs_snap_strategy command.However, you wil
Viewing automated snapshot schemesOn the GUI, you can view snapshot schemes on the Create Snapshot dialog box. Select Recurringas the Snapshot Type, a
Deleting snapshotsDelete snapshots to free up resources when the snapshot is no longer needed or to create a newsnapshot when you have already created
0.00 0.00 0 0 0 MIXED 7 Hrs 56 Mins 46 Secs ago4 ib50-243 ilv14_msa_snap9__snap OK, SnapUsed=8%
The next window shows a CIFS client accessing the snapshot file system .fs1_snap1. The originalfile system is mapped to drive X.Accessing snapshot fil
Troubleshooting block snapshotsSnapshot reserve is full and the MSA2000 is deleting snapshot volumesWhen the snapshot reserve is full, the MSA2000 wil
15 Using data tieringThis chapter describes how to configure and manage data tiering.OverviewUse the data tiering feature to set a preferred tier wher
Note the following:• A tiering policy can contain multiple rules.• Tiering rules are based on individual file attributes.• All rules are executed when
Expanding a file systemYou can make tier assignments for new segments as you add them.NOTE: Verify that no tiering job is running before executing the
If the file system will be exported through NFS, configure an NFS export record on the NFS Exportdialog box. See “Using NFS” (page 44) for more inform
You can perform these management activities from either the management console GUI or the CLI.This section provides instructions for managing via the
The second column in the output lists the ID number assigned to the rule. In the example above,the ID number is 2.Deleting a tiering policy ruleBefore
Use the following qualifiers for relative times and dates:• Relative time: Enter in rules as year or years, month or months,week or weeks, day ordays,
The rule in the following example is based on the file’s last modification time, using a relative timeperiod. All files whose last modification date i
files will be encountered at the beginning of the job, causing space on tier 2 to be consumed fasterthan on tier 1. Once a destination tier is full, o
16 Using file allocationThis chapter describes how to configure and manage file allocation.OverviewX9000 Software allocates new files and directories
How file allocation settings are evaluatedX9000 clients and NFS/CIFS clients use the following precedence rules to evaluate the file allocationsetting
Setting a file allocation policyTo set a file allocation policy, use the following command:ibrix_fs_tune -f FSNAME {-h HOSTLIST|-g GROUPLIST} –s LVNAM
Tuning allocation policy settingsTo optimize system performance, you can globally change the following allocation policy settingsfor a file system:• F
17 Support and other resourcesContacting HPFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore con
If clients will access the file system using HTTP or HTTPS, create an HTTP share on the HTTP Exportdialog box. An HTTP configuration profile and an HT
GlossaryACE Access control entry.ACL Access control list.ADS Active Directory Service.ALB Advanced load balancing.BMC Baseboard Management Configurati
SELinux Security-Enhanced Linux.SFU Microsoft Services for UNIX.SID Secondary controller identifier number.SNMP Simple Network Management Protocol.TCP
IndexSymbols/etc/likewise/vhostmap file, 7032-bit mode, disable, 3964-bit mode, enable, 12Aauthentication methodsActive Directory, 51Local Users, 51au
documentrelated documentation, 159EExport Control, enable, 21Ffile allocationdefined, 155list policies, 158policies, defined, 155precedence rules, 156
LLinux static user mapping with Active Directory, 66Linux X9000 clientsdisk space information, 35Local users and groups, 53logical volumesview informa
defined, 9delete, 40rebalance, 36stop tasks, 39track job progress, 38view job status, 38SMB server consolidation, 69SMB signing, 59snapshots, blockacc
If clients will access the share using FTP or FTPS, create an FTP share on the FTP Share dialog box.An FTP configuration profile and an SSL certificat
For example:ibrix_fs -o "retenMode=Enterprise,retenDefPeriod=5m,retenMinPeriod=2,retenMaxPeriod=30y" -c -f ifs1 -s ilv_[1-4] -aCreating a fi
You can also view mountpoint information for a particular server. Select that server on the Serverstop panel, and then select Mountpoints from the low
© Copyright 2009, 2011 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP required for possession, use or
NOTE: A file system must be mounted on the file serving node that owns the root segment (thatis, segment 1) before it can be mounted on any other host
To remove a client access entry, select the affected file system on the GUI, and then select ClientExports from the lower Navigator. Select the access
3 Setting up quotasQuotas can be assigned to individual users or groups, or to a directory tree. Individual quotaslimit the amount of storage or the n
On the management console, select the file system and then select Quotas from the lower Navigator.On the Quota Summary bottom panel, click Modify.To e
To configure a group quota, select the file system where the quotas will be configured. Next, selectQuotas > Group Quotas from the lower Navigator,
CLI procedureUse the following commands to set quotas for users and groups:• Set a quota for a single user:ibrix_edquota -s -u “USER” -f FSNAME [-M SO
To change a directory tree quota, select the directory tree on the Quota Usage Limits bottom panel,and then click Modify.CLI procedureTo create a dire
Using a quotas fileQuota limits can be imported into the cluster from the quotas file, and existing quotas can beexported to the file. See “Format of
name. The “C” format specifies a directory tree, where the path exists, but the identifier name forthe directory tree will not be created until the qu
On the Task Summary panel, select Start to open the Start Online quota check dialog box andselect the appropriate mode.The Task Summary panel displays
Contents1 Using X9000 Software file systems...9File system organization and access...
Troubleshooting quotasRecreated directory does not appear in directory tree quotaIf you create a directory tree quota on a specific directory and dele
4 Maintaining file systemsThis chapter describes how to extend a file system, rebalance segments, delete a file system or filesystem component, and ch
Viewing physical volume informationUse the following command to view information about physical volumes:ibrix_pv -lThe following table lists the outpu
Viewing logical volume informationTo view information about logical volumes, use the ibrix_lv -l command. The following tablelists the output fields f
DescriptionFieldYes if enabled; No if not.EXPORT_CONTROL_ENABLEDYes if enabled; No if not.QUOTA_ENABLEDIf data retention is enabled, the retention pol
DescriptionFieldBackup host name.BACKUPSegment type. MIXED means the segment can contain both files and directories.TYPETier to which the segment was
On the CLI, use the ibrix_fs command to extend a file system. Segments are added to the fileserving nodes in a round-robin manner. If tiering rules ar
sources or destinations for a rebalance task, candidate segments are sorted into sources anddestinations and then rebalanced as evenly as possible.If
Rebalancing segments from the CLITo rebalance all segments, use the following command. Include the -a option to run the rebalanceoperation in analytic
ibrix_rebalance -l [-f FSLIST]ibrix_rebalance -i [-f FSLIST]The first command reports summary information. The second command lists jobs by task ID an
Deleting file serving nodes and X9000 clients...40Checking and repairing file syst
ibrix_fs -d -f ifs1,ifs2If data retention is enabled on the file system, include the -R option in the command. For example:ibrix_fs -d -R -f ifs2Delet
The command runs in four phases and has two running modes: analytical and corrective. You mustrun the phases in order and you must run all of them:• P
Cannot mount on an X9000 clientVerify the following:• The file system is mounted and functioning on the file serving nodes.• The mountpoint exists on
ref_counter ... 1038 state_flags ... SEGMENT_LOCAL SEGMENT_PREFERED SEGMENT_DHB <SEGMENT_ ORPHAN_LI
5 Using NFSThis section describes how to export file systems for NFS, how to autoconnect NFS clients, andhow to set up NFS clients.Exporting a file sy
From the CLITo export a file system from the CLI, use the ibrix_exportfs command:ibrix_exportfs -f FSNAME -h HOSTNAME -p CLIENT1:PATHNAME1,CLIENT2:PAT
To provide world read-only access to file system ifs1 located at /usr/src on file serving nodes1.hp.com:ibrix_exportfs -f ifs1 -h s1.hp.com -p :/usr/s
Every client must have two files placed in its /etc directory. The necessary files are on themanagement console; edit the files there and copy them to
Select the file system on the GUI, expand Active Tasks in the lower Navigator, and select CaseInsensitivity On the Task Summary bottom panel, click Ne
NOTE: To verify the coordinating server, select File System > Inactive Tasks. Then select the taskID from the display and select Details.The log fi
Managing FTP shares...77Adding an FTP share
The case-insensitive setting of the source directories is not retained on the destination directories.Instead, the setting for the destination file sy
6 Configuring authentication for CIFS, FTP, and HTTPUsers accessing CIFS, FTP, or HTTP shares can be authenticated through either Active Directory orL
NOTE: When you successfully configure Active Directory authentication, the machine is partof the domain until you remove it from the domain, either wi
To configure Local Users authentication from the CLI, use the following command:ibrix_auth -N [-h HOSTLIST]To configure Active Directory authenticati
On the CLI, use the following command to view information about all local group accounts:ibrix_localgroups -LTo see information for a specific local g
Modifying a local groupTo change the information for a local group account, select the account on the Local Groups paneland click Modify. You can then
To add a local user account from the CLI, use this command:ibrix_localusers -a -u USERNAME -g DEFAULTGROUP -p PASSWORD [-h HOMEDIR][-s SHELL] [-i USER
7 Using CIFSThe X9000 Software CIFS server implementation allows you to create file shares for data storedon the cluster. The CIFS server provides a t
To start, stop, or restart the service from the CLI, use the following command:ibrix_server –s –t cifs –c {start|stop|restart}CIFS sharesWindows clien
You can add, modify, or delete shares from this panel, but you cannot configure CIFS settings, asthose settings apply to all CIFS shares configured in
Starting a run-once directory replication task...109Stopping a remote replication
To view the current setting for SMB signing, use the following command:ibrix_cifsconfig -iTo configure SMB signing from the command line, use the foll
The Add a CIFS Share dialog box allows you to share the entire filesystem or a specific subdirectory.Enter a name and description for the share, selec
To modify a share using the CLI, execute the following command:ibrix_cifs -m -s SHARENAME [-S SETTINGLIST] [-h HOSTLIST]Deleting a CIFS shareTo delete
6. Click Close > OK to exit the dialogs.7. Expand Shared Folders (\\<address>).8. Select Shares and manage the shares as needed.Windows Vista
6. Click OK to exit the Add or Remove Snap-ins window.7. Expand Shared Folders (\\<address>).8. Select Shares and manage the shares as needed.Sa
NOTE: The Browse button cannot be used to locate the file system.• The directory to be shared will be created if it does not already exist.• The permi
To add a new share, select Shares > New Share and run the Create A Shared Folder Wizard. Onthe Folder Path panel, enter the path to the share, bein
To use Linux static user mapping, complete these steps:• Configure Active Directory.• Assign POSIX attributes to users and groups in Active Directory.
The next dialog box shows the properties for the gidNumber attribute.The following article provides more information about modifying attributes in the
Attributes tab. For users, you can set the UID, login shell, home directory, and primary group. Forgroups, set the GID.Consolidating SMB servers with
Other automated snapshot procedures...141Managing block snapshots...
When this configuration is in place, a client request to access share \\srv1/data will be translatedto share srv1-DATA at /srv1/data on the filesystem
Differences in locking behaviorWhen CIFS clients access a share from different servers, as in the X9000 Software environment,the behavior of byte-rang
and honors ACLS. The UID/GIDs and permission bits for files on a directory tree are peripheralto this activity, and are used only as much as necessary
Changing the way CIFS inherits permissions on files accessed from Linux applicationsTo avoid the CIFS server modifying file permissions on directory t
xcopy: include the option /C; in general, /S /I /Y /C are good baseline options.robocopy: include the option /ZB; in general, /S /E /COPYALL /ZB are g
8 Using FTPThe FTP feature allows you to create FTP file shares for data stored on the cluster. Clients accessthe FTP shares using standard FTP and FT
• If the directory path to the share includes a subdirectory, be sure to create the subdirectoryon the file system and assign read/write/execute permi
Modifying a configuration profileTo modify a configuration profile, select the profile on the FTP Config Profiles panel, and clickModify Profile. You
The Users tab lists the users allowed read access, write access, or both on a share directory. Youcan add or delete users as necessary.78 Using FTP
To assign share permissions to specific users, click Add and complete the Add Users to Sharedialog box.To add an FTP share from the command line, use
Subscription service...159Glossary...
Modifying an FTP shareTo change the properties for an FTP share, select the share on the Shares panel, click Modify Share,and make the necessary chang
Accessing sharesClients can access an FTP share by specifying a URL in their browser (Internet Explorer or MozillaFirefox). In the following URLs, IP_
For Active Directory users (specify the user as in this example: ASM2k3.com\\ib1):• Upload a file using FTP protocol:curl -T <filename> -k ftp:/
9 Using HTTPThe HTTP feature allows you to create HTTP file shares for data stored on the cluster. Clients accessthe HTTP shares using standard HTTP a
not create the subdirectory if it does not exist, and instead adds a /pub/ directory to theshare path.)• For High Availability, when specifying IP add
On the Add HTTP Share dialog box, click Add HTTP Share and set the appropriate parameters.Note the following:• The file system selected for the share
To allow specific users read access, write access, or both, click Add. On the Add Users to Sharedialog box, assign the appropriate permissions to the
When the wizard is complete, users can access the share from a browser. For example, if youconfigured the share with the anonymous user, specified 99.
To modify a configuration profile from the command line, use the following command:ibrix_httpconfig -m PROFILENAME [-h HOSTLIST] [-S SETTINGLIST]Viewi
ibrix_httpvhost -a VHOSTNAME -c PROFILENAME -I IP-Address:Port [-SSETTINGLIST]Modifying a virtual hostTo change the properties for a virtual host, sel
1 Using X9000 Software file systemsFile system organization and accessThe following diagram shows how data is organized on a file system and how it is
Adding an HTTP shareTo add an HTTP share, click Add Share on the Shares bottom panel. The HTTP Wizard opens atthe Create Share dialog box.To add an HT
Deleting an HTTP shareTo remove an HTTP share, select the share on the Shares bottom panel, click Delete Share, andthen confirm the operation. To remo
For anonymous users:• Upload a file using HTTP protocol:curl -T <filename> http://IP_address:port/urlpath/• Upload a file using HTTPS protocol:c
• Update the Windows registry.When using WebDAV shares in Windows Explorer, you must edit the Windows registry ifthere are many files in the WebDAV sh
storage.hp.com/ cannot be mapped. Also, you cannot map https:// because oflimitations with Windows 2003.• Delete read-only files through Windows Explo
Mapping HTTP WebDAV share as AD or local user through Windows Explorerfails if the HTTP Vhost IP address is usedMapping the HTTP WebDAV share to a net
10 Managing SSL certificatesServers accepting FTPS and HTTPS connections typically provide an SSL certificate that verifies theidentity and owner of t
1. Generate a private key:openssl genrsa -des3 -out server.key 1024You will be prompted to enter a passphrase. Be sure to remember the passphrase.2. R
Adding a certificate to the clusterTo add an existing certificate to the cluster, click Add on the Certificates panel. On the AddCertificate dialog bo
Exporting a certificateIf necessary, you can display a certificate and then copy and save the contents for future use. Thisstep is called exporting. S
Commentaires sur ces manuels