+ All Categories
Home > Documents > Symantec™ FileStore Command-Line Administrator's Guide

Symantec™ FileStore Command-Line Administrator's Guide

Date post: 05-Apr-2018
Category:
Upload: scribdjos
View: 247 times
Download: 0 times
Share this document with a friend

of 543

Transcript
  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    1/542

    Symantec FileStore

    Command-LineAdministrator's Guide

    5.6

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    2/542

    Symantec FileStore Command-Line AdministratorsGuide

    Thesoftwaredescribedin this book is furnishedundera license agreement andmaybe used

    only in accordance with the terms of the agreement.

    Product version: 5.6

    Document version: 5.6.0

    Legal Notice

    Copyright 2011 Symantec Corporation. All rights reserved.

    Symantec, the Symantec logo, Veritas, Veritas Storage Foundation, CommandCentral,

    NetBackup, Enterprise Vault, and LiveUpdate are trademarks or registered trademarks of

    Symantec corporation or its affiliates in the U.S. and other countries. Other names may be

    trademarks of their respective owners.

    This Symantec product may contain third party software for which Symantec is required

    to provide attribution to the third party (Third Party Programs). Some of the Third Party

    Programs areavailableunderopen sourceor free software licenses.The License Agreement

    accompanying the Software does not alter any rights or obligations you may have under

    those open source or free software licenses. See the Third-party Legal Notices document

    for this product, which is available online or included in the base release media.

    The product described in this document is distributed under licenses restricting its use,

    copying, distribution, and decompilation/reverse engineering. No part of this document

    may be reproduced in any form by any means without prior written authorization ofSymantec Corporation and its licensors, if any.

    THE DOCUMENTATIONIS PROVIDED"ASIS" ANDALL EXPRESS ORIMPLIED CONDITIONS,

    REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF

    MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,

    ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO

    BELEGALLYINVALID. SYMANTECCORPORATION SHALL NOTBELIABLEFORINCIDENTAL

    OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,

    PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED

    IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

    TheLicensedSoftwareand Documentation are deemedto be commercial computer software

    as defined in FAR12.212 andsubjectto restricted rights as defined in FARSection 52.227-19

    "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in

    Commercial Computer Software or Commercial Computer Software Documentation", as

    applicable, and any successor regulations. Any use, modification, reproduction release,

    performance,display or disclosure of theLicensedSoftwareandDocumentation by theU.S.

    Government shall be solely in accordance with the terms of this Agreement.

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    3/542

    Symantec Corporation

    350 Ellis Street

    Mountain View, CA 94043

    http://www.symantec.com

    http://www.symantec.com/http://www.symantec.com/
  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    4/542

    Technical Support

    Symantec Technical Support maintains support centers globally. Technical

    Supports primary role is to respond to specific queries about product features

    andfunctionality. The Technical Support group also createscontentfor ouronline

    Knowledge Base. The Technical Support group works collaboratively with the

    other functional areas within Symantec to answer your questions in a timely

    fashion.Forexample,theTechnicalSupport groupworkswith Product Engineering

    andSymantec Security Response to provide alerting services andvirus definition

    updates.

    Symantecs support offerings include the following:

    A range of support options that give you the flexibility to select the right

    amount of service for any size organization Telephone and/or Web-based support that provides rapid response and

    up-to-the-minute information

    Upgrade assurance that delivers software upgrades

    Global support purchased on a regional business hours or 24 hours a day, 7

    days a week basis

    Premium service offerings that include Account Management Services

    For information about Symantecs support offerings, you can visit our Web site

    at the following URL:

    www.symantec.com/business/support/index.jsp

    All support services will be delivered in accordance with your support agreement

    and the then-current enterprise technical support policy.

    Contacting Technical Support

    Customers with a current support agreement may access Technical Support

    information at the following URL:

    www.symantec.com/business/support/contact_techsupp_static.jsp

    Before contacting Technical Support, make sure you have satisfied the systemrequirements that are listed in your product documentation. Also, you should be

    at thecomputer on which theproblem occurred, in case it is necessaryto replicate

    the problem.

    When you contact Technical Support, please have the following information

    available:

    Product release level

    http://www.symantec.com/business/support/index.jsphttp://www.symantec.com/business/support/contact_techsupp_static.jsphttp://www.symantec.com/business/support/contact_techsupp_static.jsphttp://www.symantec.com/business/support/index.jsp
  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    5/542

    Hardware information

    Available memory, disk space, and NIC information

    Operating system Version and patch level

    Network topology

    Router, gateway, and IP address information

    Problem description:

    Error messages and log files

    Troubleshooting that was performed before contacting Symantec

    Recent software configuration changes and network changes

    Licensing and registration

    If your Symantecproduct requires registrationora license key, accessourtechnical

    support Web page at the following URL:

    www.symantec.com/business/support/

    Customer service

    Customer service information is available at the following URL:

    www.symantec.com/business/support/

    Customer Service is available to assist with non-technical questions, such as the

    following types of issues:

    Questions regarding product licensing or serialization

    Product registration updates, such as address or name changes

    General product information (features, language availability, local dealers)

    Latest information about product updates and upgrades

    Information about upgrade assurance and support contracts

    Information about the Symantec Buying Programs

    Advice about Symantec's technical support options

    Nontechnical presales questions

    Issues that are related to CD-ROMs or manuals

    http://www.symantec.com/business/support/http://www.symantec.com/business/support/http://www.symantec.com/business/support/http://www.symantec.com/business/support/
  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    6/542

    Support agreement resources

    If you want to contact Symantec regarding an existing support agreement, please

    contact the support agreement administration team for your region as follows:

    [email protected] and Japan

    [email protected], Middle-East, and Africa

    [email protected] America and Latin America

    Documentation

    Product guides are available on the media in PDF format. Make sure that you are

    using the current version of the documentation.The document version appears

    on page 2 of each guide. The latest product documentation is available on the

    Symantec website.

    http://www.symantec.com/business/support/overview.jsp?pid=15107

    Your feedback on product documentation is important to us. Send suggestions

    for improvements and reports on errors or omissions. Include the title and

    document version (located on the second page), and chapter and section titles of

    the text on which you are reporting. Send feedback to:

    [email protected]

    About Symantec Connect

    Symantec Connect is the peer-to-peer technical community site for Symantecs

    enterprise customers. Participantscanconnect andshare information with other

    product users, including creating forum posts, articles, videos, downloads, blogs

    and suggesting ideas, as well as interact with Symantec product teams and

    Technical Support. Content is rated by the community, and members receive

    reward points for their contributions.

    http://www.symantec.com/connect/storage-management

    Additional enterprise services

    Symantec offers a comprehensive set of services that allow you to maximize yourinvestment in Symantec products and to develop your knowledge, expertise, and

    global insight, which enable you to manage your business risks proactively.

    Enterprise services that are available include the following:

    These services remove theburdenof managing andmonitoringsecurity devices

    and events, ensuring rapid response to real threats.

    Managed Services

    mailto:[email protected]:[email protected]:[email protected]://www.symantec.com/business/support/overview.jsp?pid=15107mailto:[email protected]://www.symantec.com/connect/storage-managementhttp://www.symantec.com/connect/storage-managementmailto:[email protected]://www.symantec.com/business/support/overview.jsp?pid=15107mailto:[email protected]:[email protected]:[email protected]
  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    7/542

    Symantec Consulting Services provide on-site technical expertise from

    Symantec anditstrustedpartners.Symantec Consulting Services offer a variety

    of prepackaged and customizable options that include assessment, design,

    implementation, monitoring, and management capabilities. Each is focused onestablishing andmaintainingtheintegrity andavailabilityof your IT resources.

    Consulting Services

    Education Services providea full array of technical training, security education,

    security certification, and awareness communication programs.

    Education Services

    To access more information about enterprise services, please visit our Web site

    at the following URL:

    www.symantec.com/business/services/

    Select your country or language from the site index.

    http://www.symantec.com/business/services/http://www.symantec.com/business/services/
  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    8/542

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    9/542

    Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

    Chapter 1 Introducing Symantec FileStore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

    About FileStore ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

    About FileStore features ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

    Simple installation .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

    Active/Active Scalable NFS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23Active/Active CIFS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    NFS Lock Management (NLM) .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    Administration .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    Storage tiering .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

    High-performance data replication .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

    Integrated content scanning using Symantec AntiVirus for

    FileStore ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

    About the core strengths of FileStore ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

    FileStore key benefits and other applications ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

    High performance scaling and seamless growth .... . . . . . . . . . . . . . . . . . . . . . . . 26

    High availability ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27Consolidating and reducing costs of storage .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

    Enabling scale-outcompute clusters and heterogeneous sharing

    of data ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    FileStore on the Web .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

    Using the FileStore product documentation .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

    Chapter 2 Creating users based on roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    About user roles and privileges ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    About the naming requirements for adding new users ... . . . . . . . . . . . . . . . . . . . . . 32

    About using the FileStore command-line interface ... . . . . . . . . . . . . . . . . . . . . . . . . . . 33

    Logging in to the FileStore CLI ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

    About accessing the online man pages ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

    About creating Master, System Administrator, and Storage

    Administrator users ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

    Creating Master, System Administrator, and Storage Administrator

    users ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

    About the support user ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

    Contents

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    10/542

    Configuring the support user account ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

    Displaying the command history .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

    Chapter 3 Displaying and adding nodes to a cluster . . . . . . . . . . . . . . . . . . . . . . 49About the cluster commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

    About FileStore installation states and conditions ... . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

    Displaying the nodes in the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

    About adding a new node to the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

    Installing the FileStore software onto a new node .... . . . . . . . . . . . . . . . . . . . . . . . . . . 54

    Adding a node to the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

    Deleting a node from the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

    Shutting down the cluster nodes ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

    Rebooting the nodes in the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

    Chapter 4 Configuring storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

    About storage provisioning and management ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

    About configuring storage pools ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

    Configuring storage pools ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

    About configuring disks ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

    Configuring disks ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

    About performing local replication initialization .... . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

    Detachingone or more pools from the FileStore cluster as a detached

    pool set ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

    Displaying detached pools ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75Attaching a replication storage pool to a FileStore cluster ... . . . . . . . . . . . . . . . . . 75

    About displaying information for all disk devices ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

    Displaying information for all disk devices associated with nodes in

    a cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

    Increasing the storage capacity of a LUN .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

    Formatting/reinitializing a disk ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

    Printing WWN information .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

    Initiating FileStore host discovery of LUNs .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

    Importing pools forcefully ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

    About I/O fencing .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

    Configuring I/O fencing .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

    About quotas for file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

    Using quota commands for enabling, disabling, and displaying file

    system quotas ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

    Using quota commands for setting and displaying file system

    quotas ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

    About quotas for CIFS home directories ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

    Using quotas for CIFS home directories ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

    Contents10

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    11/542

    Displaying the quota values for CIFS home directories ... . . . . . . . . . . . . . . . . . . . 105

    About iSCSI ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

    Configuring the iSCSI initiator ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

    Configuring the iSCSI initiator name .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109Configuring the iSCSI device ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

    Configuring discovery on iSCSI ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

    About configuring the iSCSI targets ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

    Configuring the iSCSI targets ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

    About data archive and retention (DAR) ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

    How DAR interacts with other FileStore applications ... . . . . . . . . . . . . . . . . . . . . . 121

    Configuring data archive and retention .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

    Chapter 5 Configuring Symantec FileStore networksettings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

    About network mode commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

    Displaying the network configuration and statistics ... . . . . . . . . . . . . . . . . . . . . . . . 129

    About bonding Ethernet interfaces ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

    Bonding Ethernet interfaces ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

    About DNS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133

    Configuring DNS settings ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

    About IP commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

    About configuring IP addresses ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

    Configuring IP addresses ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

    About configuring Ethernet interfaces ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143

    Displaying current Ethernet interfaces and states ... . . . . . . . . . . . . . . . . . . . . . . . . . 144

    Configuring Ethernet interfaces ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

    About configuring routing tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

    Configuring routing tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148

    About LDAP .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

    Before configuring LDAP settings ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

    About configuring LDAP server settings ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

    Configuring LDAP server settings ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154

    About administering FileStore cluster's LDAP client ... . . . . . . . . . . . . . . . . . . . . . . 158

    Administering the FileStore cluster's LDAP client ... . . . . . . . . . . . . . . . . . . . . . . . . . 159

    About NIS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160Configuring the NIS-related commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161

    About NSS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163

    Configuring NSS lookup order ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164

    About VLAN interfaces ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165

    Configuring VLAN interfaces ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166

    Contents

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    12/542

    Chapter 6 Configuring your NFS server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169

    About NFS server commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169

    Accessing the NFS server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170

    Displaying NFS statistics ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172

    Displaying file systems and snapshots that can be exported .... . . . . . . . . . . . 173

    Chapter 7 Creating and maintaining NFS shares . . . . . . . . . . . . . . . . . . . . . . . . . 175

    About NFS file sharing .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175

    Displaying exported directories ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176

    Adding an NFS share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

    Sharing directories using CIFS and NFS protocols ... . . . . . . . . . . . . . . . . . . . . . . . . . 181

    Exporting an NFS snapshot ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184

    Unexporting a directory or deleting NFS options ... . . . . . . . . . . . . . . . . . . . . . . . . . . . 184

    Chapter 8 Creating and maintaining file systems . . . . . . . . . . . . . . . . . . . . . . . . 187

    About creating and maintaining file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

    Listing all file systems and associated information .... . . . . . . . . . . . . . . . . . . . . . . . 191

    About creating file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

    Creating a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

    Adding or removing a mirror to a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195

    Configuring FastResync for a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197

    Disabling the FastResync option for a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . 198

    Increasing the size of a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199

    Decreasing the size of a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201

    Checking and repairing a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202

    Changing the status of a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202

    Defragmenting a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

    Destroying a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

    About snapshots ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

    Creating snapshots ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

    Displaying snapshots ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

    Configuring snapshots ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

    About snapshot schedules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211

    Creating snapshot schedules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213Displaying snapshot schedules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

    Configuring snapshot schedules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

    About instant rollbacks ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

    Creating a FileStore space-optimized rollback .... . . . . . . . . . . . . . . . . . . . . . . . . 219

    Creating a full-sized rollback .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220

    Listing FileStore instant rollbacks ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221

    Restoring a file system from an instant rollback .... . . . . . . . . . . . . . . . . . . . . . 221

    Contents12

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    13/542

    Refreshing an instant rollback from a file system .... . . . . . . . . . . . . . . . . . . . 222

    Making an instant rollback go online ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223

    Making an instant rollback go offline ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223

    Destroying an instant rollback .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224Creating a shared cache object for a FileStore instant

    rollback .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225

    Listing cache objects for a FileStore instant rollback .... . . . . . . . . . . . . . . . 226

    Destroying a cache object of a FileStore instant rollback .... . . . . . . . . . . 227

    About setting up file system alerts for file system usage .... . . . . . . . . . . . . . . . . 227

    Setting file system alerts ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227

    Unsetting file system alerts ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

    Displaying file system alerts ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

    About the Partition Secure Notification (PSN) feature ... . . . . . . . . . . . . . . . . . . . . 230

    Enabling the Partition Secure Notification (PSN) feature ... . . . . . . . . . . 231

    Disabling the Partition Secure Notification (PSN) feature ... . . . . . . . . . . 231Listing the online file systems that have the Partition Secure

    Notification (PSN) feature enabled .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232

    Chapter 9 Using Symantec FileStore as a CIFS server . . . . . . . . . . . . . . . . . . 233

    About configuring FileStore for CIFS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

    About configuring CIFS for standalone mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

    Configuring CIFS server status for standalone mode .... . . . . . . . . . . . . . . . . . . . . . 237

    About configuring CIFS for NT domain mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240

    Configuring CIFS for the NT domain mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

    About leaving an NT domain .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245

    Changing NT domain settings ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245

    Changing security settings ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247

    Changing security settings after the CIFS server is stopped .... . . . . . . . . . . . . 247

    About Active Directory (AD) ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247

    Configuring entries for NTP for authenticating to Active

    Directory (AD) ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248

    Configuring entries forFileStoreDNSforauthenticating to Active

    Directory (AD) ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248

    Joining FileStore to Active Directory (AD) ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251

    Verifying that FileStore has joined Active Directory (AD)successfully ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253

    About configuring CIFS for Active Directory (AD) domain mode .... . . . . . . 253

    Configuring CIFS for the AD domain mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

    Using multi-domain controller support in CIFS .... . . . . . . . . . . . . . . . . . . . . . . 258

    About leaving an AD domain .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258

    Changing domain settings for AD domain mode .... . . . . . . . . . . . . . . . . . . . . . 259

    Removing the AD interface ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262

    Contents

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    14/542

    About setting NTLM ..... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262

    Setting NTLM ..... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264

    About setting trusted domains ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

    Allowing trusted domains access to CIFS when setting an LDAPIDMAP backend to rid ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

    Allowing trusted domains access to CIFS when setting an LDAP

    IDMAP backend to ldap .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266

    Allowing trusted domains access to CIF when setting an LDAP

    IDMAP backend to hash .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

    About configuringWindowsActive Directory as an LDAP IDMAP

    backend for FileStore for CIFS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268

    Configuring the Active Directory schema with CIFS-schema

    extensions .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269

    Configuring LDAP as an IDMAP backend using the FileStore

    CLI ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274Configuring the CIFS server with the LDAP backend .... . . . . . . . . . . . . . . . 274

    Setting Active Directory trusted domains ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275

    About storing account information .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

    Storing user and group accounts ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278

    About reconfiguring the CIFS service ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

    Reconfiguring the CIFS service ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

    About managing CIFS shares ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282

    About the CIFS export options ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284

    Setting share properties ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286

    Displaying CIFS share properties ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288Allowing specified users and groups access to the CIFS

    share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

    Denying specified users and groups access to the CIFS

    share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

    Modifying an existing CIFS share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291

    Modifying an existing CIFS share with different CIFS

    options ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292

    Exporting a CIFS snapshot ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292

    Deleting a CIFS share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

    Sharing file systems using CIFS and NFS protocols ... . . . . . . . . . . . . . . . . . . . . . . . . 294

    About mapping user names for CIFS/NFS sharing .... . . . . . . . . . . . . . . . . . . . . . . . . 297About load balancing for the normal clustering mode .... . . . . . . . . . . . . . . . . . . . . 298

    About load balancing for the ctdb clustering mode .... . . . . . . . . . . . . . . . . . . . . . . . 300

    Splitting a CIFS share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300

    About managing home directories ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302

    Setting the home directory file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303

    Setting up home directories ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305

    Displaying home directory usage information .... . . . . . . . . . . . . . . . . . . . . . . . . 307

    Contents14

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    15/542

    Deleting home directories and disabling creation of home

    directories ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308

    About ctdb clustering modes ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

    Exporting a directory as a CIFS share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310Exporting the same file system/directory as a different CIFS

    share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312

    About switching the clustering mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313

    Switching from normal to ctdb clustering mode .... . . . . . . . . . . . . . . . . . . . . . 313

    Switching from ctdb to normal clustering mode .... . . . . . . . . . . . . . . . . . . . . . 316

    About migrating CIFS shares and home directories ... . . . . . . . . . . . . . . . . . . . . . . . . 317

    MigratingCIFS shares andhome directoriesfrom normal to ctdb

    clustering mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319

    MigratingCIFS shares andhome directoriesfrom ctdb to normal

    clustering mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321

    Setting the aio_fork option .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324Setting the netbios aliases for the CIFS server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325

    About managing local users and groups .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326

    Creating a local CIFS user ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

    About configuring local groups .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329

    Configuring a local group .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330

    Chapter 10 Configuring your FTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333

    About FTP .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333

    Displaying FTP server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335

    About FTP server commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335

    Using the FTP server commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336

    About FTP set commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337

    Using the FTP set commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341

    Implementing all of the FTP> set command changes ... . . . . . . . . . . . . . . . . . . . . . 345

    About FTP session commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346

    Using the FTP session commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346

    Using the FTP logupload command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348

    About FTP local user commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348

    Using the FTP local user commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350

    About FTP local user set commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351Using the FTP local user set commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353

    Chapter 11 Configuring your HTTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359

    About configuring your HTTP server for accessing FileStore

    data ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359

    About using the HTTP server commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360

    Starting the HTTP server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360

    Contents

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    16/542

    Stopping the HTTP server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361

    Displaying the status for the HTTP server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361

    About HTTP set commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361

    Displaying the current HTTP sessions on each node .... . . . . . . . . . . . . . . . 363Setting theminimum numberof idle threads forhandling request

    spikes ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363

    Setting themaximum numberof idle threads forhandlingrequest

    spikes ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363

    Setting the maximum number of threads to be created .... . . . . . . . . . . . . 364

    Setting the initial number of server threads ... . . . . . . . . . . . . . . . . . . . . . . . . . . . 364

    Setting the maximum number of threads in each server

    process ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364

    Displaying the list of all configurable HTTP options and their

    values ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365

    About HTTP alias commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365Adding a mapping from a virtualPath to a realPath .... . . . . . . . . . . . . . . . . . 366

    Deleting a mapping that is visible to clients as a virtualPath .... . . . . . 367

    Displaying all the aliases configured on the server ... . . . . . . . . . . . . . . . . . . . 367

    About HTTP document root mapping commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . 367

    Setting the root directory for the HTTP server ... . . . . . . . . . . . . . . . . . . . . . . . . 368

    Displaying the current root directory for the HTTP server ... . . . . . . . . 368

    Chapter 12 Configuring event notifications and audit logs . . . . . . . . . . . 369

    About configuring event notifications and audit logs ... . . . . . . . . . . . . . . . . . . . . . 370

    About severity levels and filters ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371

    About email groups .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371

    Configuring an email group .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373

    About syslog event logging .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378

    Configuring a syslog server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379

    Displaying events on the console ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381

    About SNMP notifications ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381

    Configuring an SNMP management server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382

    Configuring events for event reporting .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385

    Exporting events in syslog format to a given URL .... . . . . . . . . . . . . . . . . . . . . . . . . . 386

    About audit logs ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387Configuring audit logs ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389

    Disabling the audit log for a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391

    Chapter 13 Configuring backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393

    About backup .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394

    About NetBackup .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395

    About the NetBackup snapshot client ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396

    Contents16

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    17/542

    About NetBackup snapshot methods .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396

    About NetBackup instant recovery .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397

    About Fibre Transport ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397

    About SAN clients ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397About FT media servers ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398

    About the FT Service Manager ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398

    About zoning the SAN for Fibre Transport ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398

    About HBAs for SAN clients and FT media servers ... . . . . . . . . . . . . . . . . . . . . . . . . . 399

    About connecting the fiber for SAN Client ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399

    Adding a NetBackup master server to work with FileStore ... . . . . . . . . . . . . . . 400

    Configuring or changing the virtual IP address used by NetBackup

    and NDMP data server installation .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402

    Configuring the virtual name of NetBackup .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403

    About Network Data Management Protocol ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403

    About NDMP supported configurations ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405About the NDMP policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406

    Configuring the NDMP policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407

    Displaying all NDMP policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412

    About retrieving the NDMP data ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413

    Retrieving the NDMP data ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414

    Restoring the default NDMP policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416

    About backup configurations ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417

    Configuring backup .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418

    Configuring backups using NetBackup or other third-party backup

    applications ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420

    Chapter 14 Configuring Symantec FileStore Dynamic StorageTiering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421

    About FileStore Dynamic Storage Tiering (DST) ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422

    How FileStore uses Dynamic Storage Tiering .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425

    About policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426

    About adding tiers to file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426

    Adding tiers to a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427

    Removing a tier from a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428

    About configuring a mirror on the tier of a file system .... . . . . . . . . . . . . . . . . . . 429Configuring a mirror to a tier of a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429

    Listing all of the files on the specified tier ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431

    Displaying a list of DST file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432

    Displaying the tier location of a specified file ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432

    About configuring the policy of each tiered file system .... . . . . . . . . . . . . . . . . . . 432

    Configuring the policy of each tiered file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . 434

    Relocating a file or directory of a tiered file system .... . . . . . . . . . . . . . . . . . . . . . . . 438

    Contents

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    18/542

    About configuring schedules for all tiered file systems .... . . . . . . . . . . . . . . . . . . 438

    Configuring schedules for all tiered file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . 439

    Displaying files that will be moved and/or pruned by running a

    policy ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440Allowing metadata information on the file system to be written on

    the secondary tier ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441

    Restricting metadata information to the primary tier only ... . . . . . . . . . . . . . . 442

    Chapter 15 Configuring system information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443

    About system commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443

    About setting the clock commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444

    Setting the clock commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445

    About configuring the locally saved configuration files ... . . . . . . . . . . . . . . . . . . 448

    Configuring the locally saved configuration files ... . . . . . . . . . . . . . . . . . . . . . . . . . . . 449Using the more command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453

    About coordinating cluster nodes to work with NTP servers ... . . . . . . . . . . . . 453

    Coordinating cluster nodes to work with NTP servers ... . . . . . . . . . . . . . . . . . . . . . 454

    Displaying the system statistics ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455

    Using the swap command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456

    About the option commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457

    Using the option commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459

    Chapter 16 Upgrading Symantec FileStore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465

    About upgrading patches or drivers ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465Displaying the current version of FileStore ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467

    About installing patches ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

    About types of patches ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

    Installing patches ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470

    Uninstalling patches ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471

    Synchronizing software upgrades on a node .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472

    Uninstalling driver updates ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472

    Chapter 17 Using Symantec AntiVirus for FileStore . . . . . . . . . . . . . . . . . . . . . . . 475

    About Symantec AntiVirus for FileStore ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476About Symantec AntiVirus for FileStore licensing .... . . . . . . . . . . . . . . . . . . . . . . . . 477

    About Symantec AntiVirus for FileStore commands .... . . . . . . . . . . . . . . . . . . . . . . 477

    Displaying Symantec AntiVirus for FileStore configurations ... . . . . . . . . . . . 478

    About configuring Symantec AntiVirus forFileStore on all the nodes

    in the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479

    Configuring Symantec AntiVirus for FileStore on the cluster's

    nodes ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480

    Contents18

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    19/542

    About configuring Auto-Protect on FileStore file systems .... . . . . . . . . . . . . . . 481

    Configuring Auto-Protect on FileStore file systems .... . . . . . . . . . . . . . . . . . . . . . . . 482

    About excluding file extensions .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482

    Configuring file extensions for the Symantec AntiVirus for FileStoreconfiguration file ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483

    About Symantec AntiVirus for FileStore LiveUpdate ... . . . . . . . . . . . . . . . . . . . . . . 484

    Using Symantec AntiVirus for FileStore with LiveUpdate ... . . . . . . . . . . . . . . . 486

    About using Symantec AntiVirus for FileStore quarantine

    commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490

    Using Symantec AntiVirus for FileStore quarantine commands .... . . . . . . 491

    Setting the Symantec AntiVirus for FileStore action policy ... . . . . . . . . . . . . . 493

    About using Symantec AntiVirus for FileStore manual scan

    commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494

    Using Symantec AntiVirus for FileStore manual scan

    commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495About scheduling a Symantec AntiVirus for FileStore scan job ... . . . . . . . . . 496

    Scheduling a Symantec AntiVirus for FileStore scan job ... . . . . . . . . . . . . . . . . . 498

    Chapter 18 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503

    About troubleshooting commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504

    Setting the CIFS log level ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505

    Retrieving and sending debugging information .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506

    Updating FileStore GUI-related operations ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507

    About the iostat command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507

    Generating CPU and device utilization reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508

    Displaying license information for the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509

    About excluding the PCI ID prior to the FileStore installation .... . . . . . . . . 510

    Excluding the PCI IDs from the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511

    Testing network connectivity ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513

    About the services command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513

    Using the services command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515

    Using the support login .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517

    About network traffic details ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517

    Exporting and displaying the network traffic details ... . . . . . . . . . . . . . . . . . . . . . . 518

    Accessing processor activity ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519Using the traceroute command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520

    Recovering from a non-graceful shutdown .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521

    Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523

    Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527

    Contents

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    20/542

    Contents20

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    21/542

    Introducing SymantecFileStore

    This chapter includes the following topics:

    About FileStore

    About FileStore features

    About the core strengths of FileStore

    FileStore key benefits and other applications

    FileStore on the Web

    Using the FileStore product documentation

    About FileStoreFileStore was formerly known as Storage Foundation Scalable File Server.

    FileStore is a highly-scalable and highly-available clustered Network Attached

    Storage (NAS) software appliance. Based on Storage Foundation Cluster File

    System technology, FileStore is a complete solution formulti-protocolfileserving.

    FileStore provides an open storage gateway model, including a highly- available

    and scalable Network File System (NFS), CIFS, and FTP file serving platform andan easy-to-use administrative interface.

    The product includes the following key features:

    Backup operations using both NDMP and/or the built-in NetBackup client

    Active/Active CIFS, including integration with Active Directory operations

    Simple administration through a single GUI and/or CLI interface

    1Chapter

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    22/542

    Active/Active shared data NFS sharing including shared read/write and

    LDAP/NIS support

    Simpleadministration of Fibre Channel Host BusAdapters (HBAs), file systems,

    disks, snapshots, and Dynamic Storage Tiering (DST)

    SNMP, syslog, and email notification

    High-speed asynchronous/episode-based replication for content distribution

    and data mining

    Multi-protocolsharing of filesystemsin a highly-scalable andhighly-available

    manner

    Support for single-node FileStore clusters

    Create a snapshot schedule that stores the values by minutes, hour,

    day-of-the-month, month, and day-of-the-week along with the name of thefile system

    Seamless upgrade and patch management

    Support information

    Online man pages

    The components of FileStore include a security-hardened, custom-install SLES

    10 SP3 operating system, core Storage Foundation services including Cluster File

    System, and the FileStore software platform. These components are provided on

    a single DVD or DVD ISO image.

    About FileStore featuresFileStore is designed to provide a full-suite of NAS features, in addition to

    class-leading performance and scalability. A partial list of these features is

    discussed in the following sections.

    Simple installation

    A singlenode in the cluster is booted froma DVD containing the operatingsystem

    image, core Storage Foundation, and FileStore modules. While the node boots,the other nodes are defined using IP addresses.

    After you install FileStore and the first node is up and running, the rest of the

    cluster nodes are automatically installed with all necessary components. The key

    services are then automatically started to allow the cluster to begin discovering

    storage and creating file shares.

    Introducing Symantec FileStoreAbout FileStore features

    22

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    23/542

    Active/Active Scalable NFS

    With FileStore, all nodes in the cluster can serve the same NFS shares as both

    read and write. This creates very high aggregated throughput rates, because you

    can use sum of the bandwidth of all nodes. Cache-coherency is maintained

    throughout the cluster.

    Active/Active CIFS

    CIFS is active on all nodes within the FileStore cluster. The specific shares are

    read/write on the node they reside on, but can failover to any other node in the

    cluster. FileStore supports CIFS home directory shares.

    NFS Lock Management (NLM)

    The NFS Lock Management (NLM) module allows a customer to use NFS advisory

    client locking in parallel with core SFCFS global lock management. The module

    consists of failing over the locks among FileStore nodes as well as forwarding all

    NFS client lock requests to a single NFS lock master.

    The result is that no data corruption occurs if a user or application needs to use

    NFS client locking with an FileStore cluster.

    Administration

    FileStore contains a role-based administration model consisting of the followingkey roles:

    Storage

    Master

    System

    These roles are consistent with the operational roles in many data centers.

    For each role, the administrator uses a simple menu-driven text interface. This

    interface provides a single point of administration for the entire cluster. A user

    logsin asone of those roles on one ofthe nodes in the cluster and runs commands

    that perform the same tasks on all nodes in the cluster.

    You do not need to have any knowledge of the Veritas Storage Foundation

    technology to install oradminister an FileStorecluster. If you arecurrentlyfamiliar

    with core SFCFS or Storage Foundation in general, you will be familiar with the

    basic management concepts.

    Introducing Symantec FileStoreAbout FileStore features

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    24/542

    Storage tiering

    FileStore's built-in Dynamic Storage Tiering (DST) feature can reduce the cost of

    storage by moving data to lower cost storage. FileStore storage tiering also

    facilitates the moving of data between different drive architectures.

    DST lets you do the following:

    Create each file in its optimal storage tier, based on pre-defined rules and

    policies.

    Relocate files between storage tiers automatically as optimal storage changes,

    to take advantage of storage economies.

    Prune files on secondary tiers automatically as files age and are no longer

    needed.

    Retain original file access paths to minimize operational disruption, forapplications, backup procedures, and other custom scripts.

    Handle millions of files that are typical in large data centers.

    Automate these features quickly and accurately.

    High-performance data replication

    Included as a standard feature in the Enterprise Edition of FileStore and optional

    on the Standard Edition, FileStore Replication provides for high-performance

    content distribution across multipleclusters.FileStoreReplication is asynchronous

    (sometimes calledepisodic) andprovidesforfile-based replicationbetween clusters,

    together with the advantage of being able to only transfer blocks within specific

    files that have changed since the last update. With FileStore Replication, the

    destination file system can be on-line for reads, and updates to that destination

    can be as frequent as every fifteen minutes. FileStore Replication is ideal for

    content distribution, or for creating hot-standby replicas of a production

    environment.

    Integrated content scanning using Symantec AntiVirus for FileStore

    New to FileStore is the ability for customers to use Symantec AntiVirus forFileStore. Leveraging content-scanning and anti-virus technology similar to that

    found in the Symantec Endpoint Protection range of products, this feature allows

    forscheduledandreal-time(on-demand)scanning of files andother data contained

    within the FileStore cluster. When conducted in real-time, this content-scanning

    can be used with multiple file access protocols, including CIFS, NFS, FTP, and

    HTTP. Files canbe automatically quarantinedandregularvirus definition updates

    can be obtained by way of the standard Symantec LiveUpdate service.

    Introducing Symantec FileStoreAbout FileStore features

    24

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    25/542

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    26/542

    FileStore key benefits and other applicationsFileStore can be used with any application that requires the sharing of files using

    the NFS v3, CIFS, or FTP protocol. Use-cases such as home directories or decisionsupport applications that require sequential shared access, Web pages, and

    applications are all ideal for FileStore. FileStore is also applicable when you want

    general purpose, high-throughput scale-out processing for your data, together

    with enterprise-class highly available cluster functionality.

    High performance scaling and seamless growth

    FileStore lets you scale storage and processing independently and seamlessly,

    online. Because an application may need to scale either storage or processing, or

    both, this capability gives you a lot of flexibility.

    FileStore automates the installation of new nodes into the running cluster,

    configures those nodes, and adds the nodes' capacity into the processing tier.

    FileStore can scale from 1 to 16 nodes with near linear performance scaling. You

    can add processing one node at a time, rather than buying a large, expensive

    independent appliance.

    A storage administrator can configure a new array or even add new LUNs from

    an existing array into the FileStore cluster. FileStore can then scan the storage,

    automatically see the new LUNs and place them under FileStore control for use

    in the cluster. All of this is performed online.

    At the storage end, resizing of existing file systems can be performed online withno interruption of service. A simple command is used to both add space to an

    existing file system and to also reduce (dynamically shrink) the amount of free

    space in a specified file system.

    The product provides nearly linear scaling in terms of NFS operations per second

    and total I/O throughput.

    Figure 1-1 depicts this scaling capability.

    Introducing Symantec FileStoreFileStore key benefits and other applications

    26

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    27/542

    Figure 1-1 Example of near-linear performance scaling with FileStore

    When using 16-node clusters, extremely high throughput performance numbers

    can be obtained. This is due to the benefits of near linear FileStore clusterscalability.

    High availability

    FileStore has an always on" file service that provides zero interruption of file

    services for company critical data.

    The loss of single or even multiple nodes does not interrupt I/O operations on the

    client tier. This is in contrast to the traditional active/passive failover paradigm.

    Further, with FileStore's modular N-to-N approach to clustered NAS, any node

    can act as a failover for any other node.The FileStore architecture provides transparent failover for other key services

    such as NFS lock state, CIFS and FTP daemons, reporting, logging, and

    backup/restore operations. The console service that provides access to the

    centralized menu-driven interface is automatically failed over to another node.

    The installation service is also highly available and can seamlessly recover from

    the initially installed node failing during the installation of the remaining nodes

    in the cluster.

    The use of Veritas Cluster Server technology and software within FileStore is key

    to the ability of FileStore to provide best-of-breed high availability, in addition to

    class-leading scale-out performance.

    Consolidating and reducing costs of storage

    The value of consolidating several independent islands of NAS appliances into

    fewer, larger shared pools has many cost benefits.

    Introducing Symantec FileStoreFileStore key benefits and other applications

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    28/542

    A typical enterprise uses 30-40% of its storage. This low storage utilization rate

    results in excessive spending on new storage when there is more than adequate

    free space in the data center.

    With FileStore, you can group storage assets into fewer, larger shared pools. Thisincreases the use of backend LUNs and overall storage.

    FileStore also has built-in, pre-configured heterogeneous storage tiering. This

    lets you use different types of storage in a primary and secondary tier

    configuration. Using simple policies, data can be transparently moved from the

    primary storage tier to the secondary tier. This is ideal when mixing drive types

    and architectures such as high-speed SAS drives with cheaper storage, such as

    SATA-based drives. Furthermore, data can be stored initially on the secondary

    tier and then promoted to the primary tier dynamically based on a pattern of I/O.

    This creates an optimal scenario when you use Solid State Disks (SSDs) because

    there will often be a significant change between the amount of SSD storageavailable, and amount of other storage availability, such as SATA drives. Data

    and files that are promoted to the primary tier are transferred back to the

    secondary tier in accordance with the configured access time policy.

    All of this results in substantially increased efficiency, and it can save you money

    because you make better use of the storage you already have.

    Enabling scale-out compute clusters and heterogeneous sharing ofdata

    The trend toward scale-out, or grid computing continues to gain pace. There aresignificant performance and cost advantages of moving applications away from

    large UNIXSymmetrical Multi-Processing(SMP) or mainframe environmentsand

    towards a farmof commodity computer servers running a distributed application.

    One of the key inhibitors to scale-out computing is the requirement to provide a

    shared storage infrastructure for the compute nodes, and enable you to share

    heterogeneously as well as scaleup as performancerequires.FileStore solves both

    of these issues by providing a highly scalable and shared storage platform at the

    storage tier and by facilitating heterogeneous sharing on the compute tier.

    FileStore can provide the performance and availability you need for a large-scale

    NFScompute andstorage tier. It providesenoughthroughput andseamlessfailover

    for this type of architecture whether a few dozen compute nodes, or scaling to

    several hundred nodes.

    Introducing Symantec FileStoreFileStore key benefits and other applications

    28

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    29/542

    FileStore on the WebFor comprehensive, up-to-date information about FileStore, visit the Symantec

    Web site:http://www.symantec.com/business/support/overview.jsp?pid=55079

    Using the FileStore product documentationFileStore product documentation is available in PDF format on the FileStore

    installation DVD in the /docs directory:

    Symantec FileStore Web GUI Administrators Guide(sfs_admin_gui.pdf)

    Symantec FileStore Command-Line Administrators Guide(sfs_admin.pdf)

    Symantec FileStore Installation Guide(sfs_install.pdf)

    Symantec FileStore Replication Guide(sfs_replication.pdf)

    Symantec FileStore Release Notes (sfs_relnotes.pdf)

    Find additional information at this location:

    http://www.symantec.com/business/support/overview.jsp?pid=55079

    Introducing Symantec FileStoreFileStore on the Web

    http://www.symantec.com/business/support/overview.jsp?pid=55079http://www.symantec.com/business/support/overview.jsp?pid=55079http://www.symantec.com/business/support/overview.jsp?pid=55079http://www.symantec.com/business/support/overview.jsp?pid=55079
  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    30/542

    Introducing Symantec FileStoreUsing the FileStore product documentation

    30

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    31/542

    Creating users based onroles

    This chapter includes the following topics:

    About user roles and privileges

    About the naming requirements for adding new users

    About using the FileStore command-line interface

    Logging in to the FileStore CLI

    About accessing the online man pages

    About creating Master, System Administrator, and Storage Administrator

    users

    Creating Master, System Administrator, and Storage Administrator users

    About the support user

    Configuring the support user account

    Displaying the command history

    About user roles and privilegesYour privileges within Symantec FileStore (FileStore) are based on what user role

    (Master, System Administrator,or Storage Administrator)youhave been assigned.

    The following table provides an overview of the user roles within FileStore.

    2Chapter

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    32/542

    Table 2-1 User roles within FileStore

    DescriptionUser role

    Masters are responsible for adding or deletingusers, displaying users,and managing passwords. Only the Masters can add or delete other

    administrators.

    Master

    System Administrators are responsible for configuring and

    maintaining the file system, NFS sharing, networking, clustering,

    setting the current date/time, and creating reports.

    System

    Administrator

    Storage Administrators are responsible for provisioning storage and

    exporting and reviewing reports.

    Storage

    Administrator

    The Support account is reserved for Technical Support use only, and it cannot be

    created by administrators.

    See Using the support login on page 517.

    About the naming requirements for adding new usersThe following table provides the naming requirements for adding new FileStore

    users.

    Table 2-2 Naming requirements for adding new users

    DescriptionGuideline

    Letter or an underscore (_)

    Must begin with an alphabetic character and the rest of the string

    should be from the following POSIX portable character set:

    ([A-Za-z_][A-Za-z0-9_-.]*[A-Za-z0-9_-.$]).

    Starts with

    Can be up to 31 characters. If user names are greater than 31

    characters, you will receive the error, "Invalid user name."

    Length

    FileStore CLI commands are case-insensitive (for example, the user

    commandis thesameas theUSERcommand). However, user-providedvariables are case-sensitive (for example, the username Master1 is

    not the same as the username MASTER1).

    Case

    Hyphens (-) and underscores (_) are allowed.Can contain

    Creating users based on rolesAbout the naming requirements for adding new users

    32

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    33/542

    Table 2-2 Naming requirements for adding new users (continued)

    DescriptionGuideline

    Valid user names include:

    Name:

    a.b

    a_b

    ______-

    Valid syntax

    See Creating Master, System Administrator, and Storage Administrator users

    on page 42.

    About using the FileStore command-line interfaceYou can enter FileStore commands on the system console or from any host that

    can access FileStore through a session using Secure Socket Shell (SSH) .

    FileStore provides the following features to help you when you enter commands

    on the command line:

    Command-line help by typing a command and then a question mark (?)

    Command-line manual (man) pages by typing man and the nameofthe command

    you are trying to find

    Table 2-3 Conventions used in the FileStore online command-line man pages

    DescriptionSymbol

    Indicates you must choose one of elements on either side of the pipe.| (pipe)

    Indicates that the element inside the brackets is optional.[ ] (brackets)

    Indicates that the element inside the braces is part of a group.{ } (braces)

    Indicates a variable for which you need to supply a value. Variables

    are indicated in italics in the man pages.

    < >

    Logging in to the FileStore CLIWhen you first log in to the FileStore CLI, use the default username/password of

    master/master. After you have logged in successfully, change your password.

    Creating users based on rolesAbout using the FileStore command-line interface

  • 7/31/2019 Symantec FileStore Command-Line Administrator's Guide

    34/542

    Note: Changing the default password is important for system security. If you do

    not change the default password, a warning message appears the next time you

    log in.

    See Creating Master, System Administrator, and Storage Administrator users

    on page 42.

    By default, the initial password for any user is the same as the username. For

    example, if you logged in as user1, your default password would also be user1.

    To use any of the CLI commands, first log in by using the user role you have been

    assigned.Then enter thecorrect mode. These twostepsmust be performedbefore

    you can use any of the commands.

    Note: The End User License Agreement (EULA) is displ


Recommended