HP StoreAll Storage User Manual

HP IBRIX 9000 Storage File System User Guide

Abstract
This guide describes how to configure and manage IBRIX software file systems and how to use NFS, SMB, FTP, and HTTP to access file system data. The guide also describes the following file system features: quotas, remote replication, snapshots, data retention and validation, data tiering, and file allocation. The guide is intended for system administrators managing 9300 Storage Gateway, 9320 Storage, 9720 Storage, and 9730 Storage. For the latest IBRIX guides, browse to
nl
HP Part Number: TA768-96076 Published: December 2012 Edition: 9
© Copyright 2009, 2012 Hewlett-Packard Development Company, L.P.
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.
The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Acknowledgments
Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation.
UNIX® is a registered trademark of The Open Group.
Revision History
DateEdition
DescriptionSoftware
Version
Initial release of HP 9000 File Serving Software5.3.1November 20091
Updated license and quotas information5.3.2December 20092
5.4.0April 20103
Added information about file cloning, CIFS, directory tree quotas, the Statistics tool, and GUI procedures
Removed information about the Statistics tool5.4.1July 20104
5.5.0December 20105
Added information about authentication, CIFS, FTP, HTTP, SSL certificates, and remote replication
Updated CIFS, FTP, HTTP, and snapshot information5.6April 20116
6.0September 20117
Added or updated information about data retention and validation, software snapshots, block snapshots, remote replication, HTTP, case insensitivity, quotas
6.1June 20128
Added or updated information about file systems, file share creation, rebalancing segments, remote replication, user authentication, CIFS, LDAP, data retention, data tiering, file allocation, quotas, Antivirus software
6.2December 20129
Added or updated information about file systems, physical volumes, segment rebalancing, remote replication, Antivirus scans, REST API, Express Query, auditing, HTTP, quotas, data tiering, renamed CIFS to SMB

Contents

1 Using IBRIX software file systems...................................................................9
File system operations................................................................................................................9
File system building blocks.......................................................................................................11
Configuring file systems...........................................................................................................11
Accessing file systems.............................................................................................................12
2 Creating and mounting file systems.............................................................13
Creating a file system..............................................................................................................13
Using the New Filesystem Wizard........................................................................................13
Configuring additional file system options.............................................................................17
Creating a file system using the CLI......................................................................................18
File limit for directories............................................................................................................19
Managing mountpoints and mount/unmount operations..............................................................19
GUI procedures.................................................................................................................19
CLI procedures..................................................................................................................21
Mounting and unmounting file systems locally on IBRIX 9000 clients.........................................22
Limiting file system access for IBRIX 9000 clients.........................................................................23
Using Export Control...............................................................................................................24
3 Configuring quotas...................................................................................25
How quotas work...................................................................................................................25
Enabling quotas on a file system and setting grace periods..........................................................25
Setting quotas for users, groups, and directories.........................................................................26
Using a quotas file..................................................................................................................29
Importing quotas from a file................................................................................................29
Exporting quotas to a file....................................................................................................30
Format of the quotas file.....................................................................................................30
Using online quota check........................................................................................................31
Configuring email notifications for quota events..........................................................................32
Deleting quotas......................................................................................................................32
Troubleshooting quotas............................................................................................................33
4 Maintaining file systems............................................................................34
Best practices for file system performance...................................................................................34
Viewing information about file systems and components...............................................................34
Viewing physical volume information....................................................................................35
Viewing volume group information.......................................................................................35
Viewing logical volume information......................................................................................36
Viewing file system information............................................................................................36
Viewing disk space information from a Linux 9000 client........................................................39
Extending a file system............................................................................................................39
Rebalancing segments in a file system.......................................................................................40
How rebalancing works......................................................................................................40
Rebalancing segments on the GUI........................................................................................41
Rebalancing segments from the CLI......................................................................................43
Tracking the progress of a rebalance task.............................................................................43
Viewing the status of rebalance tasks....................................................................................44
Stopping rebalance tasks....................................................................................................44
Deleting file systems and file system components.........................................................................44
Deleting a file system..........................................................................................................44
Deleting segments, volume groups, and physical volumes........................................................44
Deleting file serving nodes and IBRIX 9000 clients.................................................................45
Checking and repairing file systems..........................................................................................45
Contents 3
Analyzing the integrity of a file system on all segments...........................................................46
Clearing the INFSCK flag on a file system.............................................................................46
Troubleshooting file systems......................................................................................................46
Segment of a file system is accidently deleted........................................................................46
ibrix_pv -a discovers too many or too few devices..................................................................47
Cannot mount on an IBRIX 9000 client.................................................................................47
NFS clients cannot access an exported file system..................................................................48
User quota usage data is not being updated.........................................................................48
File system alert is displayed after a segment is evacuated.......................................................48
SegmentNotAvailable is reported.........................................................................................48
SegmentRejected is reported...............................................................................................48
ibrix_fs -c failed with "Bad magic number in super-block"........................................................50
5 Using NFS...............................................................................................51
Exporting a file system............................................................................................................51
Unexporting a file system....................................................................................................54
Using case-insensitive file systems ............................................................................................54
Setting case insensitivity for all users (NFS/Linux/Windows)....................................................55
Viewing the current setting for case insensitivity......................................................................55
Clearing case insensitivity (setting to case sensitive) for all users (NFS/Linux/Windows)..............55
Log files............................................................................................................................56
Case insensitivity and operations affecting directories.............................................................56
6 Configuring authentication for SMB, FTP, and HTTP.......................................58
Using Active Directory with LDAP ID mapping............................................................................58
Using LDAP as the primary authentication method.......................................................................59
Requirements for LDAP users and groups...............................................................................59
Configuring LDAP for IBRIX software.....................................................................................59
Configuring authentication from the GUI....................................................................................60
Viewing or changing authentication settings...............................................................................68
Configuring authentication from the CLI.....................................................................................69
Configuring Active Directory ...............................................................................................69
Configuring LDAP..............................................................................................................69
Configuring LDAP ID mapping.............................................................................................70
Configuring Local Users and Groups authentication................................................................71
7 Using SMB..............................................................................................73
Configuring file serving nodes for SMB......................................................................................73
Starting or stopping the SMB service and viewing SMB statistics...................................................73
Monitoring SMB services.........................................................................................................74
SMB shares...........................................................................................................................75
Configuring SMB shares with the GUI...................................................................................76
Configuring SMB signing ...................................................................................................80
Managing SMB shares with the GUI....................................................................................81
Configuring and managing SMB shares with the CLI..............................................................82
Managing SMB shares with Microsoft Management Console...................................................83
Linux static user mapping with Active Directory...........................................................................87
Configuring Active Directory................................................................................................88
Assigning attributes............................................................................................................89
Synchronizing Active Directory 2008 with the NTP server used by the cluster.............................90
Consolidating SMB servers with common share names................................................................90
SMB clients............................................................................................................................92
Viewing quota information..................................................................................................92
Differences in locking behavior............................................................................................92
SMB shadow copy.............................................................................................................92
Permissions in a cross-protocol SMB environment.........................................................................94
4 Contents
How the SMB server handles UIDs and GIDs.........................................................................94
Permissions, UIDs/GIDs, and ACLs.......................................................................................95
Changing the way SMB inherits permissions on files accessed from Linux applications................96
Troubleshooting SMB..............................................................................................................96
8 Using FTP................................................................................................98
Best practices for configuring FTP..............................................................................................98
Managing FTP from the GUI....................................................................................................98
Configuring FTP ................................................................................................................98
Managing the FTP configuration........................................................................................102
Managing FTP from the CLI....................................................................................................103
Configuring FTP ..............................................................................................................103
Managing the FTP configuration........................................................................................103
The vsftpd service.................................................................................................................104
Starting or stopping the FTP service manually...........................................................................104
Accessing shares..................................................................................................................105
FTP and FTPS commands for anonymous shares...................................................................105
FTP and FTPS commands for non-anonymous shares.............................................................106
FTP and FTPS commands for Fusion Manager......................................................................107
9 Using HTTP............................................................................................108
HTTP share types..................................................................................................................108
Process checklist for creating HTTP shares................................................................................108
Best practices for configuring HTTP.........................................................................................109
Managing HTTP from the GUI................................................................................................109
Configuring HTTP shares...................................................................................................109
Managing the HTTP configuration......................................................................................116
Tuning the socket read block size and file write block size .........................................................116
Managing HTTP from the CLI.................................................................................................117
Configuring HTTP.............................................................................................................117
Managing the HTTP configuration......................................................................................118
Starting or stopping the HTTP service manually.........................................................................118
Accessing shares..................................................................................................................119
Configuring Windows clients to access HTTP WebDAV shares....................................................120
Troubleshooting HTTP............................................................................................................121
10 Managing SSL certificates......................................................................123
Creating an SSL certificate.....................................................................................................123
Adding a certificate to the cluster............................................................................................125
Exporting a certificate...........................................................................................................126
Deleting a certificate.............................................................................................................126
11 Using remote replication........................................................................127
Overview............................................................................................................................127
Continuous or run-once replication modes...........................................................................127
Using intercluster replications.............................................................................................128
Using intracluster replications............................................................................................129
File system snapshot replication..........................................................................................129
Configuring the target export for replication to a remote cluster...................................................129
GUI procedure................................................................................................................130
CLI procedure..................................................................................................................131
Configuring and managing replication tasks on the GUI............................................................133
Viewing replication tasks...................................................................................................133
Starting a replication task ................................................................................................135
Pausing or resuming a replication task................................................................................138
Stopping a replication task................................................................................................138
Configuring and managing replication tasks from the CLI...........................................................139
Contents 5
Starting a remote replication task to a remote cluster............................................................139
Starting an intracluster remote replication task.....................................................................140
Starting a run-once directory replication task.......................................................................140
Stopping a remote replication task.....................................................................................140
Pausing a remote replication task.......................................................................................140
Resuming a remote replication task....................................................................................140
Querying remote replication tasks......................................................................................140
Replicating WORM/retained files...........................................................................................141
Configuring remote failover/failback.......................................................................................141
Troubleshooting remote replication..........................................................................................142
12 Managing data retention.......................................................................143
Overview............................................................................................................................143
Data retention.................................................................................................................143
Data validation scans.......................................................................................................144
Enabling file systems for data retention....................................................................................145
Viewing the retention profile for a file system.......................................................................148
Changing the retention profile for a file system.....................................................................149
Managing WORM and retained files......................................................................................149
Creating WORM and WORM-retained files........................................................................149
Viewing the retention information for a file..........................................................................150
File administration............................................................................................................150
Running data validation scans................................................................................................153
Scheduling a validation scan.............................................................................................153
Starting an on-demand validation scan...............................................................................154
Viewing, stopping, or pausing a scan.................................................................................155
Viewing validation scan results..........................................................................................155
Viewing and comparing hash sums for a file.......................................................................156
Handling validation scan errors.........................................................................................156
Creating data retention reports...............................................................................................157
Generating and managing data retention reports.................................................................158
Generating data retention reports from the CLI.....................................................................159
Using hard links with WORM files..........................................................................................160
Using remote replication........................................................................................................160
Backup support for data retention...........................................................................................160
Troubleshooting data retention................................................................................................160
13 Express Query......................................................................................162
Managing the metadata service.............................................................................................162
Backing up and restoring file systems with Express Query data..............................................163
Saving and importing file system metadata..........................................................................164
Metadata and continuous remote replication.......................................................................166
Metadata and synchronized server times.................................................................................166
Managing auditing...............................................................................................................167
Audit log........................................................................................................................167
Audit log reports..............................................................................................................168
StoreAll REST API..................................................................................................................170
Dual nature of REST API shares..........................................................................................170
Component overview........................................................................................................171
File content transfer..........................................................................................................175
Custom metadata assignment............................................................................................177
Metadata queries............................................................................................................179
Retention properties assignment.........................................................................................189
HTTP Status Codes...........................................................................................................191
6 Contents
14 Configuring Antivirus support..................................................................192
Adding or removing external virus scan engines.......................................................................193
Enabling or disabling Antivirus on IBRIX file systems..................................................................194
Updating Antivirus definitions.................................................................................................194
Configuring Antivirus settings.................................................................................................195
Managing Antivirus scans......................................................................................................199
Starting or scheduling Antivirus scans.................................................................................199
Viewing, pausing, resuming, or stopping Antivirus scan tasks ................................................201
Viewing Antivirus statistics......................................................................................................202
Antivirus quarantines and software snapshots...........................................................................202
15 Creating IBRIX software snapshots...........................................................204
File system limits for snap trees and snapshots..........................................................................204
Configuring snapshot directory trees and schedules...................................................................204
Modifying a snapshot schedule.........................................................................................206
Managing software snapshots................................................................................................206
Taking an on-demand snapshot.........................................................................................206
Determining space used by snapshots................................................................................207
Accessing snapshot directories...........................................................................................207
Restoring files from snapshots............................................................................................208
Deleting snapshots...........................................................................................................209
Moving files between snap trees.............................................................................................212
Backing up snapshots............................................................................................................212
16 Creating block snapshots.......................................................................213
Setting up snapshots.............................................................................................................213
Preparing the snapshot partition........................................................................................213
Registering for snapshots..................................................................................................214
Discovering LUNs in the array............................................................................................214
Reviewing snapshot storage allocation................................................................................214
Automated block snapshots....................................................................................................214
Creating automated snapshots using the GUI......................................................................215
Creating an automated snapshot scheme from the CLI..........................................................218
Other automated snapshot procedures................................................................................219
Managing block snapshots....................................................................................................220
Creating an on-demand snapshot......................................................................................220
Mounting or unmounting a snapshot..................................................................................220
Recovering system resources on snapshot failure...................................................................220
Deleting snapshots...........................................................................................................220
Viewing snapshot information............................................................................................221
Accessing snapshot file systems..............................................................................................222
Troubleshooting block snapshots.............................................................................................224
17 Using data tiering.................................................................................225
Creating and managing data tiers..........................................................................................225
Viewing tier assignments and managing segments....................................................................230
Viewing data tiering rules......................................................................................................231
Running a migration task.......................................................................................................232
Configuring tiers and migrating data using the CLI....................................................................233
Changing the tiering configuration with the CLI.........................................................................236
Writing tiering rules..............................................................................................................236
Rule attributes..................................................................................................................236
Operators and date/time qualifiers....................................................................................237
Rule keywords.................................................................................................................238
Migration rule examples...................................................................................................238
Ambiguous rules..............................................................................................................239
Contents 7
18 Using file allocation..............................................................................240
Overview............................................................................................................................240
File allocation policies......................................................................................................240
How file allocation settings are evaluated...........................................................................241
When file allocation settings take effect on the 9000 client....................................................242
Using CLI commands for file allocation...............................................................................242
Setting file and directory allocation policies.............................................................................242
Setting file and directory allocation policies from the CLI.......................................................243
Setting segment preferences...................................................................................................243
Creating a pool of preferred segments from the CLI..............................................................244
Restoring the default segment preference.............................................................................244
Tuning allocation policy settings.............................................................................................245
Listing allocation policies.......................................................................................................245
19 Support and other resources...................................................................247
Contacting HP......................................................................................................................247
Related information...............................................................................................................247
HP websites.........................................................................................................................247
Subscription service..............................................................................................................247
20 Documentation feedback.......................................................................248
Glossary..................................................................................................249
Index.......................................................................................................251
8 Contents

1 Using IBRIX software file systems

File system operations

The following diagram highlights the operating principles of the IBRIX file system.
The topology in the diagram reflects the architecture of the HP 9320, which uses a building block of server pairs (known as couplets) with SAS attached storage. In the diagram:
There are four file serving nodes, SS1–SS4. These nodes are also called segment servers.
SS1 and SS2 share access to segments 1–4 through SAS connections to a shared storage
array.
SS3 and SS4 share access to segments 5-8 through SAS connections to a shared storage
array.
One client is accessing the name space using NAS protocols.
One client is using the proprietary IBRIX client.
The following steps correspond to the numbering in the diagram:
1. The “namespace” of the file system is a collection of segments. Each segment is simply a
repository for files and directories with no implicit namespace relationships among them.
File system operations 9
(Specifically, a segment need not be a complete, rooted directory tree). Segments can be any size and different segments can be different sizes.
2. The location of files and directories within particular segments in the file space is independent
of their respective and relative locations in the namespace. For example, a directory (Dir1) can be located on one segment, while the files contained in that directory (File1 and File2) are resident on other segments. The selection of segments for placing files and directories is done dynamically when the file/directory is created, as determined by an allocation policy. The allocation policy is set by the system administrator in accordance with the anticipated access patterns and specific criteria relevant to the installation (such as performance and manageability). The allocation policy can be changed at any time, even when the file system is mounted and in use. Files can be redistributed across segments using a rebalancing utility. For example, rebalancing can be used when some segments are too full while other have free capacity, or when files need to be distributed across new segments.
3. Segment servers are responsible for managing individual segments of the file system. Each
segment is assigned to one segment server and each server may own multiple segments, as shown by the color coding in the diagram. Segment ownership can be migrated between servers with direct access to the storage volume while the file system is mounted. For example, Seg1 can be migrated between SS1 and SS2 but not to SS3 or SS4.
Additional servers can be added to the system dynamically to meet growing performance needs, without adding more capacity, by distributing the ownership of existing segments for proper load balancing and utilization of all servers. Conversely, additional capacity can be added to the file system while in active use without adding more servers—ownership of the new segments is distributed among existing servers. Servers can be configured with failover protection, with other servers being designated as standby servers that automatically take control of a server’s segments if a failure occurs.
4. Clients run the applications that use the file system. Clients can access the file system either
as a locally mounted cluster file system using the IBRIX Client or using standard network attached storage (NAS) protocols such as NFS and Server Message Block (SMB).
5. Use of the IBRIX Client on a client system has some significant advantages over the NAS
approach—specifically, the IBRIX Client driver is aware of the segmented architecture of the file system and, based on the file/directory being accessed, can route requests directly to the correct segment server, yielding balanced resource utilization and high performance. However, the IBRIX Client is available only for a limited range of operating systems.
6. NAS protocols such as NFS and SMB offer the benefits of multi-platform support and low cost
of administration of client software, as the client drivers for these protocols are generally available with the base operating system. When using NAS protocols, a client must mount the file system from one (or more) of the segment servers. As shown in the diagram, all requests are sent to the server from which the share is mounted, which then performs the required routing.
7. Any segment server in the namespace can access any segment. There are three cases:
a. Selected segment is owned by the segment server initiating the operation (for example,
SS1 accessing Seg1).
b. Selected segment is owned by another segment server but is directly accessible at the
block level by the segment server initiating the operation (for example, SS1 accessing Seg3).
c. Selected segment is owned by another segment server and is not directly accessible by
the segment server initiating the operation (for example, SS1 accessing Seg5).
Each case is handled differently. The data paths are shown in heavy red broken lines in the diagram:
a. The segment server initiating the operation services the read or write request to the local
segment.
b. In this case, reads and writes take different routes:
10 Using IBRIX software file systems
1) The segment server initiating the operation can read files directly from the segment
across the SAN; this is called a SAN READ.
2) The segment server initiating the operation routes writes over the IP network to the
segment server owning the segment. That server then writes data to the segment.
c. All reads and writes must be routed over the IP network between the segment servers.
8. Step 7 assumed that the server had to go to a segment to read a file. However, every segment
server that reads a file keeps a copy of it cached in its memory regardless of which segment it was read from (in the diagram, two servers have cached copies of File 1). The cached copies are used to service local read requests for the file until the copy is made invalid, for example, because the original file has been changed. The file system keeps track of which servers have cached copies of a file and manages cache coherency using delegations, which are IBRIX file system metadata structures used to track cached copies of data and metadata.

File system building blocks

A file system is created from building blocks. The first block comprises the underlying physical volumes, which are combined in volume groups. Segments (logical volumes) are created from the volume groups. The built-in volume manager handles all space allocation considerations involved in file system creation.

Configuring file systems

You can configure your file systems to use the following features:
Quotas. This feature allows you to assign quotas to individual users or groups, or to a directory
tree. Individual quotas limit the amount of storage or the number of files that a user or group can use in a file system. Directory tree quotas limit the amount of storage and the number of files that can be created on a file system located at a specific directory tree. See “Configuring
quotas” (page 25).
Remote replication. This feature provides a method to replicate changes in a source file system
on one cluster to a target file system on either the same cluster or a second cluster. See “Using
remote replication” (page 127).
File system building blocks 11
Data retention and validation. Data retention ensures that files cannot be modified or deleted
for a specific retention period. Data validation scans can be used to ensure that files remain unchanged. See “Managing data retention” (page 143).
Antivirus support. This feature is used with supported Antivirus software, allowing you to scan
files on an IBRIX file system. See “Configuring Antivirus support” (page 192).
IBRIX software snapshots. This feature allows you to capture a point-in-time copy of a file
system or directory for online backup purposes and to simplify recovery of files from accidental deletion. Users can access the file system or directory as it appeared at the instant of the snapshot. See “Creating IBRIX software snapshots” (page 204).
Block Snapshots. This feature uses the array capabilities to capture a point-in-time copy of a
file system for online backup purposes and to simplify recovery of files from accidental deletion. The snapshot replicates all file system entities at the time of capture and is managed exactly like any other file system. See “Creating block snapshots” (page 213).
Data tiering. This feature allows you to set a preferred tier where newly created files will be
stored. You can then create a tiering policy to move files from initial storage, based on file attributes such as such as modification time, access time, file size, or file type. See “Using
data tiering” (page 225).
File allocation. This feature allocates new files and directories to segments according to the
allocation policy and segment preferences that are in effect for a client. An allocation policy is an algorithm that determines the segments that are selected when clients write to a file system. See “Using file allocation” (page 240).

Accessing file systems

Clients can use the following standard NAS protocols to access file system data:
NFS. See “Using NFS” (page 51) or more information.
SMB. See “Using SMB” (page 73) for more information.
FTP. See “Using FTP” (page 98) for more information.
HTTP. See “Using HTTP” (page 108) for more information.
You can also use IBRIX 9000 clients to access file systems. Typically, these clients are installed during the initial system setup. See the HP IBRIX 9000 Storage Installation Guide for more information.
12 Using IBRIX software file systems

2 Creating and mounting file systems

This chapter describes how to create file systems and mount or unmount them.

Creating a file system

You can create a file system using the New Filesystem Wizard provided with the GUI, or you can use CLI commands. The New Filesystem Wizard also allows you to create an NFS export or an SMB share for the file system.

Using the New Filesystem Wizard

To start the wizard, click New on the Filesystems top panel. The wizard includes several steps and a summary, starting with selecting the storage for the file system.
NOTE: For details about the prompts for each step of the wizard, see the GUI online help.
On the Select Storage dialog box, select the storage that will be used for the file system.
Configure Options dialog box. Enter a name for the file system, and specify the appropriate configuration options.
Creating a file system 13
WORM/Data Retention dialog box. If data retention will be used on the file system, enable it and set the retention policy. See “Managing data retention” (page 143) for more information.
14 Creating and mounting file systems
You can configure the following:
Default retention period. This period determines whether you can manage WORM
(non-retained) files as well as WORM-retained files. (WORM (non-retained) files can be deleted at any time; WORM-retained files can be deleted only after the file's retention period has expired.)
To manage only WORM-retained files, set the default retention period to a non-zero value. WORM-retained files then use this period by default; however, you can assign a different retention period if desired.
To manage both WORM (non-retained) and WORM-retained files, uncheck Set Default Retention Period. The default retention period is then set to 0 seconds. When you make a WORM file retained, you will need to assign a retention period to the file.
Autocommit period. When the autocommit period is set, files become WORM or
WORM-retained if they are not changed during the period. (If the default retention period is set to zero, the files become WORM. If the default retention period is set to a value greater than zero, the files become WORM-retained.) To use this feature, check Set Auto-Commit Period and specify the time period. The minimum value for the autocommit period is five minutes, and the maximum value is one year. If you plan to keep normal files on the file system, do not set the autocommit period.
Data validation. Select this option to schedule periodic scans on the file system. Use the default
schedule, or click Modify to open the Data Validation Scan Schedule dialog box and configure your own schedule.
Report Data Generation. Select this option if you want to create data retention reports. Use
the default schedule, or click Modify to open the Report Data Generation Schedule dialog box and configure your own schedule.
Creating a file system 15
Express Query. Check this option to enable StoreAll Express Query on the file system. Express
Query is a database used to record metadata state changes occurring on the file system.
Auditing Options dialog box. If you enabled Express Query on the WORM/Data Retention dialog box, you can also enable auditing and select the events that you want to log.
16 Creating and mounting file systems
Default File Shares dialog box. Use this dialog box to create an NFS export and/or an SMB share at the root of the file system. The default settings are used. See “Using NFS” (page 51) and “Using
SMB” (page 73) for more information.
Review the Summary to ensure that the file system is configured properly. If necessary, you can return to a dialog box and make any corrections.

Configuring additional file system options

The New Filesystem wizard creates the file system with the default settings for several options. You can change these settings on the Modify Filesystem Properties dialog box, and can also configure data retention, data tiering, and file allocation. To open the dialog box, select the file system on the Filesystems panel. Select Summary from the lower Navigator, and then click Modify on the Summary panel.
The General tab allows you to enable or disable quotas, Export Control, and 32-bit compatibility mode on the file system.
When Export Control is enabled on a file system, by default, IBRIX 9000 clients have no access to the file system. Instead, the system administrator grants the clients access by executing the ibrix_mount command. Export Control affects only for NFS access for IBRIX 9000 clients. Enabling Export Control does not affect access from a file serving node to a file system. File serving nodes always have RW access.
By default, file systems are created in 64-bit mode. If clients need to run a 32-bit application, you can enable 32-bit compatibility mode. This option is applied to the file system at mount time and can be enabled or disabled as necessary.
Creating a file system 17
The Data Retention tab allows you to change the data retention configuration. The file system must be unmounted. See “Configuring data retention on existing file systems” (page 147) for more information.
NOTE: Data retention cannot be enabled on a file system created on IBRIX software 5.6 or earlier
versions until the file system is upgraded.
The Allocation, Segment Preference, and Host Allocation tabs are used to modify file allocation policies and to specify segment preferences for file serving nodes and IBRIX 9000 clients. See
“Using file allocation” (page 240) for more information.

Creating a file system using the CLI

The ibrix_fs command is used to create a file system. It can be used in the following ways:
Create a file system with the specified segments (segments are logical volumes):
ibrix_fs -c -f FSNAME -s LVLIST [-t TIERNAME] [-a] [-q] [-o OPTION1=VALUE1,OPTION2=VALUE2,...] [-t TIERNAME] [-F FMIN:FMAX:FTOTAL] [-D DMIN:DMAX:DTOTAL]
Create a file system and assign specify segments to specific file serving nodes:
ibrix_fs -c -f FSNAME -S LV1:HOSTNAME1,LV2:HOSTNAME2,... [-a] [-q] [-o OPTION1=VALUE1,OPTION2=VALUE2,...] [-t TIERNAME] [-F FMIN:FMAX:FTOTAL] [-D DMIN:DMAX:DTOTAL]
Create a file system from physical volumes in a single step:
ibrix_fs -c -f FSNAME -p PVLIST [-a] [-q] [-o OPTION1=VALUE1,OPTION2=VALUE2,...] [-t TIERNAME] [-F FMIN:FMAX:FTOTAL] [-D DMIN:DMAX:DTOTAL]
18 Creating and mounting file systems
In the commands, the –t option specifies a tier. TIERNAME can be any alphanumeric, case-sensitive, text string. Tier assignment is not affected by other options that can be set with the ibrix_fs command.
NOTE: A tier is created whenever a segment is assigned to it. Be careful to spell the name of the
tier correctly when you add segments to an existing tier. If you make an error in the name, a new tier is created with the incorrect tier name, and no error is recognized.
Options for data retention
OptionFeature
Data retention
Query
The following example enables data retention, Express Query, and auditing, with all events being audited:
ibrix_fs -o "retenMode=Enterprise,retenDefPeriod=5m,retenMinPeriod=2, retenMaxPeriod=30y,retenAutoCommitPeriod=1d" –T –E -A –oa audit_mode=on,all=on c -f ifs1 -s ilv_[1-4] -a
–o "retenMode=<mode>,retenDefPeriod=<period>,retenMinPeriod=<period>, retenMaxPeriod=<period>,retenAutoCommitPeriod=<period>"
-T -EExpress
-A -oa OPTION1=VALUE1[,OPTION2=VALUE2,...]Auditing
Creating a file system manually from physical volumes
This procedure is equivalent to using ibrix_fs to create a file system from physical volumes in a single step. Instead of a single command, you build the file system components individually:
1. Discover the physical volumes in the system. Use the ibrix_pv command.
2. Create volume groups from the discovered physical volumes. Use the ibrix_vg command.
3. Create logical volumes (also called segments) from volume groups. Use the ibrix_lv
command.
4. Create the file system from the new logical volumes. Use the ibrix_fs command.
See the HP IBRIX 9000 Storage CLI Reference Guide for details about these commands.

File limit for directories

The maximum number of files in a directory depends on the length of the file names, and also the names themselves. The maximum size of a directory is approximately 4 GB (double indirect blocks). An average file name length of eight characters allows about 12 million entries. However, because directories are hashed, it is unlikely that a directory can contain this number of entries. Files with a similar naming pattern are hashed into the same bucket. If that bucket fills up, another file cannot be created there, even if free space is available elsewhere in the directory. If you try to create another file with a different name, it may succeed, but randomly.

Managing mountpoints and mount/unmount operations

GUI procedures

When you use the New Filesystem Wizard to create a file system, you can specify a name for the mountpoint and indicate whether the file system should be mounted after it is created. The wizard will create the mountpoint if necessary. The Filesystems panel shows the file systems created on the cluster.
To view the mountpoint information for a file system, select the file system on the Filesystems panel, and click Mountpoints in the lower Navigator. The Mountpoints panel shows the hosts that have
File limit for directories 19
mounted the file system, the name of the mountpoint, the access (RW or RO) allowed to the host, and whether the file system is mounted.
To mount or remount a file system, select it on the Filesystems panel and click Mount. You can select several mount options on the Mount Filesystem dialog box. To remount the file system, click remount.
The available mount options are:
atime: Update the inode access time when a file is accessed
NOTE: If you do not specifically set atime as an option, noatime is set instead and the
inode access time is not updated when the file is accessed. There is not an option to specifically set noatime as an option.
nodiratime: Do not update the directory inode access time when the directory is accessed
20 Creating and mounting file systems
nodquotstatfs: Disable file system reporting based on directory tree quota limits
path: For IBRIX 9000 clients only, mount on the specified subdirectory path of the file system
instead of the root.
remount: Remounts a file system without taking it offline. Use this option to change the current
mount options on a file system.
You can also view mountpoint information for a particular server. Select that server on the Servers panel, and select Mountpointsfrom the lower Navigator. To delete a mountpoint, select that mountpoint and click Delete.

CLI procedures

The CLI commands are executed immediately on file serving nodes. For IBRIX 9000 clients, the command intention is stored in the active Fusion Manager. When IBRIX software services start on a client, the client queries the active Fusion Manager for any commands. If the services are already running, you can force the client to query the Fusion Manager by executing either ibrix_client or ibrix_lwmount -a on the client, or by rebooting the client.
If you have configured hostgroups for your IBRIX 9000 clients, you can apply a command to a specific hostgroup. For information about creating hostgroups, see the administration guide for your system.
Creating mountpoints
Mountpoints must exist before a file system can be mounted. To create a mountpoint on file serving nodes and IBRIX 9000 clients, enter the following command:
ibrix_mountpoint -c [-h HOSTLIST] -m MOUNTPOINT
To create a mountpoint on a hostgroup , enter the following command:
ibrix_mountpoint -c -g GROUPLIST -m MOUNTPOINT
For information about mountpoint options, see the "ibrix_mountpoint" section in the HP IBRIX 9000 CLI Reference Guide.
Deleting mountpoints
Before deleting mountpoints, verify that no file systems are mounted on them. To delete a mountpoint from file serving nodes and IBRIX 9000 clients, use the following command:
ibrix_mountpoint -d [-h HOSTLIST] -m MOUNTPOINT
Managing mountpoints and mount/unmount operations 21
To delete a mountpoint from specific hostgroups, use the following command:
ibrix_mountpoint -d -g GROUPLIST -m MOUNTPOINT
Viewing mountpoint information
To view mounted file systems and their mountpoints on all nodes, use the following command:
ibrix_mountpoint -l
Mounting a file system
File system mounts are managed with the ibrix_mount command. The command options and the default file system access allowed for IBRIX 9000 clients depend on whether the optional Export Control feature has been enabled on the file system (see “Using Export Control” (page 24) for more information). This section assumes that Export Control is not enabled, which is the default.
NOTE: A file system must be mounted on the file serving node that owns the root segment (that
is, segment 1) before it can be mounted on any other host. IBRIX software automatically mounts a file system on the root segment when you mount it on all file serving nodes in the cluster. The mountpoints must already exist.
Mount a file system on file serving nodes and IBRIX 9000 clients:
ibrix_mount -f FSNAME [-o {RW|RO}] [-O MOUNTOPTIONS] -h HOSTLIST -m MOUNTPOINT
Mount a file system on a hostgroup:
ibrix_mount -f FSNAME [-o {RW|RO}] -g GROUP -m MOUNTPOINT
NOTE: If you do not include the -o parameter, the default access option for the mounted file
system is Read Write.
Unmounting a file system
Use the following commands to unmount a file system.
NOTE: Be sure to unmount the root segment last. Attempting to unmount it while other segments
are still mounted will result in failure. If the file system was exported using NFS, you must unexport it before you can unmount it (see “Exporting a file system” (page 51)).
To unmount a file system from one or more file serving nodes, IBRIX 9000 clients, or hostgroups:
ibrix_umount -f FSNAME [-h HOSTLIST | -g GROUPLIST]
To unmount a file system from a specific mountpoint on a file serving node, IBRIX 9000 client, or hostgroup:
ibrix_umount -m MOUNTPOINT [-h HOSTLIST | -g GROUPLIST]
Enabling or disabling 32-bit compatibility mode
If clients are running 32-bit applications, you can enable 32-bit compatibility mode. This mode is applied to the file system at mount time. You can enable or disable 32-bit compatibility on the Modify Filesystems Properties dialog box, and can also use the following commands.
Enable 32-bit compatibility mode:
ibrix_fs_tune -c -e -f FSNAME
Disable 32-bit compatibility mode:
ibrix_fs_tune -c -d -f FSNAME

Mounting and unmounting file systems locally on IBRIX 9000 clients

On both Linux and Windows IBRIX 9000 clients, you can locally override a mount. For example, if the Fusion Manager configuration database has a file system marked as mounted for a particular client, that client can locally unmount the file system.
22 Creating and mounting file systems
Linux IBRIX 9000 clients
To mount a file system locally, use the following command on the Linux 9000 client. A Fusion Manager name (fmname) is required only if this 9000 client is registered with multiple Fusion Managers.
ibrix_lwmount -f [fmname:]fsname -m mountpoint [-o options]
To unmount a file system locally, use one of the following commands on the Linux 9000 client. The first command detaches the specified file system from the client. The second command detaches the file system that is mounted on the specified mountpoint.
ibrix_lwumount -f [fmname:]FSNAME ibrix_lwumount -m MOUNTPOINT
Windows IBRIX 9000 clients
Use the Windows 9000 client GUI to mount file systems locally. Click the Mount tab on the GUI and select the cluster name from the list (the cluster name is the Fusion Manager name). Then, enter the name of the file system, select a drive, and click Mount.
If you are using Remote Desktop to access the client and the drive letter is not displayed, log out and log back in. This is a known limitation of Windows Terminal Services when exposing new drives.
To unmount a file system on the Windows 9000 client GUI, click the Umount tab, select the file system, and then click Umount.

Limiting file system access for IBRIX 9000 clients

By default, all IBRIX 9000 clients can mount a file system after a mountpoint has been created. To limit access to specific IBRIX 9000 clients, create an access entry. When an access entry is in place for a file system (or a subdirectory of the file system), it enters secure mode, and mount access is restricted to clients specified in the access entry. All other clients are denied mount access.
Select the file system on the Filesystems top panel, and then select Client Exports in the lower navigator. On the Create Client Export(s) dialog box, select the clients or hostgroups that will be allowed access to the file system or a subdirectory of the file system.
To remove a client access entry, select the affected file system on the GUI, and then select Client
Exports from the lower Navigator. Select the access entry from the Client Exports display, and click Delete.
On the CLI, use the ibrix_exportfs command to create an access entry:
ibrix_exportfs –c –f FSNAME –p CLIENT:/PATHNAME,CLIENT2:/PATHNAME,...
Limiting file system access for IBRIX 9000 clients 23
To see all access entries that have been created, use the following command:
ibrix_exportfs –c –l
To remove an access entry, use the following command:
ibrix_exportfs c U f FSNAME –p CLIENT:/PATHNAME, CLIENT2:/PATHNAME,...

Using Export Control

When Export Control is enabled on a file system, by default, IBRIX 9000 clients have no access to the file system. Instead, the system administrator grants the clients access by executing the ibrix_mount command. Export Control affects only NFS access for IBRIX 9000 clients. Enabling Export Control does not affect access from a file serving node to a file system. File serving nodes always have RW access.
To determine whether Export Control is enabled, run ibrix_fs -i or ibrix_fs -l. The output indicates whether Export Control is enabled.
To enable Export Control, include the -C option in the ibrix_fs command:
ibrix_fs -C -E -f FSNAME
To disable Export Control, execute the ibrix_fs command with the -C and -D options:
ibrix_fs -C -D -f FSNAME
To mount a file system that has Export Control enabled, include the ibrix_mount -o {RW|RO} option to specify that all clients have either RO or RW access to the file system. The default is RO. In addition, when specifying a hostgroup, the root user can be limited to RO access by adding the root_ro parameter.
24 Creating and mounting file systems

3 Configuring quotas

Quotas can be assigned to individual users or groups, or to a directory tree. Individual quotas limit the amount of storage or the number of files that a user or group can use in a file system. Directory tree quotas limit the amount of storage and the number of files that can be created on a file system located at a specific directory tree. Note the following:
You can assign quotas to a user, group, or directory on the GUI or from the CLI. You can also
import quota information from a file.
If a user has a user quota and a group quota for the same file system, the first quota reached
takes precedence.
Nested directory quotas are not supported. You cannot configure quotas on a subdirectory
differently than the parent directory.
The existing quota configuration can be exported to a file at any time.
NOTE: HP recommends that you export the quota configuration and save the resulting file
whenever you update quotas on your cluster.

How quotas work

Quotas can be set for users, groups, or directories in a file system. A quota is specified by hard and soft storage limits for both the megabytes of storage and the number of files allotted to the user, group, or directory. The hard limit is the maximum storage (in terms of file size and number of files) allotted to the user, group, or directory. The soft limit specifies the number of megabytes or files that, when reached, starts a countdown timer.
If the megabytes of storage or number of files are not reduced below the soft limit, the timer runs until either the hard storage limit is reached or the grace period for the timer elapses. (The default grace period is seven days.) When the timer stops, the user, group, or directory for which the quota was set cannot store any more data, and the system issues quota exceeded messages at each write attempt.
NOTE: Quota statistics are updated on a regular basis (at one-minute intervals). At each update,
the file and storage usage for each quota-enabled user, group, or directory tree is queried, and the result is distributed to all file serving nodes. Users or groups can temporarily exceed their quota
if the allocation policy in effect for a file system causes their data to be written to different file serving nodes during the statistics update interval. In this situation, it is possible for the storage
usage visible to each file serving node to be below or at the quota limit while the aggregate storage use exceeds the limit.
There is a delay of several minutes between the time a command to update quotas is executed and when the results are displayed by the ibrix_edquota -l command. This is normal behavior.

Enabling quotas on a file system and setting grace periods

Before you can set quota limits, quotas must be enabled on the file system. You can enable quotas on a file system at any time.
To view the current quotas configuration on the GUI, select the file system and then select Quotas from the lower Navigator. The Quotas Summary panel specifies whether quotas are enabled and lists the grace periods for blocks and inodes.
How quotas work 25
To change the quotas configuration, click Modify on the Quota Summary panel.
On the CLI, run the following command to enable quotas on an existing file system:
ibrix_fs -q -E -f FSNAME

Setting quotas for users, groups, and directories

Before configuring quotas, the quota feature must be enabled on the file system and the file system must be mounted.
NOTE: For the purpose of setting quotas, no UID or GID can exceed 2,147,483,647.
Setting user quotas to zero removes the quotas.
The Quota Management Wizard can be used to create, modify, or delete quotas for users, groups, and directories in the selected file system. Click Quotas Wizard on the Quota Summary panel to open the wizard. The Welcome dialog box describes the options available in the wizard.
26 Configuring quotas
The User Quotas dialog box is used to create, modify, or delete quotas for users. To add a user quota, enter the required information and click Add. Users having quotas are listed in the table at the bottom of the dialog box. To modify quotas for a user, check the box preceding that user. You can then adjust the quotas as needed. To delete quotas for a user, check the box and click Delete.
The Group Quotas dialog box is used to create, modify, or delete quotas for groups. To add a group quota, enter the required information and click Add. The new quota applies to all users in the group. Groups having quotas are listed in the table at the bottom of the dialog box. To modify
Setting quotas for users, groups, and directories 27
quotas for a group, check the box preceding that group. You can then adjust the quotas as needed. To delete quotas for a group, check the box and click Delete. group
The Directory Quotas dialog box is used to create, modify, or delete quotas for directories. To add a directory quota, enter the required information and click Add. The Name (Alias) is a unique identifier for the quota, and cannot include commas. The new quota applies to all users and groups storing data in the directory. Directories having quotas are listed in the table at the bottom of the dialog box. To modify quotas for a directory, check the box preceding that directory. You can then adjust the quotas as needed. To delete quotas for a directory, check the box and click Delete.
28 Configuring quotas
summary
Configuring quotas from the CLI
In the commands, use -M SOFT_MEGABYTES and -m HARD_MEGABYTES to specify soft and hard limits for the megabytes of storage. Use -I SOFT_FILES and -i HARD_FILES to specify soft and hard limits for the number of files allowed.
Create a user or group quota:
User quota:
ibrix_edquota -s -u “USER -f FSNAME [-M SOFT_MEGABYTES] [-m HARD_MEGABYTES] [-I SOFT_FILES] [-i HARD_FILES]
Group quota:
ibrix_edquota -s -g “GROUP -f FSNAME [-M SOFT_MEGABYTES] [-m HARD_MEGABYTES] [-I SOFT_FILES] [-i HARD_FILES]
Enclose the user or group name in single or double quotation marks.
Create a directory quota:
ibrix_edquota -s -d NAME -p PATH -f FSNAME -M SOFT_MEGABYTES -m HARD_MEGABYTES -I SOFT_FILES -i HARD_FILES
The -p PATH option specifies the pathname of the directory tree. If the pathname includes a space, enclose the portion of the pathname that includes the space in single quotation marks, and enclose the entire pathname in double quotation marks. For example:
-p "/fs48/data/'QUOTA 4'"
The -n NAME option specifies a unique name for the directory tree quota. The name cannot contain a comma (,) or colon (:) character.
NOTE: When you create a directory quota, the system also runs ibrix_onlinequotacheck
command in DTREE_CREATE mode. If you are creating multiple directory quotas, you can import the quotas from a file. The system then uses batch processing to create the quotas. If you add the quotas individually, you will need to wait for ibrix_onlinequotacheck to finish after creating each quota.

Using a quotas file

Quota limits can be imported into the cluster from the quotas file, and existing quotas can be exported to the file. See “Format of the quotas file” (page 30) for the format of the file.

Importing quotas from a file

From the GUI, select the file system, select Quotas from the lower Navigator, and then click Import on the Quota Summary panel.
Using a quotas file 29
From the CLI, use the following command to import quotas from a file, where PATH is the path to the quotas file:
ibrix_edquota -t -p PATH -f FSNAME
See “Format of the quotas file” (page 30) for information about the format of quota file.

Exporting quotas to a file

From the GUI, select the file system, select Quotas from the lower Navigator, and then click Export on the Quota Summary panel.
From the CLI, use the following command to export the existing quotas information to a file, where PATH is the pathname of the quotas file:
ibrix_edquota -e -p PATH -f FSNAME

Format of the quotas file

The quotas file contains a line for each user, group, or directory tree assigned a quota. When you add quota entries, the lines must use one of the following formats. The “A” format specifies a user or group ID. The “B” format specifies a user or group name, or a directory tree that has already been assigned an identifier name. The “C” format specifies a directory tree, where the path exists, but the identifier name for the directory tree will not be created until the quotas are imported.
A,{type},{block_hardlimit},{block_soft-limit},{inode_hardlimit},{inode_softlimit},{id} B,{type},{block_hardlimit},{block_soft-limit},{inode_hardlimit},{inode_softlimit},"{name}" C,{type},{block_hardlimit},{block_soft-limit},{inode_hardlimit},{inode_softlimit}, "{name}","{path}"
The fields in each line are:
{type}
Either 0 for a user quota; 1 for a group quota; 2 for a directory tree quota.
{block_hardlimit}
The maximum number of 1K blocks allowed for the user, group, or directory tree. (1 MB = 1024 blocks).
{block_soft-limit}
The number of 1K blocks that, when reached, starts the countdown timer.
{inode_hardlimit}
The maximum number of files allowed for the user, group, or directory tree.
{inode_softlimit}
The number of files that, when reached, starts the countdown timer.
30 Configuring quotas
Loading...
+ 224 hidden pages