background image

10400455-002

©2008-14 Overland Storage, Inc.

 

 

212

SnapScale/RAINcloudOS 4.1 Administrator’s Guide

8 - Maintenance

 

 

2.

Reopen the 

Data Import

 page. All fields (except the password) from the last import will 

still be visible on the page.
By default, all files will be re-imported. If you want only to import those files that failed 
to import the first time, you can disable the 

Overwrite Existing Target Files

 

option. 

However, make sure that all problematic files from the first import are deleted from the 
target so they can be re-imported.

NOTE: If an import failed, it is strongly recommended that you enable the Verify imported data 

option for the re-importation.

3.

Enter your password and click 

Start Import

 to run the import again.

Preserving Permissions

The types of permissions retained will differ, depending on which import scenario is applied.

Importing from a Windows Security Model to a Windows Personality Directory

If you are importing from a Windows server (or other type of server that follows the Windows 
security model) to a Windows personality directory, permissions are retained exactly as they 
exist on the source. However, as is the case when moving files with permissions between 
Windows servers, permissions for users who are unknown on the target are retained but not 
enforced. This includes permissions for:

Local users on the source machine.

Domain users for domains unknown to the cluster (for example, trusted domains, if the 
cluster is not configured to support trusted domains).

Certain built-in Windows users and groups.

Importing from a Unix Security Model to a Unix Personality directory

If you are importing from a Unix server to a Unix personality directory, Unix permissions for 
UIDs/GIDs are copied exactly from source to target; thus, identities of the users and groups 
are best retained if the SnapScale cluster belongs to the same NIS domain as the Unix server.

Importing Between Conflicting Security Models

When importing from a Unix source to a Windows security model target, Unix permissions are 
retained and the security personality on the resulting files and directories will be Unix.

However, when importing from a Windows source to a Unix security model target, 
permissions cannot be retained (since Unix root directories are required to be Unix personality 
throughout). Files and directories will inherit the Unix personality and will have a set of 
default Unix permissions. 

Importing from a SnapServer or SnapScale Cluster

When importing from a different SnapServer or SnapScale cluster, it is recommended that you 
maintain the same security model on the target that you have on the source.

If your source uses a Windows security model and has permissions assigned to Windows 
domain users, use a Windows (SMB) connection for import. Windows permissions are 
retained exactly as they are on the source, with the same enforcement limitations for 
unknown users as for importing from Windows servers (see 

Importing from a Windows 

Security Model to a Windows Personality Directory on page 212

).

If your source server or cluster uses a Unix security model and has permissions assigned 
to local or NIS users, use an NFS connection for import. 

Summary of Contents for SnapScale

Page 1: ...Overland Storage SnapScale Administrator s Guide For Appliances Running RAINcloudOS Version 4 1 October 2014 10400455 002...

Page 2: ...are the property of their respective owners The names of companies and individuals used in examples are fictitious and intended to illustrate the use of the software Any resemblance to actual compani...

Page 3: ...apScale X Series nodes It can also be upgraded from a previously installed version of RAINcloudOS version 3 0 or later Product Documentation Software Updates SnapScale product documentation and additi...

Page 4: ...ion that the user needs to know to avoid damaging or permanently deleting data or causing physical damage to the hardware or system IMPORTANT An Important note is a type of note that provides informat...

Page 5: ...and Configuration Connecting for the First Time 21 Connect Using the Node Name 21 Connect Using SSM 22 Setup a New SnapScale Cluster via Wizard 23 Step 1 Select SnapScale Nodes 24 Step 2 Client Networ...

Page 6: ...hentication 62 Connect from a Windows Client 63 Connect a Mac OS X Client Using SMB 64 Configure Windows SMB Networking 64 NFS Access 67 Assigning Share Access to NFS Users 68 Enable NFS Access to the...

Page 7: ...15 iSCSI Disks 115 Configuring iSCSI Initiators 115 iSCSI Configuration on the SnapScale 116 Create iSCSI Disks 119 Edit iSCSI Disk Properties 121 Delete an iSCSI Disk 121 Configuring VSS VDS for iSCS...

Page 8: ...apping 181 Remove Mappings 182 Remove Missing ID Mappings 185 Filesystem Updates 187 Home Directories 188 Configure Home Directories 189 Chapter 7 System Monitoring System Status 192 SnapScale Status...

Page 9: ...d Replication Solutions 244 Snap Enterprise Data Replicator 244 Snap EDR Usage 245 Configuring Snap EDR 245 Scheduling Jobs in Snap EDR 246 Backup via SMB or NFS 246 Off the Shelf Backup Solutions 246...

Page 10: ...forming System Resets Without Network Access 257 Networking Issues 257 Miscellaneous Issues 259 Phone Home Support 260 Appendix D RAINcloudOS Ports Appendix E Command Line Interface SnapCLI Syntax 266...

Page 11: ...tes files to optimize performance and Spare Distributor evenly distributes spare drives across nodes Files can be accessed either through NFS or CIFS SMB protocols SnapScale Flexible Volumes automatic...

Page 12: ...ta for redundancy Cluster Name the name visible to network clients and used to connect to the cluster similar to a server name and resolvable to node IP addresses via round robin DNS Cluster Managemen...

Page 13: ...To form a SnapScale cluster all nodes must be running the same version of RAINcloudOS To join an already configured SnapScale cluster an Uninitialized node must have the same version of RAINcloudOS a...

Page 14: ...10 8 10 9 Sun Solaris 10 and 11 HP UX 11 AIX 5 3 6 Red Hat Enterprise Linux RHEL 4 x 5 x 6 x Novell SuSE Linux Enterprise Server SLES 10 x 11 x Data Protection Snapshots for immediate or scheduled po...

Page 15: ...ID mapping and home directories BitTorrent Sync BitTorrent Sync can be used to replicate data between the SnapScale cluster and other servers or workstations Windows Security Model Volumes can be con...

Page 16: ...to several client platforms including Windows Mac OS X and Linux Refer to the SnapServer Manager User Guide for details on discovering and configuring SnapScale clusters Client and Storage Networks S...

Page 17: ...for failover For connections between 10GbE cards and 10GbE switches use either direct attached copper cables or fibre cables with SFP modules pre installed in the card and switch ports NOTE If using f...

Page 18: ...ht 10GbE card ports for the Storage connections The 1GbE ports are not used Configuration Node GbE Ports Network Switch Basic 1GbE X2 Ports 1 2 Client public Slot 2 1GbE Card ports 3 4 Storage private...

Page 19: ...Client network bottom two for Storage Single 10GbE The single card 10GbE configuration uses the two 1GbE ports for the Client connection and the two 10GbE ports on the card for the Storage connections...

Page 20: ...n uses the left 10GbE card ports for the Client connections and the right 10GbE card ports for the Storage connections The 1GbE ports are not used Configuration Node GbE Ports Network Switch Dual 10Gb...

Page 21: ...is found on the network the node defaults to an IP address in the range of 169 254 xxx xxx and is labeled as ZeroConf in SnapServer Manager SSM You may not be able to see Uninitialized nodes on your...

Page 22: ...not have a DHCP server there might be a delay before the node appears on the network NOTE To distinguish multiple SnapServers and SnapScale nodes you may need to find their default names as explained...

Page 23: ...n of a new cluster click the Create a New SnapScale box The Initial Setup Wizard consists of several steps Step 1 Select SnapScale Nodes select the nodes to be included in the cluster Step 2 Client Ne...

Page 24: ...twork interfaces for all the nodes must be located on the same public network subnet and the Storage network interfaces for all nodes must be located on the same private Storage network subnet The nod...

Page 25: ...nd Storage Inc 25 SnapScale RAINcloudOS 4 1 Administrator s Guide 2 Initial Setup and Configuration Step 2 Client Network Configuration Overview Review the information about setting up your Client net...

Page 26: ...r s Guide 2 Initial Setup and Configuration Step 3 Choose Client Network Static TCP IP Settings Use this step to specify the static TCP IP settings that will be common to all nodes in the cluster Then...

Page 27: ...a set of static IP addresses one for each node and one for the Management IP Use this page to specify the static IP addresses for each of your nodes and for the SnapScale Management IP address used t...

Page 28: ...nitial Setup and Configuration The Populate Static IP Addresses button can be used to automatically enter a sequential list of static IP addresses Just enter an IP address on the subnet and click Popu...

Page 29: ...ect to the cluster The default name is Nodennnnnnn where nnnnnnn is the appliance number of the node used to create the cluster SnapScale Description This optional field provides a place to define the...

Page 30: ...ocal computer Spare Disks Allocation Check the box and select the number of spare disks you want to reserve A spare disk is used to automatically replace a failed Peer Set member If there are unused d...

Page 31: ...e default NTP servers below If you intend to join the cluster to a Windows domain configure the cluster using the manual settings to set the date and time Otherwise configure the cluster to synchroniz...

Page 32: ...2 SnapScale RAINcloudOS 4 1 Administrator s Guide 2 Initial Setup and Configuration NOTE If you uncheck the box for reserving space for snapshots an alert is displayed to remind you that the feature w...

Page 33: ...dOS 4 1 Administrator s Guide 2 Initial Setup and Configuration Click Create New SnapScale to complete the process A confirmation page is shown Click Create New SnapScale again to create the cluster A...

Page 34: ...ress a completion page is displayed stating that a share was created and suggesting UPS units be enabled To enhance security you are asked to change the default administrator password after the cluste...

Page 35: ...ng back in the Registration page is displayed to facilitate activating your warranty Complete the registration fields and then click Download Registration File Email that file SnapScaleRegistration cs...

Page 36: ...e DNS resolves lookups for the cluster name via round robin Join an Existing SnapScale Cluster via Wizard IMPORTANT While the Initial Setup Wizard can be used to add one or more new nodes to an existi...

Page 37: ...e and all other discovered new nodes can be easily added to the cluster See Adding Nodes on page 127 for more information You are then directed to select the nodes to add set the static IP addresses a...

Page 38: ...ess the Web Management Interface The Home page displays the following icons and options Icons Options Description Change Password Click this icon to access the password change page Passwords are case...

Page 39: ...rs and nodes on other subnets You can access these servers clusters and nodes by clicking the listed name or IP address SnapExtensions Click this to view the SnapExtensions page where you can acquire...

Page 40: ...urs or until after feature is run whichever is first Hide Suppresses the alert It will not be shown again until after the feature called out in the alert is run and a new alert for that feature is gen...

Page 41: ...the pages are each covered in detail in the following chapters To close the site map click either Close or outside the map Contact Hardware Software Information From the Web Management Interface click...

Page 42: ...the configuration options for a SnapScale cluster of three or more nodes The four options for cluster settings are found under the SnapScale tab They can also be accessed using the site map icon Topic...

Page 43: ...ace to define the cluster in the overall scheme of your network and better identify the cluster on a LAN Data Replication Count The data replication count establishes the level of data redundancy in t...

Page 44: ...earlier date and time the change does not automatically propagate to any scheduled events you have already set up for snapshot antivirus or Snap EDR operations These operations will continue to run b...

Page 45: ...e you to log back in to the Web Management Interface when done 2 To use this SnapScale as an NTP server check the enable box 3 From the drop down list select the time zone NOTE RAINcloudOS automatical...

Page 46: ...lient is configured to connect via SSH v2 You will automatically be placed in the CLI shell UPS Protection SnapScale supports automatic shutdown when receiving a low power warning from an APC uninterr...

Page 47: ...e UPS must be configured to provide power for at least five minutes after entering a low battery condition Edit UPS Properties To manage the network UPS devices click UPS Properties NOTE If UPS device...

Page 48: ...trator name default is apc APC Authentication Phrase found under low battery shutdown configuration in the APC UPS interface it is NOT the Administrator password UPS Type Third column in Node table Us...

Page 49: ...vice To change the settings of a network UPS device 1 Select a device in the Network UPS Devices field to change 2 Click Change 3 Edit any of the three options for the device 4 Click Change again Any...

Page 50: ...king and Link Aggregation 802 3ad Network file protocols control how network clients can access the cluster Access to the cluster s storage space is provided via Windows SMB Unix NFS FTP FTPS and the...

Page 51: ...s in the Web Management Interface Network Information Browse to Network Information to access the Network Information page that displays either the Client or Storage network settings for SnapScale and...

Page 52: ...aining name and IP address mapping tables Bonding Status Shows Load Balance ALB Failover Switch Trunking or Link Aggregation 802 3ad as the selected bonding Management IP Address The IP address config...

Page 53: ...cast IP Address Multicast address used for inter node cluster messaging Node specific Storage Network Information Section Show Hide Disabled Ethernet Ports Use the link on the right above the table to...

Page 54: ...ides configuration of the common cluster network settings the static Management IP address and the pool of static IP addresses to automatically assign to cluster nodes NOTE If the Client network runs...

Page 55: ...of the gateway is the hardware or software that bridges the gap between two otherwise unroutable networks It allows data to be transferred among computers that are on different subnets DNS Domain Name...

Page 56: ...tatic link aggregation Link Aggregation 802 3ad This method of combining or aggregating multiple network connections in parallel is used to increase throughput beyond what a single connection could ha...

Page 57: ...figured restart the cluster normally by turning the nodes back on Configure the Client Switch for Load Balancing If you select either Switch Trunking or Link Aggregation 802 3ad network bonding config...

Page 58: ...over and ALB the cluster must reboot If changing the Storage network to or from Switch Trunking or Link Aggregation 802 3ad the cluster must be shut down completely the Storage network switches reconf...

Page 59: ...cloudOS 4 1 Administrator s Guide 4 Network Settings Example of Cabling for ALB Switch Trunking or Link Aggregation 802 3ad Utility IP Address To assign an additional static IP address to a specific n...

Page 60: ...er host record for the cluster name Only one Utility IP address can exist on a cluster The Web Management Interface will not allow a new Utility IP address to be created if a Utility IP address curren...

Page 61: ...rity settings are configured on the Network Windows SMB page of the Web Management Interface You can configure these settings as a member of a Workgroup or an Active Directory Domain as shown in these...

Page 62: ...nd protocols can still see these shares To completely hide shares from visibility from any protocols use the hidden share option under Advanced Share Properties when creating a new share or modifying...

Page 63: ...rk Windows SMB page in the Web Management Interface contains an option that allows unknown users to access the SnapScale cluster using the guest account Connect from a Windows Client Windows clients c...

Page 64: ...d Distribution on page 56 smb cluster_name smb node_ip_address Tip To disconnect from the SnapScale cluster drag its icon into the Trash You can also browse the clusters in the Finder file window unde...

Page 65: ...to allow unknown users or users explicitly logging in as Guest to access the SnapScale using the guest account Clear the box to disable this feature Enable Opportunistic Locking Enabled by default Opp...

Page 66: ...nter the domain name to which the cluster belongs NOTE Windows 2000 domain controllers must run SP2 or later Administrator Name Administrator Password If joining a domain enter the user name and passw...

Page 67: ...able to serve as the Master Browser for a workgroup Clear the box to disable this feature Allow Root Authentication Check the box to allow root login to the cluster Clear the box to disable this featu...

Page 68: ...t user level share access control but rather supports host and subnet based access control NFSv4 supports user level access control via Kerberos configuration but otherwise uses the same form of host...

Page 69: ...ame localdomain is shown in the field If necessary you can change it CAUTION This setting is used by the NFSv4 IDMAP daemon and must be set to the same value on all NFSv4 clients and servers for prope...

Page 70: ...rb5 gss krb5i and gss krb5p are automatically added to the NFS access entries for each NFS enabled share Option Description KDC Host Name Enter the host name of the Kerberos server for example kerbero...

Page 71: ...such you must use the LDAP directory to make modifications NOTE A SnapScale cluster currently can t be configured to authenticate users against an LDAP directory NIS Network Information Service is a...

Page 72: ...mmediately If NIS is enabled you are warned that existing quotas or ID mappings for NIS users will be applied automatically to LDAP users and groups that have the same UID or GID 7 Click Enable LDAP t...

Page 73: ...o Network LDAP NIS The default LDAP database type page is shown 2 From the User Database Type drop down list select NIS 3 Check Enable NIS 4 Edit the settings shown in the following table 5 Click OK t...

Page 74: ...al user accounts for FTP users For FTPS it is recommended that your FTPS client application use explicit FTPS such as FTPES or Auth TLS NOTE If standard FTP is enabled only the data channel is encrypt...

Page 75: ...P root directory SNMP Configuration The SnapScale cluster can act as an SNMP agent SNMP managers collect data from agents and generate statistics and other monitoring information for administrators Ag...

Page 76: ...lowing products have been successfully tested with SnapScale clusters CA Unicenter TNg HP Open View and Tivoli NetView Trap Initiating Action coldStart Whenever SNMP is enabled and a node boots linkDo...

Page 77: ...only community string or accept the default snap_public NOTE As a precaution against unauthorized access Overland Storage recommends that you create your own community string Location Optionally enter...

Page 78: ...nticate to the cluster Configuring HTTP HTTPS You can require web authentication disable HTTP non secure access and enable the Web Root feature All HTTP access is made via the root node and the Manage...

Page 79: ...n the browser field http cluster_name or http IP address In addition files and directories underneath the directory you specify as the Web Root can be accessed by reference relative to http cluster_na...

Page 80: ...ow Directory Listings If Allow Directory Listings is checked and no user defined index pages are configured or present the browser opens to a page allowing browsing of all directories underneath the W...

Page 81: ...the browser address field http node_name or ip address config You are prompted for your User ID and password then you are placed into the Web Management Interface If you need to access the Web View p...

Page 82: ...on a Windows server Note the IP address of the server or workstation on which the iSNS service is installed 2 Configure iSNS on the SnapScale cluster a On the Network iSNS page check the Enable iSNS b...

Page 83: ...cover iSCSI targets via the iSNS server NOTE After you have completed this procedure all the iSCSI targets on the SnapScale cluster automatically appear in the Microsoft Initiators target list Update...

Page 84: ...5 Storage Options From the storage default page Storage Settings you can access and configure the storage options for your SnapScale cluster including nodes and drives Topics in Storage Options Peer S...

Page 85: ...ased on the configuration settings the additional drives are either used to create more peer sets or left as hot spares Nodes can be removed from a cluster for replacement with a new node and the driv...

Page 86: ...thout administrator intervention If a peer set is missing one drive but at least one other drive is available the peer set continues to be accessible but is in degraded mode This table shows the diffe...

Page 87: ...data on the peer set it continues to operate as is Data Replication Count is an administrator specified cluster wide count of the degree of redundancy of data on the cluster The Data Replication Count...

Page 88: ...may be deleted if Any peer set member drive runs out of snapshot space A second member of a peer set containing unique snapshot data fails even though the main file system data may still be healthy P...

Page 89: ...o view the Disks page and identify the specific disk drive s location Member 2 Shows the node drive slot number and the size of the second member of this peer set Click to view the Disks page and iden...

Page 90: ...ght Displays the quantity set for spare drives Clicking this link takes you to the SnapScale Properties page to edit the setting NOTE This setting may not equal the number of spare drives currently di...

Page 91: ...etects an uneven distribution of spare drives an alert banner is displayed in the Web Management Interface and the Spare Distributor page is enabled NOTE You can click Later to turn off the alert for...

Page 92: ...an alert you can click the Spare Distributor link in the alert to go directly to the page 2 Click the Start Spare Distributor button to start the process The Spare Distributor redistributes spares an...

Page 93: ...ess until completed Data Balancer Data Balancer formerly Capacity Balancer redistributes peer set utilization by moving data from more to less heavily used peer sets Maintaining a balance of peer set...

Page 94: ...Sets Data Balancer If responding to an alert you can click the Data Balancer link in the alert to go directly to the page 2 Review the default File Size Limit and change it if needed The File Size Lim...

Page 95: ...lity A table is displayed showing that the Data Balancer is running and the percent completed If needed click Stop Data Balancer to end the operation NOTE The cluster continues to be available for cli...

Page 96: ...ll volumes share the same cluster storage space and are thinly provisioned to provide better utilization rates of the space Volumes can be configured with a maximum size setting quota to prevent one v...

Page 97: ...ptions It is recommended to enter a Volume Name to easily identify the specific volume If desired keep the default of No Limit to allow the volume to consume an unlimited amount of cluster storage Oth...

Page 98: ...are only shown if snapshot space has been reserved 5 Enter the appropriate data and select the necessary options then click Create Share Additional options can be accessed by clicking the Advanced Sh...

Page 99: ...Volume Size There are two options controlling the maximum size of a volume No Limit This is the recommended option because it allows the volume to consume space as needed Limit Volume to Establish a...

Page 100: ...Deleting Volumes To delete a volume at the Volume Properties page click the Delete Volume button At the confirmation page click the Delete Volume button again You are returned to the Volumes page and...

Page 101: ...and groups there are no pre assigned default quotas on the SnapScale When quotas are assigned you can assign a default space or file quota for all users or allow all users to have unlimited space on...

Page 102: ...make changes choose to either use the entire disk or a space of a specific size For a specific size enter the maximum amount and select the units Click OK to accept Default File Quota Page To make cha...

Page 103: ...in that volume who do not have a specific quota assigned to them A text string the text strings No space limit and or No file limit are displayed when quotas are enabled but the default space size and...

Page 104: ...95 used 2 Select Find All or Find When entering a search string for Find Returned results will include all users and groups whose name contains the string entered To search a specific Windows or NIS d...

Page 105: ...ption to this is LDAP NIS groups They don t use a volume default quota so no limit without parentheses is shown If Windows domain users or groups have been ID mapped to local LDAP or NIS users or grou...

Page 106: ...the search wizard 3 To search for a user or LDAP NIS group select the local or domain option from the Search drop down list enter the search string or select Find All and click Search NOTE For domains...

Page 107: ...search by using a more specific string to return the names desired On the rare occasion you need to search for a Windows domain that s not listed remote domain select a Windows domain from the Search...

Page 108: ...n for using the default user space or file quota Editing or Removing Quotas NOTE Any changes override the default volume quota for this user or LDAP NIS group To edit or remove quotas of users or grou...

Page 109: ...ion for the default space or file quotas 5 Click OK Snapshots A snapshot is a consistent stable point in time image of the cluster storage space that can be backed up independent of activity on the cl...

Page 110: ...er set member drive is not necessarily identical to snapshot space of other drives in the same peer set This is most likely to occur if two or more drives in the same peer set have recently failed eve...

Page 111: ...apshot The process involves defining snapshot parameters and scheduling NOTE Do not take more snapshots than your system can store or more than 250 snapshots Under normal circumstances nine or ten sna...

Page 112: ...lf you greatly reduce the risk of archiving inconsistent data To Create a Snapshot Using the Snapshots page in the Web Management Interface you can create a snapshot now later or on a recurring schedu...

Page 113: ...shot to run at a later time it appears in the Scheduled Snapshots table Adjusting Snapshot Space NOTE Once the SnapScale cluster is created the storage space reserved for snapshots can only be decreas...

Page 114: ...ecurity tab See Shares on page 147 for details Scheduling Snapshots To view when snapshots are currently scheduled to occur click Snapshot Schedules The Snapshot Schedules page shows a list of any sch...

Page 115: ...f SCSI packets in Transmission Control Protocol TCP and their transmission via IP On SnapScale clusters an iSCSI disk consumes cluster storage space as a single large file but appears to a client mach...

Page 116: ...devices that respond to the initiators requests for data The interaction between the initiator and target mandates a server client model where the initiator and the target communicate with each other...

Page 117: ...result in data corruption Only enable Multi Initiator Support if your environment or application supports it It functions as a reminder that data corruption is possible if this option is used when cre...

Page 118: ...10 com snapscale clustername blockdevice nnn where clustername is the name of the SnapScale cluster blockdevice is the internal identifier of the iSCSI disk on the target SnapScale cluster and nnn is...

Page 119: ...Disks 1 Navigate to Storage iSCSI and click Create iSCSI Disk 2 Enter the iSCSI settings for the disk name and size 16GB minimum You can accept the default name or enter a new one using up to 20 alpha...

Page 120: ...characters 5 Click the Create iSCSI Disk button 6 At the confirmation page verify the settings and click the Create iSCSI Disk button again to complete the process You are returned to the iSCSI page a...

Page 121: ...t not decrease the size of the iSCSI disk if space is available Enable or disable support for multiple initiators Enable or disable CHAP logon 2 Click OK to accept the changes CAUTION The consistency...

Page 122: ...ich the iSCSI disk resides They are not related to RAINcloudOS snapshots as described in Snapshots on page 109 The VSS iSCSI snapshot rollback feature is not currently supported The VDS hardware provi...

Page 123: ...ly qualified name for example myclientname mydomain com b Repeat Step a for any other hostnames you want to add c When you have finished adding VSS clients click OK 3 Install the VSS hardware provider...

Page 124: ...the SnapScale cluster a Go to Storage iSCSI and click VSS VDS Access b At VSS VDS Access Control enter the VSS client hostname to which you want to grant access and click Add The client hostname is n...

Page 125: ...e nodes provides access to the same data as any other cluster node To balance network client access to the nodes enter an A record to the DNS pointing to the cluster name for each IP address in the no...

Page 126: ...Node Properties page is shown with details of that particular node From this page you can Flash the node drive LEDs to help identify the node Change the node description View the drives in the node R...

Page 127: ...available that consist of either two or three additional nodes and all the necessary cables Documentation is included with each node that details how to install cable and power up the new node Once in...

Page 128: ...art of the cluster and those being added must be attached to the same Client subnet No expansion units can be attached to a node The appropriate ports on the node must be available to create the prope...

Page 129: ...nded to accept all the nodes to ensure the optimum configuration If the node bond type doesn t match the cluster bond type special informational messages are shown in the wizard based on the existing...

Page 130: ...ue to an OS version mismatch it can be upgraded to make it eligible Click the click here link in the Add to SnapScale column then login to the node and perform an OS update see OS Update on page 213 W...

Page 131: ...ly used NOTE When more new nodes are being added to the cluster than there are unused IP addresses in the node address pool more IP addresses must be added to the pool You can also enter a starting ad...

Page 132: ...al minutes IMPORTANT If the Storage network bond type on the new nodes needs to be changed to or from Switch Trunking or Link Aggregation 802 3ad to match the cluster bond type an additional step is s...

Page 133: ...ide 5 Storage Options Example of network bond message Removing Nodes To remove a node from a SnapScale cluster go to Storage Nodes click the node name to view the Node Properties page and then click R...

Page 134: ...and the node is not removed The node itself is no longer associated with the cluster and becomes an Uninitialized node that can be added to another cluster Node Identification The Node Identification...

Page 135: ...m flashing NOTE The LEDs continue to flash for five minutes unless stopped To stop flashing LEDs for all units click the link next to the stop icon located below the Legend list Replacing Drives Shoul...

Page 136: ...ive Note that drives with different rotational speeds cannot be combined in the same cluster In order to properly create peer sets with each member on different nodes if you have the Data Replication...

Page 137: ...nk drive carriers from the slots that will be used for the new drives leaving the remaining blank carriers in place 2 Positioning a drive carrier in front of the appropriate bay For the X2 node slide...

Page 138: ...orage Options On the Disks page any newly detected drives show a disk unused icon next to the drive It may take a minute or two before the drives appear as unused and the new disks detected banner is...

Page 139: ...pScale first auto incorporates drives to fix any failed peer set and fulfill any reserved spare count The Web Management Interface then displays an alert banner about the new drives and the New Disks...

Page 140: ...at all drives be incorporated at the same time Click Incorporate Disks to begin the process If enough new or spare drives exist on different nodes based on your Data Replication Count 2x or 3x new pee...

Page 141: ...tors may choose to join the SnapScale cluster to a Windows Active Directory domain and CIFS SMB and AFP clients can then authenticate to the cluster using their domain credentials To accommodate NFS c...

Page 142: ...e admin account is also admin guest The local user guest account requires no password admingrp The Admin group account includes the default admin user account Any local user accounts created with admi...

Page 143: ...e When the cluster automatically generates UIDs or GIDs for imported Windows domain users or groups UIDs or GIDs that are already in use by LDAP NIS or local users are skipped When LDAP or NIS domain...

Page 144: ...of Windows Active Directory on your cluster NOTE You cannot join an Active Directory domain if NTP is enabled If you see such a message click the NTP link to change your settings When the cluster join...

Page 145: ...5 SnapScale RAINcloudOS 4 1 Administrator s Guide 6 Security Options Security Guide for Entire Volume Access This Share Level Access Security Guide wizard guides you through the four steps it takes to...

Page 146: ...apScale RAINcloudOS 4 1 Administrator s Guide 6 Security Options Security Guide for Folder Access on Volume This Share Level Access Security Guide wizard guides you through the five steps it takes to...

Page 147: ...oups for Windows SMB FTP and HTTP Administrators can also edit the NFS exports file to control how shares are exported to NFS client machines SnapScale supports file access in Windows and Unix network...

Page 148: ...48 SnapScale RAINcloudOS 4 1 Administrator s Guide 6 Security Options Create Shares To create a new share at a minimum you need to specify the share name volume and folder path Click Create Share on t...

Page 149: ...attributes and network access protocols 1 Accept the default share name or enter a new one To ensure compatibility with all protocols share names are limited to 27 alphanumeric characters including sp...

Page 150: ...d the share has NFS enabled be sure to configure the NFS access settings afterward 7 To further configure the share click Advanced Share Properties and enter any of the following 8 Click Create Share...

Page 151: ...urity Shares Share Properties displayed by clicking the share name in the table By clicking the Advanced Share Properties link additional options are displayed Use these options to hide the share from...

Page 152: ...ty to clarify the purpose of the share Hide this share Select this option if you want the share to be hidden from network browsing using SMB HTTP HTTPS and FTP FTPS but not NFS protocols Protocols Sel...

Page 153: ...curity Shares in the Access column click the link next to the share you want to configure The Share Access page is displayed You can set access levels for the share as well as grant or deny access to...

Page 154: ...y are granted access to the share is full control You may restrict selected users and groups to read only access User based share access permissions are cumulative An SMB HTTP and FTP user s effective...

Page 155: ...vel and file level permissions apply to a user action the more restrictive of the two applies Consider the following examples Example A More restrictive file level access is given precedence over more...

Page 156: ...ox on the right Search for users and groups The default permission granted to users and groups when they are granted access to the share is Full Access You may restrict selected users and groups to Re...

Page 157: ...box the name of the remote domain followed by a slash or backslash and the user name for which you are searching for example remote_domain user_name c Click Search to display any matches After you cli...

Page 158: ...pen or Admin only access for the entire share click either Set Open Access or Set Admin Access 6 Click OK to save share permissions NFS Access for Shares NOTE Multiple shares pointing to the same targ...

Page 159: ...be exported to NFS clients You can use the Add Host controls as described below to assist in making entries to the file or you can directly edit the text box After all entries are made click OK to re...

Page 160: ...uash Forces users connected as root to interact as the nobody user UID 65534 This is the SnapScale default no_root_squash no_root_squash means that if root is logged in on your client machine it will...

Page 161: ...sers The Local Users page provides all the options to manage local users Local users are users that are known only to the cluster being accessed Each SnapScale cluster comes with two predefined users...

Page 162: ...that opens enter the requested information Option Description Name Use up to 31 alphanumeric characters and the underscore Full Name Use up to 49 alphanumeric characters includes spaces Input in this...

Page 163: ...this synchronization process you should wait for the message to disappear before making further changes to your SnapScale cluster Disable User Login Check this box to disable the user login The user s...

Page 164: ...Passwords are case sensitive To keep the existing password leave this field blank Password Verify Type the chosen password again for verification To keep the existing password leave this field blank...

Page 165: ...1 On the Local Users page click Password Policy 2 On the Local Users Password Policy page check the Enable Password Policy box Disable User Login Check this box to disable the user login The user s i...

Page 166: ...s box to enable the policy then enter the number of times a user can fail to login before the system locks the user out This applies to failed logins when connecting to any node in the cluster NOTE To...

Page 167: ...3 To make a change To add the user to a group from the list on the right select a group name and click Add To remove the user from a group from the list on the left select the group name and click Rem...

Page 168: ...ons 3 Click Delete User to delete the selected user Local Groups The Local Groups page Security Local Groups provides all the options to manage local groups Local groups are groups of local users that...

Page 169: ...ess the Create Local Group page 2 Enter the following information 3 Click Create Group when finished 4 The Users for Local Group page is displayed allowing you to immediately add users to your new gro...

Page 170: ...the Local Groups Properties page that opens you can change the GID For information on available UID ranges see User and Group ID Assignments on page 144 NOTE Changing a group s GID may alter filesyst...

Page 171: ...al Groups Users to make changes to the membership of a local group Add or Remove Group Users 1 On the Local Groups page select a group name and click Users 2 To make a change To add the user to a grou...

Page 172: ...udOS 4 1 Administrator s Guide 6 Security Options Delete Group On the Local Groups page use the following process to remove a group Delete a Group 1 On the Local Groups page select the group to be del...

Page 173: ...clients and whether the personality of files and folders can be changed by changing permissions NOTE Folders created in a volume default to the security model of that volume The folder s security mod...

Page 174: ...e are files and directories under the volume you are prompted whether you want to recursively apply the change This resets permissions on all files and directories to make them accessible by all users...

Page 175: ...move Mappings removes one or more mappings while Remove All Mappings removes all mappings that had been previously established Options to simplify the discovery of a desired user or group to manage th...

Page 176: ...er or group from the results list and click Add Mapping 3 At the Add Mapping page to find the user group you want to map to select the Windows domain user or group list the scope of the search enter a...

Page 177: ...down list through which to search then enter in the Find box the name of the remote domain followed by a slash or backslash and the user name for which you are searching for example remote_domain user...

Page 178: ...r mappings click OK to activate them 8 At the confirmation page click Save Changes 9 At the filesystem update option page choose either Update Filesystem or Do Not Update Filesystem IMPORTANT Updating...

Page 179: ...g the Search drop down list select the local LDAP or NIS user or group list to be searched b Select Find and enter the search string or select Find All Enter the exact name or a string with a wild car...

Page 180: ...use either Find All or a Find search string using the first few letters of the user group name On the rare occasion you need to search for a Windows domain that s not listed remote domain select a Wi...

Page 181: ...by any of the Windows users and groups you have just updated will remain unchanged and cannot be updated at a later time See Filesystem Updates on page 213 for more details Auto Mapping Auto mapping...

Page 182: ...n your system If you elect not to do this operation any files and folders owned by or having permissions by any of the Windows users and groups you have just updated will remain unchanged and cannot b...

Page 183: ...the confirmation page verify the users groups listed and click Remove Mappings The selected mappings are removed and the default page is displayed with the users groups that were unmapped in purple w...

Page 184: ...option allows you to remove all ID mappings on the cluster If there are no mappings the button is grayed out 1 At the default ID Mapping page click Remove All Mappings If needed check View only unsave...

Page 185: ...by or having permissions by any of the Windows users and groups you have just updated will remain unchanged and cannot be updated at a later time See Filesystem Updates on page 213 for more details R...

Page 186: ...ge Inc 186 SnapScale RAINcloudOS 4 1 Administrator s Guide 6 Security Options 2 Click Remove Missing Mappings to clear the missing mappings from the system A confirmation is shown on the ID Mapping ma...

Page 187: ...r Do Not Update Filesystem options If you choose Update Filesystem UID and GID ownership on files and SIDs in ACLs are updated to reflect the ID mapping operation IMPORTANT Updating may take some time...

Page 188: ...ries are accessed by users either via a user specific share or via a common share pointing to the home directory root Home directories are supported for SMB NFS HTTP HTTPS and FTP FTPS They are access...

Page 189: ...directory is empty the local user s files are copied to the domain user s home directory the first time the local user connects after the users are mapped If both the local and domain user home direct...

Page 190: ...erland Storage Inc 190 SnapScale RAINcloudOS 4 1 Administrator s Guide 6 Security Options NOTE Do not put Home Directories on a volume that might be deleted If you delete the volume you will also dele...

Page 191: ...apter 7 System Monitoring This chapter addresses the options for monitoring the SnapScale cluster Topics in System Monitoring System Status Activity Submenus Active Users Open Files Network Monitor Ev...

Page 192: ...ame Name of the node The default node name is Nodennnnnnn where nnnnnnn is your node number for example Node1123578 Node Model Node model name number OS Version The version of RAINcloudOS currently lo...

Page 193: ...other pages Active Users Open Files Network Monitor CPU The type of central processing unit CPU If more than one CPU exists each is listed separately Client Network Provides details on the client sid...

Page 194: ...e on this page includes user names of all active users their workstation names authorization the number of open files they have on the node the protocol and when they logged on Columns can be sorted i...

Page 195: ...loudOS 4 1 Administrator s Guide 7 System Monitoring Open Files Use this option to view read only details on the open files on a specific node Use the drop down list on the upper right to choose a dif...

Page 196: ...on both the Client and Storage networks Monitoring is enabled by default Go to Monitor Activity Network Monitor and click Disable Network Monitoring to turn it off NOTE When using Internet Explorer d...

Page 197: ...ery 15 seconds NOTE You can manually refresh the data by using the Refresh button above the graphs the Refresh button at the bottom of the page or the Refresh icon at the right corner of the tab bar I...

Page 198: ...When green all nodes are selected Node selection is not available when Combined Usage is enabled To display the Select Nodes icon turn Combined Usage off Total Throughput This icon controls whether t...

Page 199: ...and not updated You can scale the magnification of the graph by either clicking and dragging horizontally withing the graph area or using the handles at the sides of the Zoom Bar To pan and view any...

Page 200: ...loudOS 4 1 Administrator s Guide 7 System Monitoring Download Usage Records To download the record displayed as a CSV file click Download A dialog box asks you to determine the location of the downloa...

Page 201: ...or E Yellow Warning W no color Informational or Unclassified I E W I Option Description View Log Select to view either the SnapScale cluster wide or node specific logs The SnapScale option shows gener...

Page 202: ...h this node it should have been taken over by a different node No services are running on this node Banned This node failed too many recovery attempts and has been banned from participating in the clu...

Page 203: ...o your SnapScale via the Web Management Interface the settings are applied to the Management node first to determine success or failure of the configuration then the settings are applied to the other...

Page 204: ...and date time the setting was applied If an operation is still in progress on a node the Status will be set to Pending with a yellow background If an operation failed on a node the Status will have a...

Page 205: ...e page to return to the Monitor page The following table describes the fields Field Description Device Model The manufacturer s model for the device Device Type Type of tape device either Sequential A...

Page 206: ...on the Web Management Interface displays options used to maintain this SnapScale cluster There is also a Tools submenu of special related options Topics in Maintenance Shutdown and Restart Data Import...

Page 207: ...e Shutdown Restart in the Web Management Interface The Power button on the front of the node can be used to power on or power off in an emergency a node To turn the node on press the Power button on t...

Page 208: ...loudOS 4 1 Administrator s Guide 8 Maintenance Data Import Use the Data Import page Maintenance Data Import to import migrate data from another SnapScale cluster SnapServer or other computer that supp...

Page 209: ...ications of the last import job The following import options can be specified Copy or move data Include subfolders Overwrite existing files Preserve the original permissions settings NOTE If you elect...

Page 210: ...Password Windows user name and password to log in to the source server over SMB For the NFS network protocol enter the User Name node local user name or NIS user representing the UID used to perform...

Page 211: ...s option overwrites those files folders during import default is checked Preserve File Folder Permissions Selecting this option retains the source permissions when the files folders are imported to th...

Page 212: ...ed domains Certain built in Windows users and groups Importing from a Unix Security Model to a Unix Personality directory If you are importing from a Unix server to a Unix personality directory Unix p...

Page 213: ...interrupt the update process You may severely damage the cluster if you interrupt a software update operation before it is complete Update the RAINcloudOS NOTE Snap EDR cannot be installed on a SnapSc...

Page 214: ...es are updated simultaneously The SnapScale will be offline restarted and unavailable during the entire update process Online or Rolling Update This is a slower option as each node is updated in seque...

Page 215: ...ems and data loss consider the following caveats If upload fails on one or more nodes the upgrade will abort with an error and list the nodes that had problems In such a case an Offline Update is requ...

Page 216: ...features are blocked during an Online Rolling Update Delete SnapScale Add Nodes Remove Node Data Balancer Spare Distributor Update Notification Check for Updates Certain SnapScale Properties Changing...

Page 217: ...ster Reason Solution Peer sets are degraded or rebuilding Address degraded issue and allow peer sets to rebuild before updating OS versions are not consistent across all SnapScale nodes Update the RAI...

Page 218: ...the menu bar on all Web Management Interface pages NOTE You can choose to hide the banner by clicking either the Remind me later or Hide this message link on the banner For Remind me later the Web Man...

Page 219: ...ance 2 Check the Enable Automatic Update Notification box 3 If your environment requires using a proxy server for external web based communication a Check the Use a proxy server for HTTP communication...

Page 220: ...information Click this link to view a detailed status of the last update applied to the cluster Support The Support page provides an easy way to contact Overland Technical Support and transmit system...

Page 221: ...ble with your contact information entered Registering Your Cluster The very first time you start your cluster a Registration Reminder page appears Registering your cluster activates your warranty and...

Page 222: ...If you skipped the registration during setup to register the cluster now click Registration on the Maintenance Support page To Register Your Cluster NOTE To use this feature access to the Internet is...

Page 223: ...r settings make sure that you save the CSV file to your local computer 4 Email the downloaded CSV file to warranty overlandstorage com Use the subject line SnapScale Registration Request for the email...

Page 224: ...5 002 2008 14 Overland Storage Inc 224 SnapScale RAINcloudOS 4 1 Administrator s Guide 8 Maintenance Maintenance Tools The Tools option provides a submenu of general purpose maintenance options and fe...

Page 225: ...le and then click OK Option Description Enable Email Notification To enable email notification check the Enable Email Notification box SMTP Server Enter a valid SMTP server IP address or host name SMT...

Page 226: ...can be entered Send Email Notification Check the boxes next to the events you wish to be notified about Node shutdown restart The node shuts down or reboots due to an automatic or manual process Node...

Page 227: ...e to identify external hosts in the hosts file for the SnapScale cluster This page allows you to supply a hostname to IP address mapping that persists across system reboots Click Add Host File Entry c...

Page 228: ...ed nodes Shut down all nodes After deleting the SnapScale cluster the nodes shut down The next time the nodes are powered on they automatically perform a fresh install and then reboot as Uninitialized...

Page 229: ...RAINcloudOS 4 1 Administrator s Guide 8 Maintenance 3 At the confirmation page enter your Admin password and click Delete SnapScale again to start the process During the cluster deletion an informatio...

Page 230: ...gmt Interface Settings these options are also directly navigable from the various menus in the Web Management Interface Also the Home Snap Finder SnapExtensions Site Map and Help options are accessibl...

Page 231: ...Once logged in using the Administration link you can switch between the Home page and the Administration page using the Home page icon on the button bar Home Page The Web Management Interface Home pa...

Page 232: ...file folder on the share Clicking this icon displays a popup box with security information about the file folder This page also provides three key administrative function links Change Password Takes...

Page 233: ...he cluster has not completed the Initial Setup Wizard if this is the case you will not be able to access the Administration page of the Web Management Interface either Web Root is enabled via Network...

Page 234: ...istrator s Guide 9 Misc Options The Auto refresh icon is displayed on the right corner just above the Cluster Status Box Click the icon or Refresh below the Cluster Status Box to manually refresh the...

Page 235: ...ension Mousing over this icon shows all active extensions and provides a direct access link to them BitTorrent Sync CAUTION BitTorrent Sync bypasses share and file security Be sure to only share data...

Page 236: ...36 SnapScale RAINcloudOS 4 1 Administrator s Guide 9 Misc Options 2 At the configuration page check Enable and click OK 3 At the following page accept the BitTorrent Privacy Policy and Terms by clicki...

Page 237: ...e use the Configure BitTorrent Sync link to configure it for your use NOTE Once enabled you can return at any later time to configure or reconfigure BitTorrent Sync by clicking BitTorrent Sync on the...

Page 238: ...ble Once re enabled BitTorrent Sync must be completely reconfigured again There are BitTorrent Sync mobile apps that make synced documents available on iOS Android Windows Phone 8 and Kindle Fire syst...

Page 239: ...ter is always Online IP Address The IP address of the SnapServer Uninitialized node or the Management IP address of the SnapScale cluster OS Version The OS version currently installed on the SnapServe...

Page 240: ...bnet Complete the following fields and then click OK to return to the Snap Finder page Option Description Display warning if any of a server s Ethernet ports have no link Check to display a warning ic...

Page 241: ...passwords regularly This is done using the Change Password page Changing Your Password 1 On the Home page click the Change Password link 2 At the Change Password page enter your User Name and Current...

Page 242: ...blue background This can be changed to a solid blue background on the Web Management Interface Settings page by clicking the Site Map icon to access Management Interface Settings Check the first box...

Page 243: ...10400455 002 2008 14 Overland Storage Inc 243 SnapScale RAINcloudOS 4 1 Administrator s Guide 9 Misc Options...

Page 244: ...a node can be performed using supported backup agents and media libraries installed on a node Snap Enterprise Data Replicator Snap EDR provides server to server synchronization by moving copying or re...

Page 245: ...talled it is automatically installed on that node Configuring Snap EDR To configure the cluster as a Snap EDR Management Console or an Agent 1 Click the SnapExtensions icon located in the upper right...

Page 246: ...on Notes do not support the backup of Windows ACLs If Windows ACL backup is critical Overland Storage strongly recommends you create a disaster recovery image before you perform a backup A SnapScale c...

Page 247: ...del Management Special Share Options File and Share Access File level Security Security Model Rules Files and directories created inside security models acquire the security personality and permission...

Page 248: ...files and directories cannot be changed on a Unix security model All files and directories always have the Unix personality Security Model Management Changes to a security model can optionally be pro...

Page 249: ...ls Share Level Permissions Share level permissions on GuardianOS are applied cumulatively For example if the user jdoe has Read Only share access and belongs to the group sales which has Read Write sh...

Page 250: ...a file can retrieve it on demand without administrator intervention Snapshot shares are created during the course of creating a share or thereafter by navigating to the Snapshots page and clicking the...

Page 251: ...t and inheritance models not including the behavior of some built in Windows users and groups Unix Traditional Unix permissions rwx for owner group owner and other By default volumes are created with...

Page 252: ...ingrp The ACL is inherited per the inheritance ACEs on the parent directory s ACL The owner of a file or directory always implicitly has the ability to change permissions regardless of the permissions...

Page 253: ...me Support LED Indicators LED indicators provide information on the status of basic connectivity disk drives fan modules and power supply modules SnapScale X2 Node LEDs The SnapScale X2 has one networ...

Page 254: ...h disk carrier Node Status LED This is the round LED located just below the Power button on the right flange Drive Activity Drive Status Ethernet Power Reset Status Button Device State LED State No Di...

Page 255: ...m is Drive Status The Control Panel on the left flange has a series of LEDs as shown here Device State LED State Powered OFF Off Link Up SnapScale Powered ON Solid green Link Down Off Device State LED...

Page 256: ...ge Control Panel Icon Name Description Power Button This is the main power button Turning off system power with this button removes the main power but keeps standby power supplied to the system The po...

Page 257: ...umber of reasons To resolve this issue use one of the following methods Verify that you have the correct IP address of the cluster and try to connect again Verify that the LED for the primary Ethernet...

Page 258: ...troller This means that either your Domain Controller is down or the SnapScale is unable to reach it Because it cannot communicate with the Domain Controller it is not able to authenticate the user Ch...

Page 259: ...in as root You Are Unable to See Your Domain Users When Trying to Set Up Windows Security Permissions on File Folders The SnapScale has joined the Active Directory domain properly but you cannot see t...

Page 260: ...rt representative may ask you to fill out and submit this page If a case is already in progress you will need to enter the case number provided by the technical support representative NOTE Phone Home...

Page 261: ...generate and tech support may direct a user to use this for a particular case The additional options include FTP Server Name of the server to upload to FTP Path FTP server path used to upload to FTP...

Page 262: ...age Inc 262 SnapScale RAINcloudOS 4 1 Administrator s Guide C Troubleshooting Upload information about specific nodes Select one or more nodes to upload logs from them Use the Select All and Select No...

Page 263: ...c Host Control Protocol DHCP clients 80 TCP UDP Web Management Interface http HyperText Transfer Protocol HTTP for World Wide Web WWW services 81 TCP Web Management Interface HTTP Hypertext Transport...

Page 264: ...2599 UDP Snap Finder SnapServer Manager Sysbroker Multicast Discovery 3052 TCP SnapScale UPS Port for monitoring UPS status 3205 TCP Network iSNS iSNS iSNS port 3260 TCP Storage iSCSI iSCSI iSCSI por...

Page 265: ...torage Inc 265 SnapScale RAINcloudOS 4 1 Administrator s Guide D RAINcloudOS Ports 1024 65535 TCP UDP Network NFS Network FTP NFS FTP Passive Dynamically allocated in runtime for user connections Port...

Page 266: ...ters COMMANDS ARGUMENTS and OPTIONS To generate commands in SnapCLI use the following syntax COMMAND ARGUMENT OPTIONS where COMMAND is the name of one of the SnapCLI commands ARGUMENT is an action ava...

Page 267: ...access the cluster and to disable non secure HTTP access SnapCLI Procedures Use these procedures to access and exit SnapCLI Logging into SnapCLI 1 Make sure your client has an SSH v2 client applicati...

Page 268: ...the date set command domain get Get the domains and their properties known to the SnapScale cluster domain list List the domains known to the SnapScale cluster email get Get email notification setting...

Page 269: ...remove all Remove all ID mappings idmap update files Update filesystem for ID mapping changes idmap update status View status of ID mapping update filesystem operation idmap user get Get ID mapping f...

Page 270: ...e quota limit usage for a specific user reboot Reboot the SnapScale cluster securitymodel get Get the security model on a SnapScale Volume securitymodel set Set the security model on a SnapScale Volum...

Page 271: ...swrapper and all third party logs syslog edr Create a tar file of Snap EDR logs syslog s2s Create a tar file of S2Sv2 logs syslog syswrapper Create a tar file of syswrapper only tcpip create bond Crea...

Page 272: ...the name of the script 5 To run the script type the path again and press Enter shares sharename scriptname Sample Script Following is an example script that can be used to create and remove users gro...

Page 273: ...usage mkuser user_name password mkuser Create a User if the user does not exist then create it if CLI user get user name 1 dev null 2 1 then echo Creating user 1 CLI user create user name 1 password 2...

Page 274: ...get user name 1 dev null 2 1 then if CLI group get group name 2 dev null 2 1 then echo Adding user 1 to group 2 CLI group member add user name 1 group name 2 dev null 2 1 if ne 0 then echo Adding user...

Page 275: ...1 failed return 1 fi else echo Group 1P does not exist fi return 0 usage rmshare share_name rmshare Delete the Share if the share exists delete it if CLI share get share name 1 dev null 2 1 then echo...

Page 276: ...uence of steps designed to solve a problem or execute a process ATA Short for Advanced Technology Attachment A standard interface for connecting storage devices to a PC Authentication The validation o...

Page 277: ...1985 Cat 6 Cable Short for Category 6 it is network cabling that consists of four twisted pairs of copper wire terminated by 8P8C modular connectors made to higher standards that help reduce noise cau...

Page 278: ...on the network To gain access to these network resources the user logs into the domain Domain Name The ASCII name that identifies the domain for a group of computers within a network Ethernet The most...

Page 279: ...ovides a way to exchange files between computers on the Internet Full duplex A type of transmission that allows communicating systems to both transmit and receive data simultaneously Gateway The hardw...

Page 280: ...us or network An initiator issues the commands a target receives them An initiator normally runs on a host computer It may be either a software driver or a hardware plug in card often called a Host Bu...

Page 281: ...nd the origin of group policies are applied to the domain LAN Short for Local Area Network A network connecting computers in a relatively small area such as a building LCD Short for Liquid Crystal Dis...

Page 282: ...largest size packet or frame specified in octets eight bit bytes that can be sent in a packet or frame based network NIC Short for Network Interface Card A board that provides network communication c...

Page 283: ...A router is a device that enables connectivity between Ethernet network segments SAN Short for Storage Area Network Data storage connected to a network that provides network clients access to data us...

Page 284: ...no passwords cross the network in clear text SSL Short for Secure Sockets Layer A protocol for managing the security of a message sent on the Internet It is a type of technology that provides data en...

Page 285: ...e senses a loss of power from the primary source URL Short for Uniform Resource Locator A Web address USB Port USB is short for Universal Serial Bus A USB port is a hardware interface for low speed pe...

Page 286: ...Share Properties 149 151 Advanced Support Properties 261 ALB 56 alert definitions 4 alert messages 40 Application Notes 246 Authentication default settings 142 HTTPS HTTP 78 Kerberos 63 LDAP domain 71...

Page 287: ...igabit Ethernet Event Log page 201 expansion kits 127 exports file NFS 147 F failed drive 136 Failover failover 16 file folder security information 232 files setting permissions for 251 FTP connecting...

Page 288: ...rk Monitor page 196 network monitoring download usage records 200 graphing options 199 viewing usage 197 new drives detected 139 NFS access 67 exports file 147 read only share access 68 share level pe...

Page 289: ...links 42 SMB 61 SMB backup 246 SMB2 65 67 SMTP methods supported 225 Snap EDR 238 244 Snap Finder 238 SnapCLI 266 running scripts 272 syntax 266 SnapExtensions BitTorrent 235 main page 235 mouseover i...

Page 290: ...address 60 246 V VDS based iSCSI disks 118 version of OS 3 volumes capacity reached alert 226 default page 96 expanding capacity of 99 Volume Properties 99 VSS based iSCSI disks 118 W warranty activat...

Reviews: