Lab Guide May2015
Lab Guide May2015
Copyright
Copyright 2015 EMC Corporation. All Rights Reserved. Published in the USA. EMC believes the
information in this publication is accurate as of its publication date. The information is subject to
change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an applicable
software license. The trademarks, logos, and service marks (collectively "Trademarks") appearing in
this publication are the property of EMC Corporation and other parties. Nothing contained in this
publication should be construed as granting any license or right to use any Trademark without the prior
written permission of the party that owns the Trademark.
EMC, EMC AccessAnywhere Access Logix, AdvantEdge, AlphaStor, AppSync ApplicationXtender,
ArchiveXtender, Atmos, Authentica, Authentic Problems, Automated Resource Manager, AutoStart,
AutoSwap, AVALONidm, Avamar, Bus-Tech, Captiva, Catalog Solution, C-Clip, Celerra, Celerra
Replicator, Centera, CenterStage, CentraStar, EMC CertTracker. CIO Connect, ClaimPack, ClaimsEditor,
Claralert ,cLARiiON, ClientPak, CloudArray, Codebook Correlation Technology, Common Information
Model, Compuset, Compute Anywhere, Configuration Intelligence, Configuresoft, Connectrix,
Constellation Computing, EMC ControlCenter, CopyCross, CopyPoint, CX, DataBridge , Data Protection
Suite. Data Protection Advisor, DBClassify, DD Boost, Dantz, DatabaseXtender, Data Domain, Direct
Matrix Architecture, DiskXtender, DiskXtender 2000, DLS ECO, Document Sciences, Documentum, DR
Anywhere, ECS, elnput, E-Lab, Elastic Cloud Storage, EmailXaminer, EmailXtender , EMC Centera, EMC
ControlCenter, EMC LifeLine, EMCTV, Enginuity, EPFM. eRoom, Event Explorer, FAST, FarPoint, FirstPass,
FLARE, FormWare, Geosynchrony, Global File Virtualization, Graphic Visualization, Greenplum,
HighRoad, HomeBase, Illuminator , InfoArchive, InfoMover, Infoscape, Infra, InputAccel, InputAccel
Express, Invista, Ionix, ISIS,Kazeon, EMC LifeLine, Mainframe Appliance for Storage, Mainframe Data
Library, Max Retriever, MCx, MediaStor , Metro, MetroPoint, MirrorView, Multi-Band
Deduplication,Navisphere, Netstorage, NetWorker, nLayers, EMC OnCourse, OnAlert, OpenScale,
Petrocloud, PixTools, Powerlink, PowerPath, PowerSnap, ProSphere, ProtectEverywhere, ProtectPoint,
EMC Proven, EMC Proven Professional, QuickScan, RAPIDPath, EMC RecoverPoint, Rainfinity, RepliCare,
RepliStor, ResourcePak, Retrospect, RSA, the RSA logo, SafeLine, SAN Advisor, SAN Copy, SAN
Manager, ScaleIO Smarts, EMC Snap, SnapImage, SnapSure, SnapView, SourceOne, SRDF, EMC
Storage Administrator, StorageScope, SupportMate, SymmAPI, SymmEnabler, Symmetrix, Symmetrix
DMX, Symmetrix VMAX, TimeFinder, TwinStrata, UltraFlex, UltraPoint, UltraScale, Unisphere, Universal
Data Consistency, Vblock, Velocity, Viewlets, ViPR, Virtual Matrix, Virtual Matrix Architecture, Virtual
Provisioning, Virtualize Everything, Compromise Nothing, Virtuent, VMAX, VMAXe, VNX, VNXe, Voyence,
VPLEX, VSAM-Assist, VSAM I/O PLUS, VSET, VSPEX, Watch4net, WebXtender, xPression, xPresso, Xtrem,
XtremCache, XtremSF, XtremSW, XtremIO, YottaYotta, Zero-Friction Enterprise Storage.
Revision Date: May 2015
Revision Number: MR-1CP-ISIAM_1.1
Rev #
File Name
Date
1.0
PPAM_720_Lab Guide
Jan 2015
1.1
PPAM_720_Lab Guide
May 2015
Table of Contents
COPYRIGHT ............................................................................................................................................................ 2
DOCUMENT REVISION HISTORY ............................................................................................................................. 3
TABLE OF CONTENTS .............................................................................................................................................. 4
ABOUT THIS LAB MANUAL ..................................................................................................................................... 9
DOCUMENT CONVENTIONS ....................................................................................................................................9
ORGANIZATION ....................................................................................................................................................9
BEFORE YOU BEGIN .............................................................................................................................................. 10
VIRTUAL LAB ENVIRONMENT CONFIGURATION ................................................................................................... 11
DAY 1 ................................................................................................................................................................... 11
LAB CONFIGURATION ..........................................................................................................................................11
LOGGING IN TO LAB ENVIRONMENT .......................................................................................................................13
MODULE 1 ISILON CLUSTER OVERVIEW ............................................................................................................. 18
LAB 1.0: INSTALL FIRST NODE IN CLUSTER ............................................................................................................ 18
TASK 1: CONFIGURE INITIAL NODE .........................................................................................................................19
TASK 2: CONNECT TO CLUSTER VIA WEB ADMINISTRATION INTERFACE .........................................................................27
TASK 3: CONNECT TO CLUSTER VIA CLI ...................................................................................................................29
LAB 1.0: SUMMARY ............................................................................................................................................31
LAB 1.1: JOIN NODES TO CLUSTER ........................................................................................................................ 32
TASK 1: JOIN SECOND NODE USING CONFIGURATION WIZARD....................................................................................32
TASK 2: JOIN THIRD NODE USING WEB ADMINISTRATION INTERFACE ...........................................................................34
LAB 1.1: SUMMARY ............................................................................................................................................37
LAB 1.2: VALIDATE CLUSTER USING CLI ................................................................................................................ 38
TASK 1: USING ISI COMMANDS .............................................................................................................................39
TASK 2: EXAMINING CLUSTER HARDWARE...............................................................................................................43
TASK 3: USING CONFIGURATION CONSOLE ..............................................................................................................45
LAB 1.2: SUMMARY ............................................................................................................................................47
LAB 1.3: MANAGING RBAC ................................................................................................................................... 48
TASK 1: VIEW AND MODIFY ACCOUNTS USING ISI AUTH.............................................................................................48
TASK 2: CREATE ACCOUNT USING ISI AUTH..............................................................................................................51
TASK 3: CREATE ACCOUNT WITH THE WEB ADMINISTRATION INTERFACE ........................................................................54
LAB 1.3: SUMMARY ............................................................................................................................................62
MODULE 2 DATA PROTECTION, LAYOUT, AND ACCESS ...................................................................................... 64
LAB 2.0: DATA PROTECTION AND FILE LAYOUT ................................................................................................... 64
LAB 2.0: SUMMARY ............................................................................................................................................68
LAB 2.1: DATA PROTECTION SETTINGS ................................................................................................................. 69
TASK 1: EXAMINE AND MODIFY DATA PROTECTION SETTINGS .....................................................................................69
Document Conventions
This lab manual is written with a style that gives you both a visual image of what you are doing and written instructions
to be performed in each step.
Organization
This lab manual is divided into three sections:
1. Brief overview of the lab/task section.
2. Detailed steps that correspond to the real-life, hands-on training you received.
3. A wrap-up at the end of each lab highlights what you learned in the lab module.
10
Demo Content
Some labs require demonstration files for performing example reads and writes on the cluster. These files are located
in the /ifs/data directory of the cluster.
Lab Environment
Each student will use a dedicated lab environment, which includes the following:
11
Password
Isilon2!
Isilon2!
Username Windows/AD
Password
Isilon2!
isilon\student
Isilon2!
isilon\student2
Isilon2!
isilon\student3
Isilon2!
Username Linux/LDAP
Password
root
Isilon2
student
Isilon2
student2
Isilon2
student3
Isilon2
alisonw
Isilon2
maryj
Isilon2
bobs
Isilon2
IP Address
WinServer2008
192.168.0.201
Windows Client
192.168.3.100
LinuxServer
192.168.0.202
LinuxClient
192.168.0.212
128.221.252.11-19
192.168.0.11-19
192.168.0.100
192.168.0.221
192.168.0.222
12
4. If you are using your personal computer and the following message appears, click Install, and follow through
with the installation of Citrix Receiver, otherwise skip ahead to step 6.
NOTE: The URL of the Windows download page is http://www.citrix.com/go/receiver.html.
13
6. To open a Remote Desktop Connection to the virtual environment, in Internet Explorer, return to
https://vdc.emc.com, and then click vCD_IsilonSS.
8. In the VM Workstation, youll see the PPAM_720 image that includes 11 virtual machines (VMs), which are all
Powered off, as shown in the screenshot below.
14
b. When the virtual machines are all started, theyll have a green arrow near the name and the Status
column will say Powered on.
15
16
Module 1
Isilon Cluster Overview
17
Tasks:
You need to configure the initial node for an Isilon OneFS cluster.
You will configure the initial node, and then validate access to the
node from the OneFS web administration interface and the
command line interface (CLI). Finally, you will check events,
clearing or quieting the events to achieve a green state for the
cluster.
References:
Module 1, Lessons 1 3
Username
root (for terminal emulation program)
admin (for web administration interface)
isilon\student (Windows client)
int-a
Subnet mask
255.255.255.0
Low IP address
128.221.252.11
High IP address
128.221.252.19
Default gateway
DNS server IP address
DNS search domain
Password
Isilon2!
Isilon2!
Isilon2!
ext-1
255.255.255.0
192.168.0.11
192.168.0.19
192.168.0.1
192.168.0.201
isilon.training.com
18
19
5. Press the SPACEBAR to page through the End User License Agreement (EULA) or page down to go to the
bottom of the EULA.
When prompted to accept the EULA, type yes, and then press ENTER.
6. At the Please change the root password prompt, type Isilon2!, and press ENTER.
When prompted, re-enter the same password, and press ENTER again.
NOTE: Password characters will not show up onscreen as you type them.
20
7. At the Please change the UI admin password prompt, type Isilon2!, press ENTER.
When prompted, re-enter that same password, and press ENTER again.
8. At the Would you like to enable SupportIQ prompt, type yes, press ENTER.
9. To configure SupportIQ, press ENTER after each of the following:
a. Please enter company name: Type Isilon Training.
b. Please enter contact name: Type student.
c. Please enter contact phone: Type 1-800-4IS-ILON.
d. Please enter contact email: Type student@isilon.com.
e. Configure name: Type Cloud9 for the name of the new cluster.
10. To keep the default encoding of UTF-8, at the Configure encoding prompt, press ENTER.
NOTE: If you make a mistake, type the word back to move back a step in the wizard.
21
11. The internal-a (int-a) interface is used for inter-node communication. You need to configure both the netmask
and the IP range for the int-a interface. To configure the netmask for int-a, press ENTER after each entry:
a. Configure interface int-a: Type 1.
b. Configure int-a netmask: Type 255.255.255.0.
12. To configure the int-a IP address range, press ENTER after each of the following:
a. Configure interface int-a: Type 3.
b. Configure int-a IP ranges: Type 1 to select Add an IP range.
c. Low IP address (add): Type 128.221.252.11.
d. High IP address (add): The entry defaults to the Low IP address you just entered. Press BACKSPACE as
necessary to type 128.221.252.19.
e. IP ranges: Press ENTER to accept the IP address range.
f.
22
13. To configure the external interface, press ENTER after each of the following.
a. Configure external subnet: Type 1.
b. Configure interface ext-1: Type 1 to configure the netmask.
c. Configure ext-1 netmask: Type 255.255.255.0.
g. High IP address (add): The IP defaults to the Low IP address. Press BACKSPACE as necessary to type
192.168.0.19.
h. Press ENTER to accept the IP address range.
i.
23
14. At the Configure default gateway prompt, type 192.168.0.1, and then press ENTER.
15. At the Configure SmartConnect settings prompt, press ENTER to skip configuration for this lab.
24
17. At the Configure external subnet prompt, press ENTER to exit external subnet settings.
18. To configure the date and time for the cluster, press ENTER after each of the following:
a. Configure date: Type 1.
b. Pacific Time Zone: Type 5.
c. Configure date: Press ENTER to keep the current date and time.
25
20. Review all of your clusters settings, type yes to commit the changes, and then press ENTER.
This process can take a while and will run until returned to the login prompt.
21. After you are returned to the login prompt, release the mouse from the VMware Workstation tab screen by
pressing CTRL+ALT, and then you can continue to the next task.
26
2. If you get the prompt about the websites security certificate, click Continue to this website.
3. Log in to OneFS on your new Cloud9 Isilon cluster with Username as root and Password as Isilon2!.
27
4. On the DASHBOARD tab, click Cluster Overview, and then click Cluster Status.
Youll see the node you just added to the cluster.
a. In the Status table, review the icon in the Stat column for Cloud9-Node1.
Your node may have a status other than healthy (green) because of the number of installed drives.
Healthy status is not required for the purposes of these lab exercises. You can see a status description
by hovering over the icon in the Stat column. In this example, a yellow circle means Attention.
b. Confirm the IP address is 192.168.0.11.
c. In the Monitoring section, look at the Cluster size pie chart and note the available hard disk space.
Check back here to see the growth of available space as you add additional nodes to your cluster.
28
2. In the PuTTY Configuration dialog box, for Host Name, type 192.168.0.11, and then click Open.
29
4. Type root for login as, press ENTER, then type Isilon2! for Password, and press ENTER.
5. To display information about the clusters status, at the Cloud9 prompt, press ENTER after typing:
isi status
30
6. This is an example of the isi status output from a larger cluster with physical SSD drives:
Summary:
In this lab, you learned how to configure your initial node using the
Configuration Wizard, and how to connect to the node using the
web administration interface and CLI.
31
In this lab, you will grow your cluster by adding nodes from the
serial connection and from the web administration interface.
Tasks:
References:
Module 1, Lessons 1 3
32
2. At the top of the VMware Workstation window, click the Cloud9-Node2 tab.
Click inside the right pane to active the nodes CLI.
3. To join the node to the cluster using the Configuration Wizard, enter the information below, pressing ENTER
after each entry:
a. Wizard: Type 2 to Join an existing cluster.
b. Join cluster: Type 1 to join Cloud9-Node2 to your Cloud9 Isilon cluster.
4. Let the process run until you are returned to the login prompt, and then minimize the VMWare Workstation
window.
33
2. On the DASHBOARD tab, click Cluster Overview, and then click Cluster Status.
Youll see the two nodes that youve added to the cluster so far.
34
4. On the Add Nodes sub-tab, scroll down to the Available Nodes table. This table shows you all the nodes that
you could choose to add to your cluster.
NOTE: For a real-world cluster, the Model column will display the Isilon model, such as S210, X400, NL400, etc.
For the Isilon IQ VMWare node, in the Actions column, click Add node. This node is now added to your cluster.
NOTE: When this third node is added to the Cloud9 cluster, an iq_vmware node pool is automatically created.
Well talk about node pools in the next module.
5. Go back to the DASHBOARD tab, click Cluster Overview, and then click Cluster Status.
Confirm the node was added to the cluster by verifying there are now three nodes listed in the Status table.
NOTE: You might need to wait a minute or two for the new node to show up. Wait until node shows green
before going to the next step.
35
7. On the Summary sub-tab, in the New Events section, click Quiet all events.
36
Summary:
In this lab, you learned how to add nodes to your Cloud9 cluster
using the Configuration Wizard and the web administration
interface. After completing this lab, you are now able to build a
new cluster by adding nodes and using web administration
interfaces Cluster Overview to verify your changes.
37
Tasks:
You need to validate your newly built cluster by using specific isi
commands to better understand the cluster, hardware layout, and
built-in help. In this lab, you will learn how the output relates to
the hardware and understand the InfiniBand network that OneFS
relies on to communicate across the nodes.
References:
Module 1, Lessons 1 3
Username
root (Isilon cluster UI & SSH interface)
admin (Isilon cluster UI & SSH interface)
isilon\student (Windows client)
Password
Isilon2!
Isilon2!
Isilon2!
38
a. If you need to reconnect to your cluster, in the PuTTY Configuration dialog box, for Host Name, type
192.168.0.11, and then click Open.
39
c. In the PuTTY window, type root for login as, press ENTER, then type Isilon2! for Password, and press
ENTER.
2. To view the isi command structure with all of the isi subcommands, at the Cloud9 prompt, press ENTER
after typing:
isi --help
You will have to scroll up and down to view the entire content.
40
3. To view the output one page at a time, at the Cloud9 prompt, press ENTER after typing:
isi --help |more
41
6. To view this nodes hard drives, at the Cloud9 prompt, press ENTER after typing:
isi devices
Scroll up to observe the first four HEALTHY drives in this node. Also, note that the JOURNAL drive in the fifth
drive bay is required because this virtual cluster does not have physical NVRAM to run it.
42
To get the list of subcommands for statistics, at the Cloud9 prompt, press ENTER after typing:
isi statistics --help
Notice in the output that all are SAS drives with no SATA or SSD drives.
43
2. To view the health, size, nodes, and jobs running on your Cloud9 cluster, at the Cloud9 prompt, press ENTER
after typing:
isi status |more
3. To view the hardware in every bay, you can run isi devices for all three nodes in the cluster. At the Cloud9
prompt, press ENTER after typing:
isi_for_array isi devices |more
44
2. To list the documented commands available in the console, at the Cloud9 prompt, press ENTER after typing:
help
Remember, you dont need to type isi before commands in this console.
45
3. To view options for the interface command, at the Cloud9 prompt, press ENTER after typing:
help interface
4. To view the only internal network this cluster has set up (which is int-a), at the Cloud9 prompt, press ENTER
after typing:
interface int-a
5. To output the configuration table containing network information for int-a, at the Cloud9 prompt, press ENTER
after typing:
status
Notice the number of allocated IP address and the number of free IP addresses available for int-a.
46
6. To leave the configuration console, at the Cloud9 prompt, press ENTER after typing:
exit
Summary:
In this lab, you learned how to use the built-in help for isi
commands, which allows you to examine the hardware in your
cluster, and use the configuration console to view InfiniBand
internal networks.
47
Tasks:
In this lab, you will discover the power of OneFS Role-based Access
Control (RBAC). You will learn how to view and modify accounts via
the CLI. You will also create an account from the CLI, and then
create an account from the web administration interface.
References:
Module 1, Lesson 4
48
a. If you need to reconnect to your cluster, in the PuTTY Configuration dialog box, for Host Name, type
192.168.0.11, and then click Open.
c. In the PuTTY window, type root for login as, press ENTER, then type Isilon2! for Password, and press
ENTER.
49
2. To list the OneFS users that are created by default, at the Cloud9 prompt, press ENTER after typing:
isi auth users list
3. To view the five default roles, at the Cloud9 prompt, press ENTER after typing:
isi auth roles list
4. To view the privileges for the SecurityAdmin role, at the Cloud9 prompt, press ENTER after typing:
isi auth roles view SecurityAdmin
7. To view the details of the admin user, at the Cloud9 prompt, press ENTER after typing:
isi auth users view admin
9. To change the password for compadmin, at the Cloud9 prompt, press ENTER after typing:
isi auth users modify compadmin --set-password
10. To enter the new password, at the password prompt, type Isilon2!, and press ENTER.
When prompted, re-enter the password, and press ENTER again.
11. To exit the SSH window, at the Cloud9 prompt, press ENTER after typing:
exit
12. Open a new SSH session by launching PuTTY from the taskbar, type 192.168.0.11 for Host Name, and then click
Open.
EMC Education Services
50
e. To confirm the email address was added for the synciqadmin, press ENTER after typing:
isi auth users view synciqadmin
51
3. To change the home directory of the new synciqadmin user, press ENTER after typing:
isi auth users modify synciqadmin --home-directory /ifs/data/synciqadmin
a. To confirm the home directory for the synciqadmin user was changed, press ENTER after typing:
isi auth users view synciqadmin
b. To add the synciqadmin user to the SyncIQAdmin group, press ENTER after typing:
isi auth groups modify SyncIQAdmin --add-user synciqadmin
c. To view a list of members in the SyncIQAdmin group, press ENTER after typing:
isi auth groups members list SyncIQAdmin
a. Type Isilon2! for the password, press ENTER, re-enter the password, and then press ENTER again.
6. To enable a user, press ENTER after typing:
isi auth users modify synciqadmin --enabled yes
a. To view the details for the synciqadmin user, press ENTER after typing:
isi auth users view synciqadmin
52
9. To add the synciqadmin user to the SyncIQAdmin role, press ENTER after typing:
isi auth roles modify SyncIQAdmin --add-user synciqadmin
10. Add privileges to the new SyncIQAdmin role by using the following commands:
a. Press ENTER after typing:
isi auth roles modify SyncIQAdmin --add-priv ISI_PRIV_LOGIN_CONSOLE
TIP! To make this go quicker, press SHIFT + UP ARROW to repeat the last command typed, then press
the BACKSPACE key to delete the few unnecessary characters, then type the new characters.
c. Press ENTER after typing:
isi auth roles modify SyncIQAdmin --add-priv ISI_PRIV_LOGIN_SSH
53
f.
i.
54
55
ii.
Note the details, and compare the output of the isi auth users view.
56
ii.
Observe the listed items and compare to the output of the isi auth users view
synciqadmin command. This command displayed everything that is now listed in the web
administration interface.
57
c. On the Create a new user page, do the following, and then click Create:
NOTE: Screenshot is after list of field descriptions.
Primary Group: Click the Select group button, then on the Select Primary Group dialog box,
do the following:
i. Search for groups by doing the following, and then click Search:
o
ii. From the search results, select Isilon Users, and click Select.
Account Expiration Date: Use the date selector to choose any date.
58
d. On the Users tab, in the Users table, verify the new account is listed.
59
b. In the Directories pane, select the home folder, and verify that the ballard directory displays in the
right pane.
60
c. In the Members section, verify Ballard is listed, and then log out of the web administration interface.
7. In the PuTTY window, at the Cloud9 prompt, press ENTER after typing:
isi auth roles modify AuditAdmin --add-user Ballard
8. To exit the SSH session, at the Cloud9 prompt, press ENTER after typing:
exit
9. Start a new PuTTY session on 192.168.0.11, and log on as Ballard using the Isilon2! password.
After you have verified that you can log in, exit the SSH session by typing exit.
61
10. In the browser, log in using the Ballard user with the Isilon2! password.
Verify the account is able to access and use the web administration interface.
Summary:
62
Module 2
Data Protection, Layout, and
Access
63
Scenario 2.0:
References:
Module 2, Lessons 1 3
N+1n
N+2n
N+2d:1n
N+3n
N+3d:1n
N+3d:1n1d
N+4n
N+4d:1n
N+1
N+2
N+2:1
N+3
N+3:1
n/a
N+4
N+4:1
N+4:2
2+1 (33%)
3x (67%)
4+2 (33%)
3x (67%)
6+3 (33%)
3+3 (50%)
3x (67%)
8+4 (33%)
3x (67%)
3+1 (25%)
2+2 (50%)
6+2 (25%)
4x (75%)
9+3 (25%)
5+3 (38%)
4x (75%)
12+4 (25%)
4+4 (50%)
4+1 (20%)
3+2 (40%)
8+2 (20%)
4x (75%)
12+3 (20%)
7+3 (30%)
5x (80%)
16+4 (20%)
6+4 (40%)
5+1 (17%)
4+2 (33%)
10+2 (17%)
3+3 (50%)
15+3 (17%)
9+3 (25%)
5x (80%)
16+4 (20%)
8+4 (33%)
6+1 (14%)
5+2 (29%)
12+2 (14%)
4+3 (43%)
16+3 (16%)
11+3 (21%)
5x (80%)
16+4 (20%)
10+4 (29%)
7+1 (13%)
6+2 (25%)
14+2 (13%)
5+3 (38%)
16+3 (16%)
13+3 (19%)
4+4 (50%)
16+4 (20%)
12+4 (25%)
8+1 (11%)
7+2 (22%)
16+2 (11%)
6+3 (33%)
16+3 (16%)
15+3 (17%)
5+4 (44%)
16+4 (20%)
14+4 (22%)
10
9+1 (10%)
8+2 (20%)
16+2 (11%)
7+3 (30%)
16+3 (16%)
15+3 (17%)
6+4 (40%)
16+4 (20%)
16+4 (20%)
11
10+1 (9%)
9+2 (18%)
16+2 (11%)
8+3 (27%)
16+3 (16%)
15+3 (17%)
7+4 (36%)
16+4 (20%)
16+4 (20%)
12
11+1 (8%)
10+2 (17%)
16+2 (11%)
9+3 (25%)
16+3 (16%)
15+3 (17%)
8+4 (33%)
16+4 (20%)
16+4 (20%)
13
12+1 (8%)
11+2 (15%)
16+2 (11%)
10+3 (23%)
16+3 (16%)
15+3 (17%)
9+4 (31%)
16+4 (20%)
16+4 (20%)
14
13+1 (7%)
12+2 (14%)
16+2 (11%)
11+3 (21%)
16+3 (16%)
15+3 (17%)
10+4 (29%)
16+4 (20%)
16+4 (20%)
15
14+1 (7%)
13+2 (13%)
16+2 (11%)
12+3 (20%)
16+3 (16%)
15+3 (17%)
11+4 (27%)
16+4 (20%)
16+4 (20%)
16
15+1 (6%)
14+2 (13%)
16+2 (11%)
13+3 (19%)
16+3 (16%)
15+3 (17%)
12+4 (25%)
16+4 (20%)
16+4 (20%)
17
16+1 (6%)
15+2 (12%)
16+2 (11%)
14+3 (18%)
16+3 (16%)
15+3 (17%)
13+4 (24%)
16+4 (20%)
16+4 (20%)
18
16+1 (6%)
16+2 (11%)
16+2 (11%)
15+3 (17%)
16+3 (16%)
15+3 (17%)
14+4 (22%)
16+4 (20%)
16+4 (20%)
19
16+1 (6%)
16+2 (11%)
16+2 (11%)
16+3 (16%)
16+3 (16%)
15+3 (17%)
15+4 (21%)
16+4 (20%)
16+4 (20%)
20
16+1 (6%)
16+2 (11%)
16+2 (11%)
16+3 (16%)
16+3 (16%)
15+3 (17%)
16+4 (20%)
16+4 (20%)
16+4 (20%)
Number of Nodes
OneFS 7.2.0 +
64
N+4d:2n
Using the Data Protection Chart above, answer the following questions below. Where stated number of Nodes, this
is based on the chart, not your virtual workstation setup.
1. Based on your existing OneFS 7.2.0 cluster for N+2d:1n, what is the stated protection overhead for your 7 node
cluster?
2. What is the percentage of Protection Overhead for the cluster when increased to 9 nodes?
4. Looking at the 18 node cluster, going from N+2n to N+4n, what does the chart tell you about the overhead
growth?
65
7. The order of F = FEC vs D = data stripe units in these tables is not important, but the number of each is. These
exercises assume 128KB stripe units. Based on file size and the Requested Protection, layout the protections
with letters D or F and the following tables:
Requested Protection
File Size (KB)
N+2d:1n
1,536
N1
N2
N3
N4
N5
N6
Disk 1
Disk 2
Disk 3
Requested Protection
File Size (KB)
N1
D
D
N2
D
D
N3
D
D
N4
D
D
N5
D
D
Requested Protection
File Size (KB)
EMC Education Services
N7
N8
Requested Protection
File Size (KB)
N9
N1
N2
N3
N4
N5
N6
N+3d:1n1d
1,920
N6
D
D
N7
D
D
N8
D
N+2n
768
Requested Protection
File Size (KB)
N9
Disk 1
Disk 2
Disk 3
N+3d:1n
1,536
N1
D
D
N2
D
D
N3
D
D
N4
D
D
N5
D
D
Requested Protection
File Size (KB)
66
N7
N8
N9
N+4d:2n
1,536
N6
D
D
N7
N8
N+3n
768
N9
N1
N2
N3
N4
D
D
D
D
D
D
D
D
D
D
D
D
N5
N6
N7
N8
N9
Disk 1
Disk 2
Disk 3
N1
N2
N3
N4
N5
N6
N7
N8
N9
8. Write down the Requested Protection, File size, and Protection overhead percentage based on the each of the
file layouts below:
N1
Data
Data
N2
Data
Data
N3
Data
Data
N4
FEC
Data
N5
FEC
Data
N6
N7
N8
N9
Disk 1
Disk 2
Disk 3
Requested Protection
File Size (KB)
Protection Overhead %
N1
Data
Data
N2
Data
Data
N3
Data
Data
N4
Data
Data
N5
Data
FEC
N6
FEC
FEC
N7
N6
N7
N8
N9
Disk 1
Disk 2
Disk 3
Requested Protection
File Size (KB)
Protection Overhead %
N1
Data
Data
Data
N2
Data
Data
Data
N3
Data
Data
Data
N4
FEC
FEC
FEC
N5
N9
Disk 1
Disk 2
Disk 3
Requested Protection
File Size (KB)
Protection Overhead %
N8
67
N1
N2
N3
N4
N5
N6
Data
Data
Data
Data
FEC
FEC
N7
N8
N9
Disk 1
Disk 2
Disk 3
Requested Protection
File Size (KB)
Protection Overhead %
N1
Data
Data
N2
Data
Data
N3
Data
Data
N4
Data
Data
N5
FEC
FEC
N6
FEC
FEC
N7
N8
N9
Disk 1
Disk 2
Disk 3
Requested Protection
File Size (KB)
Protection Overhead %
N1
N2
N3
N4
N5
N6
N7
N8
N9
Data
Data
Data
Data
Data
FEC
FEC
FEC
FEC
Requested Protection
File Size (KB)
Protection Overhead %
Summary:
In this lab, you learned how to review data protection and file
layout. This exercise should have helped you become more
comfortable with understanding how OneFS handles data, and the
protection of the cluster and files. You are now able to identify
OneFS protection levels and striping types.
68
Disk 1
Disk 2
Disk 3
Tasks:
References:
Module 2, Lessons 1 3
69
2. Log in to OneFS with user as root and password as Isilon2!. If you get the prompt about the websites security
certificate, click Continue to this website.
3. On the FILE SYSTEM tab, click Storage Pools, and then click the SmartPools sub-tab.
For the iq_vmware node pool, note the Requested Protection level.
NOTE: Data protection settings are managed by SmartPools, and can be edited on SmartPools Settings tab.
70
5. On the View Default Policy Details dialog box, click Edit Policy.
71
6. In the Edit Default Policy Details window, do the following, click Save Changes, and then click Close (after you
click Save Changes, the Cancel button changes to Close).
7. On the SmartPools tab, in the Tiers & Node Pools section, notice that for node pool iq_vmware, the Requested
Protection has not changed to +1n because you only changed the file pool policy not the SmartPools policy.
Now in the Actions column, click View/Edit.
72
9. On the SmartPools tab, note the protection level now. How does this compare with what appeared in Step 6
above?
10. Click the Summary tab. For SmartPools, what is the Status and what does the message say?
73
13. Launch PuTTY from the taskbar, type 192.168.0.11 for Host Name, click Open.
Log in as root using the Isilon2! password.
14. To manage your clusters protection policy, use the following sequence of commands:
a. At the Cloud9 prompt, press ENTER after typing:
isi storagepool nodepools list
Note the current ID number and Protection Policy. These will be used in the next step.
b. To change the Protection Policy, at the Cloud9 prompt, press ENTER after typing:
isi storagepool nodepools modify 2 -p +3d:1n1d
c. To view the updates, at the Cloud9 prompt, press ENTER after typing:
isi storagepool nodepools list
74
75
17. On the Storage Pools tab, click Summary, and then in the SmartPools row for iq_vmware, note the change in
protection.
Click View Details.
18. Examine the details of the Status page, and then click Close.
NOTE: You have now gone from being underprotected to over protected.
Leave the browser window open.
19. How does under protection or over protection affect your storage capacity?
76
3. In the Directories pane, select the data folder, and then for this directory, click Properties.
77
5. In the Directories pane, select the data directory, and then click Add Directory.
6. To create a new directory, complete the following, and then click Submit.
7. In the Directories pane, expand the data folder, and select the new Protection_Test folder.
In the right-side pane, for this directory, click Properties.
78
9. Back on the File System Explorer tab, in the Directories pane, select the data directory.
Examine the Policy column, and note the protection settings of the data (or this directory) and the
Protection_Test directory.
Minimize the browser.
79
2. In the navigation pane, right-click This PC, and then click Map network drive.
80
3. In the Map Network Drive dialog, do the following, and then click Finish.
4. When prompted for network credentials, log in as root using password Isilon2!, and then click OK.
81
5. Double-click the data folder, and then double-click the Protection_Test folder you created in the previous task.
You are now inside the empty Protection_Test folder.
Minimize this window for now; in the next steps you will copy a local file into this directory.
82
7. In the Protection_Test folder you opened previously, paste the file you just copied.
8. If PuTTY is not open already, launch PuTTY from the taskbar, type 192.168.0.11 for Host Name, and then click
Open.
If a message appears indicating a certificate or security problem, continue despite the warning.
9. Log in as root using password Isilon2!.
10. At the Cloud9 prompt, press ENTER after typing the lines below.
11. To get information about the data folder, press ENTER after typing:
isi get -d /ifs/data
83
12. To get detailed node data plus the layout of the files and attributes, press ENTER after typing:
isi get -D /ifs/data |more
13. To get additional detailed file attributes, at the Cloud9 prompt, press ENTER after typing:
isi get -DD /ifs/data |more
84
where <path to your file> is the path to the file you just copied-and-pasted to the Protection_Test
folder.
Notice your protection level and file details.
85
86
References:
Module 2, Lesson 4
1. In the PuTTY window, at the Cloud9 prompt, press ENTER after typing:
isi status
87
Summary:
In this lab, you learned how to review cache information using the
three CLI commands. You learned how to view the settings from
isi status, how to view the default SSD settings for storage
pools, and how to view the L3 cache settings for node pools. You
learned where to read the available, free, and total SSD bytes for a
specific node pool.
88
Module 3
Access to the Cluster
89
References:
Module 3, Lessons 1 2
90
5. For the access zones, which protocols would you configure for each one?
7. Based on having a limited number of network ports, would you want to dedicate specific ports to a specific
customer? Explain your reasoning.
Summary:
91
Tasks:
1. Configure SmartConnect.
2. Create required DNS records.
3. Test SmartConnect settings.
4. Configure additional SmartConnect Zone.
5. Create DNS records for NFS Zone.
6. Test new SmartConnect Zone settings.
References:
Module 3, Lesson 3
92
3. On the CLUSTER MANAGEMENT tab, on the Network Configuration tab, in the External Network Settings
section, click subnet0.
93
5. In the Configure Subnet window, for SmartConnect service IP, type 192.168.0.100, and then click Submit.
94
6. Back on the Network Configuration page, in the IP Address Pools section, next to SmartConnect settings, click
Edit
7. On the Configure Pool SmartConnect Settings dialog, do the following and then click Submit.
Zone name: Type Cloud9.isilon.training.com. Zone names are not case sensitive.
95
2. To start the Windows log on, right-click the Win2008 tab, and then click Send Ctrl+Alt+Del.
96
5. In DNS Manager, expand WINSERVER, and then expand Forward Lookup Zones.
97
7. On the New Host dialog box, do the following, and then click Add Host.
8. When the success message displays, click OK. Close the New Host dialog box by clicking Done.
98
99
b. On the Delegated Domain Name screen, for Delegated domain, type cloud9, and then click Next.
c. On the Name Servers screen, click Add, then for the Server fully qualified domain name (FQDN), type
sip.isilon.training.com, and then click OK.
d. Back on the Name Servers page, click Next, and then click Finish to close the wizard.
100
11. In DNS Manager, the new delegation record displays with isilon.training.com selected.
Close the DNS Manager before continuing.
101
102
Summary:
103
References:
Module 3, Lesson 4
1. From the the Remote Desktop window, open a web browser and navigate to https://192.168.0.11:8080.
104
3. On the CLUSTER MANAGEMENT tab, click General Settings, and then click the NTP tab.
4. On the NTP tab, do the following, and then click Submit, then minimize the browser window.
Server: You should see the NTP server IP address that you added in the NTP server field.
105
5. On the CLUSTER MANAGEMENT tab, click General Settings, and then click the Date & Time sub-tab.
6. In the Date & Time section, do the following steps, and then click Submit:
a. Compare the nodes Date and Time to the system time on the Windows client.
Notice that the node time is in 24-hour format.
b. If the node date and time is different from the Windows client, from the Date and time drop-down
lists, configure the date and time to match the Windows client time using 24-hour format.
106
Summary:
In this lab, you learned how to set your NTP services to sync with
your Active Directory server. You are now able to configure the
NTP server.
107
Knowing that Cloud9 customers use a mix of NFS and SMB clients,
you need to configure your cluster to use LDAP following Isilon best
practices. Best practice dictates that you have the cluster join to
LDAP first.
In this lab, you configure the cluster to use LDAP to authenticate
clients using credentials stored on an LDAP server. Isilon best
practice is to always connect LDAP first, before joining the cluster
to an AD domain.
NOTE: During the course of this lab and the next, you will need to
occasionally update the NTP, as you did in the last lab, to keep the
cluster in sync with the domain controller. This is due to a
simulator bug.
Tasks:
References:
Module 3, Lesson 4
108
3. On the ACCESS tab, click Authentication Providers, and then click the LDAP sub-tab.
109
5. In the Add an LDAP Providers section, do the following, and then click Add LDAP Provider.
110
6. On the LDAP tab, in the LDAP Providers table, verify the new LDAP provider is listed and that there is a green
dot in the Status column.
111
NOTE: Type isi auth status --verbose, and then press ENTER. Notice the additional information.
Summary:
112
Tasks:
References:
Module 3, Lesson 4
113
3. On the CLUSTER MANAGEMENT tab, click General Settings, and then click the Date & Time tab.
114
5. On the ACCESS tab, click Authentication Providers, and then click the Active Directory tab.
7. On the Join a Domain page, enter the following, and then click Join.
115
8. Joining the domain may take several minutes. After your node successfully joins the domain, a notification
displays.
9. Staying on the ACCESS tab, click Access Zones to confirm the AD and LDAP providers.
116
3. To verify that you have joined the domain, at the Cloud9 prompt, press ENTER after typing:
isi auth ads view isilon.training.com
In the output, verify that the ADS is reported as online. Additional information that verifies the cluster is
properly joined to the domain includes the display of the domain controller.
117
3. On the Add an SMB Share page, to create the first share, enter the following, and then click Create.
b. You should receive a notification that Your share has been created.
118
4. After you get the message saying Your share has been created, click Add a Share to add another share.
5. On the Add an SMB Share page, enter the following, and then click Create.
119
a. In the Users and Groups section, for the ISILON\student item, click Edit.
Check Full Control to give student the ability to create and delete files and folders, and click Create.
Next, for the Everyone item, click Delete, and then click Save at the bottom of the table.
6. On the FILE SYSTEM tab, click File System Explorer, and then in the Directories pane, click the data directory.
120
a. In the details pane, in the studentshare1 row, click Properties to access Permission Settings.
After your review, click Cancel to return to the web administration interface.
7. Log out of the OneFS web administration interface by clicking Log out, and then close the browser window.
121
2. In the navigation pane, right-click This PC, and then click Map network drive.
122
3. In the Map Network Drive dialog box, do the following, and then click Finish.
123
124
13. To change the directory, at the Cloud9 prompt, press ENTER after typing:
cd /ifs/data/studentshare1
14. To display permissions, ownership, etc., for the test_document1.txt file, at the Cloud9 prompt, press ENTER
after typing:
ls -l test_document1.txt
The plus sign (+) that displays after the UNIX permissions denotes that the file also has ACL permissions.
15. To display the ACLs associated with the file, at the Cloud9 prompt, press ENTER after typing:
ls -le test_document1.txt
This command provides cluster administrators with a method of viewing ACLs from the cluster CLI. There are
also commands available to modify these ACLs.
16. Repeat the last three steps for your other share, using /ifs/data/studentshare2 for the path and
test_document2.txt for the file name.
125
17. From Windows Explorer, click each document and compare the permissions on test_document1 and
test_document2.
On the Security tab for the file created on studentshare2, notice that only the creator of the file is listed. This is
because you did not select and apply the default ACL when creating studentshare2. In environments joined to
an AD domain, it is recommended that you do not apply the default ACL when creating shares.
Summary:
In this lab, you learned how to join the cluster to and AD domain,
check the domain join status, create shares, and set permissions.
You are now able to configure OneFS authentication for AD, and
you are also familiar with creating and testing shares.
126
Tasks:
References:
Module 3, Lesson 3
127
f.
On the About This Cluster page, for SmartConnect Advanced, verify that Status is Evaluation.
128
6. On the Create new pool for subnet dialog box, enter the following, and then click Next:
129
7. On the Configure Pool SmartConnect Settings page, do the following, and then click Next.
130
8. On the Configure Pool Interface Members page, in the Available interfaces list, select ext-1, Node 1, and then
click the right arrow to move it to the Interfaces in current pool list.
Repeat for ext-1, Node 2 and ext-1, Node 3, and then click Submit.
You may select multiple entries in the list by pressing CTRL while selecting multiple items individually.
131
9. In the IP Address Pools section, verify that both the default pool, pool0, and your new IP address pool,
NFSZone.
132
2. To start the Windows log on, from the VMware Workstation menu bar, click VM, and then click Send
Ctrl+Alt+Del.
5. In DNS Manager, expand WINSERVER, and then expand Forward Lookup Zones.
133
6. In the navigation pane, select isilon.training.com, then in an empty area in the details pane, right-click and then
select New Delegation.
7. The New Delegation Wizard starts. On the welcome page, click Next.
8. For the Delegated domain, type nfs, click Next, and then click Add.
9. For the Server fully qualified domain name (FQDN), type sip.isilon.training.com, and then click OK.
10. On the Name Servers page, click Next, and then click Finish.
In the Isilon.training.com directory, verify you see both the cloud9 and nfs forward lookup zones.
11. Leave the DNS Manager open.
134
135
5. To run the command again, press the UP ARROW, and then press ENTER.
ping nfs
Summary:
136
References:
Module 3, Lesson 3
1. From the Windows Workstation Open a web browser and navigate to https://192.168.0.11:8080.
Log in to OneFS with user as root and password as Isilon2!.
If you get a prompt about the websites security certificate, click Continue to this website.
137
2. On the FILE SYSTEM tab, click File System Explorer, and then click Add Directory.
3. In the New Directory Properties dialog box, do the following, and then click Submit.
Permissions: In the Write column, select Group and Other. All Permissions should now be selected.
138
7. In the upper right corner of the Access Zones section, click Create an access zone.
8. On the Create an Access Zone screen, do the following, and then click Create Access Zone.
Click Add an authentication provider, enter the following, and then click Create Access Zone.
o
9. Verify that a success message displays, and that the Provider Status for the new zone is green.
139
10. On the CLUSTER MANAGEMENT tab, click Network Configuration, and then click subnet0.
In the SmartConnect Basic section, do the following, and then click Next.
o
140
15. On the Configure Pool Interface Members page, in the Available interfaces list, select ext-1, Node 1, and then
click the right arrow to move it to the Interfaces in current pool list.
Repeat for ext-1, Node 2 and ext-1, Node 3, and then click Submit.
You may select multiple entries in the list by pressing CTRL while selecting multiple items individually.
16. Click Submit, and verify that your new IP address pool, SMBZone is in the IP Address Pools.
17. In the VMWare Workstation, on the WinServer2008 tab, go back to the DNS Manager.
18. If necessary, expand WINSERVER, and then expand Forward Lookup Zones.
19. In the navigation pane, click isilon.training.com, then in the details pane, right-click in an empty area, and then
select New Delegation.
141
20. The New Delegation Wizard starts. On the welcome screen, click Next.
21. For the Delegated domain, type smb, click Next, and then click Add.
22. For the Server fully qualified domain name (FQDN), type sip.isilon.training.com, and then click OK.
23. On the Name Servers page, click Next, and then click Finish.
In the Isilon.training.com directory, verify you see Cloud9, nfs, and smb forward lookup zones.
24. In the Windows client, return to the OneFS web administration interface.
25. On the ACCESS tab, click Access Zones. The Provider Status for the Zone-SMB zone should be green for Active
Directory.
29. To finish creating the Access Zone, complete these steps, and then click Create Access Zone.
30. Verify that a success message displays, and that the Provider Status for the new zone is green.
142
31. On the CLUSTER MANAGEMENT tab, click Network Configuration, and then click subnet0.
35. Refresh the browser window and verify that the Access zone now shows Zone-NFS.
143
In this lab, you learned about connection types and how to create,
assign, and manage access zones. Having completed this lab you
are now able to create OneFS access zones.
144
Module 4
User Authentication and File Access
145
Tasks:
As the Cloud9 administrator, use the OneFS CLI to identify UID, GID
UNIX SIDs and On Disk identity on the cluster in regards to user
accounts.
References:
Module 4, Lesson 1
146
3. In the Access Management Settings section, verify that On-Disk Identity is set to native, which is usually best
for a network with both UNIX and Windows systems.
4. Minimize the browser window.
5. If not already open, launch PuTTY from the taskbar, type 192.168.0.11 for Host Name, and then click Open.
7. To view all of the clusters users, at the Cloud9 prompt, press ENTER after typing:
isi auth users list
147
c. What account is this On Disk identity for and what is the GID (if shown)?
f.
148
Notice that the On Disk identity is the UID. Student10 is an LDAP user. An object that has an explicit UNIX
identity defined in an external source such as LDAP has that identity set as the On Disk identity.
The On Disk identity setting is the UID. We know the student exists in both Active Directory and LDAP because
the real SID as well as a real UID.
4. At the Cloud9 prompt, press ENTER after typing:
isi auth mapping token administrator@isilon
The On Disk identity is the SID. Administrator only exists in Active Directory. If an object lacks a UID or GID,
then its SID is set as the On Disk identity.
Summary:
In this lab, you learned about UID, GID, UNIX SIDs and On-Disk
Identity mapping. You should now be comfortable looking up users,
identifying them as OneFS users, LDAP, or Active Directory.
149
Tasks:
References:
Module 4, Lesson 2
This command will display configured authentication providers and their status. Verify that the Status of the
LDAP and Active Directory providers are online.
2. To display a list of users by provider, at the Cloud9 prompt, press ENTER after typing:
isi auth users list --domain Isilon.training.com
In this example, you are viewing Active Directory users from the Isilon.training.com domain.
3. To query the LDAP server and output the various attributes for users, at the Cloud9 prompt, press ENTER after
typing (note there are no spaces after the commas):
ldapsearch -x -h linuxserver.isilon.training.com -b
dc=Isilon,dc=training,dc=com
150
2. Open the new PuTTY session to 192.168.0.212 (the IP address of the LinuxClient), and log in as root using the
Isilon2 password.
3. To create a mount point for an NFS export, press ENTER after typing:
mkdir /mnt/ifs
4. To mount the default ifs export to the mount point, press ENTER after typing:
mount 192.168.0.11:/ifs /mnt/ifs
7. To change the permissions on the linux file, press ENTER after typing:
chmod 777 linux
Notice the synthetic ACL. A synthetic ACL approximates the mode bits of a UNIX file for an SMB client.
151
11. In the Windows client, click Start, right-click This PC, and then click Map network drive.
12. For Folder, type \\192.168.0.12\ifs, and then click Finish. This will map a network drive to the default ifs share.
You might already have this mapped from earlier labs.
152
13. Right-click in an open area within the mapped network drives details pane, click New, and then click Text
Document.
14. Type windows and press ENTER to name the new document. Leave Windows Explorer open.
15. Return to the PuTTY session on the Isilon cluster.
16. Press ENTER after typing:
ls -le /ifs/windows.txt
Notice the + sign. This indicates an Advanced ACL. An Advanced ACL is a real (as opposed to synthetic) ACL.
17. Press ENTER after typing:
ls -len /ifs/windows.txt
153
chmod +a parses a new ACL entry from the next argument on the command line and inserts it into the
canonical location in the ACL.
The +a mode strives to maintain the following correct canonical form for the ACL: local deny, local
allow, inherited deny, inherited allow.
154
8. To observe the owner of the linux file and the permissions, press ENTER after typing:
ls -le /ifs/linux
d. In the Group or user names section, make sure that Everyone is selected.
e. In the Permissions for Everyone section, for Full control, select Allow.
f.
10. Return to the PuTTY session on the Isilon cluster, press ENTER after typing:
ls -le /ifs/linux
155
13. If your PuTTY session is open to your LinuxClient, press ENTER after typing:
chmod 755 windows.txt
If you had to log in to your LinuxClient, then press ENTER after typing:
chmod 755 /ifs/windows.txt
14. Return to the PuTTY session on the Isilon cluster, and press ENTER after typing:
ls -l /ifs/windows.txt
The -b option will remove the ACL and replace it with the specified UNIX permissions.
3. Press ENTER after typing:
ls -le /ifs/windows.txt
The isi_run command is used to impersonate a user so you can test permissions.
5. Press ENTER after typing:
whoami
156
Summary:
157
Tasks:
As the senior IT Admin for Cloud9 you will use the web
administration interface and CLI to review the Isilon cluster ACL
policy settings.
References:
Module 4, Lesson 2
158
4. Review the default Permission Policies settings, and then minimize the browser window.
5. Return to the PuTTY session on the Isilon cluster, press ENTER after typing:
sysctl -d efs.bam.acl_policies
The sysctl utility retrieves the kernel state and allows processes with appropriate privileges to set
the kernel state.
Task 2A:
1. Return to the web administration interface, and on the PROTOCOLS tab, click ACLs.
2. In the Permission Policies section, notice that the setting for ACL creation over SMB is Allow the creation of
ACLs over SMB.
3. Go back to Windows Explorer and select the /ifs mapped network drive.
159
4. Right-click in an open area within the mapped network drives details pane, click New, and then select Text
Document.
160
18. Click the Security tab. Make sure that Domain Users is selected in the Group or usernames field.
View the permissions for student, and notice that Allow Full control is still selected.
Click OK.
NOTE: When you tried to modify the ACL, it silently failed.
Task 2B:
1. Return to the web administration interface. Do the following, and then click Submit.
ACL creation over SMB: Select Allow the creation of ACLs over SMB.
chmod on files with existing ACLs: Select Merge the new permissions with the existing ACL.
2. Go back to the PuTTY session on the Isilon cluster, press ENTER after typing:
ls -le /ifs/SMB.txt
161
7. Go back to the PuTTY session on the Isilon cluster, and press ENTER after typing:
chmod 774 /ifs/SMB.txt
11. To name the new document, type test and press ENTER.
12. Right-click the test file, and click Properties.
13. Click the Security tab, and click Edit.
14. Click Add.
15. In the Enter the object names to select field, type student, and click OK. You might have to use the isilon
domain account to add this account.
16. Click OK, and then click OK again.
162
17. Go back to the PuTTY session on the Isilon cluster, press ENTER after typing:
ls -le /ifs/test.txt
Task 2C:
1. Go back to the web administration interface. Next to chmod on files with existing ACLs, select Remove the
existing ACL and create an ACL equivalent to the UNIX permissions, for all users/groups referenced in old
ACL.
Scroll down and click Submit.
2. Go back to Windows Explorer and select the /ifs mapped network drive, right-click the test file, and then click
Properties.
3. Click the Security tab, and click Edit.
4. Click Add.
5. For Enter the object names to select, type student, and click OK. Use AD credentials to add account.
6. Click OK, and then click OK again.
7. Go back to the PuTTY session on the Isilon cluster, and press ENTER after typing:
ls -le /ifs/test.txt
163
Notice that an ACL equivalent to the UNIX permissions has been set, for all users/groups referenced in the old
ACL.
An advanced ACL still remains, and isilon\student still exists in the ACL.
10. Return to the web administration interface.
Next to chmod on files with existing ACLs, select Deny permission to modify the ACL.
Scroll down and click Submit.
11. Go back to the PuTTY session on the Isilon cluster, and then press ENTER after typing:
chmod 777 /ifs/test.txt
Note the permission denied response. This is a result of the ACL policy setting in the previous step.
12. Return to the web administration interface.
Next to chmod on files with existing ACLs, select Ignore operation if file has an existing ACL.
Scroll down and click Submit.
13. Go back to the PuTTY session on the Isilon cluster, and then press ENTER after typing:
ls -le /ifs/test.txt
164
Task 2D:
1. Go back to the web administration interface. Next to chmod on files with existing ACLs, select Merge the new
permissions with the existing ACL. Scroll down and click Submit.
2. Notice that the setting for ACLs created on directories by UNIX chmod is Do not make them inheritable.
3. Go back to Windows Explorer and select the /ifs mapped network drive, right-click in an open area within the
mapped network drives details pane, click New, and then select Folder.
4. Type sales, and press ENTER to name the new folder.
5. To view the directory permissions, return to the PuTTY session on the Isilon cluster, and then press ENTER after
typing:
ls -led /ifs/sales
12. Go back to the web administration interface. Next to ACLs created on directories by UNIX chmod, select Do
not make them inheritable. Scroll down, and click Submit.
13. Notice that the setting for chown/chgrp on files with existing ACLs is Modify the owner and/or group
permissions.
165
14. Return to the PuTTY session on the Isilon cluster, and then press ENTER after typing:
ls -le /ifs/test.txt
Task 2E:
1. Return to the web administration interface. Next to Environment, click Configure permission policies
manually.
2. Next to chown/chgrp on files with existing ACLs, select Ignore operation if file has an existing ACL. Scroll
down, and click Submit.
3. Go back to the PuTTY session on the Isilon cluster, and then press ENTER after typing:
chown root:wheel /ifs/test.txt
166
Task 2F:
1. Go back to the web administration interface. Next to chown/chgrp on files with existing ACLs, select Modify
the owner and/or group permissions. Scroll down, and click Submit.
2. Notice that the setting for Access checks (chmod, chown), select Allow only file owners to change the mode or
owner of the file (UNIX model). Scroll down, and click Submit.
3. In Windows Explorer, right-click the /ifs share, click New, and select Text Document.
4. Enter test2 and press ENTER to name the file test2.
5. Right-click test2, and click Properties.
6. Click the Security tab, and click Edit.
7. Click Add.
8. In the Enter the object names to select field, type student, and click OK. AD Credentials will be needed to add
account.
9. Click OK.
10. In the Group or user names field, make sure that student is selected, and click Advanced.
11. In the Permission entries field, select student, and click Edit.
12. For Basic permission field, click Show advanced permissions.
13. Click the Take ownership box, and then click OK.
14. Click OK, and then click OK.
15. Close Windows Explorer.
16. Return to the PuTTY session on the Isilon cluster, and then press ENTER after typing:
isi_run -l student@isilon
Observe the response. The operation is not permitted because student is not the owner of the file. Only
owners are able to chown.
18. Go back to the web administration interface. Next to Environment, click Configure permission policies
manually.
167
19. Next to Access checks (chmod, chown), select Allow the file owner and users with WRITE_DAC and
WRITE_OWNER permissions to change the mode or owner of the file (Windows model). Scroll down, and click
Submit.
20. Return to the PuTTY session on the Isilon cluster, and then press ENTER after typing:
chown -s student@isilon /ifs/test2.txt
Note the owner. Because student had the right to take ownership, they were able to change the owner to
student.
22. Press ENTER after typing:
exit
Summary:
In this lab, you reviewed the ACL policy settings and their effect on
permissions if they are changed.
168
Tasks:
References:
Module 4, Lesson 3
169
In the Directory ACLs section, note that Apply Windows Default ACLs is selected.
4.
For Home Directory Provisioning, select Allow Variable Expansion. This option allows path variables to be used
in the share directory path.
5.
Select Auto-Create Directories. This option allows directories to be automatically created when users access
the share for the first time.
6.
In the Users and Groups section, for the Everyone account, click Edit.
a.
Select Full Control to give everyone the ability to create and delete files and folders. These are the
share permissions.
b.
Click Save.
7.
Click Create to create the share, and observe the message verifying Your share has been created.
8.
Now create a second directory at /ifs/data/Share2 and share it from this page by repeating steps 1-7.
However, in step 2, select Do not change existing permissions for the Directory ACLs this time.
9.
On the File System Management tab, click File System Explorer, and then in the navigation pane, select the
data directory.
10. In the details pane, select Share2, and then in the Actions column for that row, click Properties.
11. In the UNIX Permissions section, select all of the Permissions boxes. These are file permissions.
12. Click Submit.
170
Type y to disconnect the listed open connections, and then type y again to continue.
3. In the Remote Desktop window, launch Windows Explorer from the taskbar.
171
4. In the navigation pane, right-click This PC, and then click Map network drive.
5. In the Map Network Drive dialog, do the following, and then click Finish.
6. If a Windows Security box opens, log in as Isilon\student with the Isilon2! password. Notice, this time, you are
using the Active Directory student account.
172
In the upper right corner, click the X icon to close the document.
173
19. At the prompt, type pwd. This UNIX/Linux/FreeBSD command shows your present position in the file system. If
you just logged on you will be at the /root level.
20. To change the directory, press ENTER after typing:
cd /ifs/data/Share1
A detailed list of permissions, ownership, etc., of the files in this directory displays. Only one file,
test_document1.txt, displays.
Notice the PLUS SIGN (+) that displays after the UNIX permissions. This denotes that the file also has ACL
permissions assigned.
22. To list the ACLs that are associated with the file, press ENTER after typing:
ls -le test_document1.txt
This command provides cluster administrators with a method of viewing ACLs from the cluster CLI. There are
also commands available to modify these ACLs.
23. Repeat the previous steps to access test_document2, but this time use the path /ifs/data/Share2 instead.
24. To close the PuTTY window, type exit.
Summary:
In this lab, you created SMB shares and set the access permissions.
After completing this lab you are now able to configure OneFS SMB
shares.
174
Set up Home Directory Share for the Windows users of Graphics-RUs, and configure the cluster to automatically create home
directories for users accessing a home share for the first time.
References:
Module 4, Lesson 3
1. In the web administration interface, click the PROTOCOLS tab, select Windows Sharing (SMB), and then click
Add a Share.
2. On the Add an SMB Share page:
a. Share Name: Type home.
b. Description: Type home.
c. Directory to be shared: Type /ifs/home/%D/%U.
175
iv. Click Save, and select the Everyone account check box.
v. From the "Select an Action" dropdown, Click Delete to remove the Everyone account.
8. Click Create to create the share, and observe the message verifying Your share has been created.
9. In the home directory row, click View details to make sure everything is configured correctly. Edit any settings
that are not correct.
10. To clear any existing SMB sessions, return to the Command Prompt window, and press ENTER after typing:
net use * /d
11. In the Remote Desktop window, launch Windows Explorer from the taskbar.
12. In the navigation pane, right-click This PC, and then click Map network drive.
176
13. In the Map Network Drive dialog, do the following, and then click Finish.
11. If a Windows Security box opens, log in as student with the Isilon2! password.
12. Close Windows Explorer, and then reopen it from the taskbar.
13. To create a directory in the new share, select the mapped drive in the navigation pane, and then right-click in
an open area in the details pane:
a. Click New.
b. Select Folder.
c. Type Test_Folder as the name of the directory.
d. Press ENTER.
14. Right-click Test_Folder, select Properties, click Security tab.
After viewing the permissions, click Cancel.
15. Close Windows Explorer. Disconnect the mapped network drive by returning to the Command Prompt window
and running the command below.
net use * /d
177
16. To connect to the \\cloud9\home share as a different user, press ENTER after typing:
net use p: \\cloud9\home /user:isilon\administrator
One of the directories returned by this command is named ISILON because you used %D in the path for
the home share
c. To change the directory again, press ENTER after typing:
cd ISILON
There should be two directories, one for each account that you used to connect to the share.
The %U used in the share path filled in the names of these directories with the account name of the
connected user when they connected to the home share the first time.
e. To display the contents of /ifs/home/ISILON/student directory, press ENTER after typing:
ls -al student
f.
178
179
Tasks:
1. Create a directory.
2. Create an export.
3. Mount an export.
References:
Module 4, Lesson 4
o
EMC Education Services
Click Select. The directory that you clicked displays in the Directory Paths section, in the Path 1 box.
8. In the Permissions section, click the Enable mount access to subdirectories check box.
9. In the Map Root User section, do the following:
In the field below the drop-down list, verify Map root users to nobody is displayed. This setting will
squash root to nobody.
If you prefer not to squash root to nobody, select Use custom from the drop-down list and change
permissions on the directory in File System Explorer to better fit the scenario.
10. For Map Non Root User, Map Failure User, and Security Type(s), leave as Use default.
11. Leave the Advanced Export Settings as the default.
12. Click Save.
181
The last line of the output should be the full path of the directory that you just mounted (including the server
address).
7. To view the contents of the mount, press ENTER after typing:
ls -lrt nfsmount
9. To confirm that the test file was created and to review the permissions that are associated with the file, press
ENTER after typing:
ls -lrt nfsmount/testfile
NOTE: The nfsnobody account is the owner, but the group is root for the file and has read and write
permissions.
10. Switch to the remote desktop window for the Windows client that has your clusters web administration
interface open.
EMC Education Services
182
183
This should now list the new directory and test file.
Summary:
In this lab, you created, configured, and tested NFS Exports. After
completing this lab you are now able to configure the NFS Exports
on OneFS.
184
Tasks:
References:
Module 4, Lesson 5
185
186
11. In the Home directory, click Edit, change default directory to /ifs/home/studentftp. Click save when done.
12. In the Enable Account section, Click Edit, check the box to Enable the Account, and then click Save.
13. In the web administration interface, on the FILE SYSTEM tab, and then click File System Explorer.
14. In the navigation pane, click the home directory.
15. In the studentftp row, click Properties.
16. In the UNIX permissions section, select Isilon Users for the Group. For User, select all three permissions check
boxes. For Group and Other, clear all check boxes. This prevents other FTP users from accessing or modifying
studentftps data. Leave all other settings at the default values, and then click Submit.
Summary:
In this lab, you learned how to configure and enable HTTP and FTP.
You then tested both connections to make sure they worked. After
completing this lab you should be comfortable configuring,
enabling and testing HTTP and FTP.
187
188
Module 5
Storage Administration
189
Tasks:
As senior IT Admin for Cloud9, you will need to use SmartPools and
the policies that work with it in setting up your customers with
access to the cluster. Using what was taught in the class, validate
the SmartPools Settings and Default File Pool Policies. Once you
have validated these areas, build a new File Pool Policy to meet the
needs of Live-Stream, your multimedia customer.
References:
Module 5, Lesson 1
Click the File Pool Policies sub-tab. No File Pool Policies are displayed. Why?
190
4. Click the SmartPools Settings sub-tab to open the Edit SmartPools Settings page.
5. Where can you set protection levels for cluster data?
191
9. In the File Pool Policies section, click Create a File Pool Policy.
NOTE: If you get a message that SmartPools is not activated either refresh the web page or navigate to the
main dashboard, then back to the storage pools page.
10. On the Create a File Pool Policy page, configure the following settings:
11. In the Select Files to Manage section, select Path for the IF Condition, select matches for the next field, and
then in the last field, type /ifs/data/student*.
12. Click Add an AND condition, select File Type, select does not match for the next field, and then select
Directory for the last field.
13. Leave the default Storage Settings and I/O Optimization Settings unchanged.
14. Click Create Policy and a success message displays.
15. On the CLUSTER MANAGEMENT tab, click Job Operations, and then click the Job Types sub-tab.
16. Scroll down Job Types and locate the SmartPools job, click More, and then click Start Job.
17. On the Start a Job page, click Start Job.
Task 3: Create new Node Pools & Disk Pools Instructor Demo if time permits.
In this task, you will observe the instructor as they take a six node cluster and create two node pools using the
NodePools720 vApp.
1. If not already logged in, log into the ESDEV vCloud Director.
2. Add vApp NodePools720 to your My Cloud, and then start it.
3. In the Remote Desktop window, on the Windows client, open a browser window and log onto the web
administration interface as root using the Isilon2! password.
4. In the upper-right corner of the window, hover over Help, and select About This Cluster.
5. Click Activate license.
6. Type the SmartPools license number for the License key; accept the EULA, and then click Submit.
7. Confirm the SmarPools license installed in Evaluation mode.
192
NOTE: Point out that iq_vmware shows up as a No under manual and iq_2 shows up as a yes.
15. Go back to the web administration interface and then refresh the browser so both node pools show up on the
SmartPools.
16. Click Create a Tier.
17. For the Tier Name, type HR-Finance.
18. Select iq_2, and then click Add.
19. Click Create Tier.
20. Verify HR-Fianace tier shows up in the Tiers & NodePools list.
NOTE: iq_2 node pool will show up under the HR-Finance tier.
Summary:
193
Tasks:
References:
Module 5, Lesson 2
194
5. At the end of the EULA, type yes, and a success message displays.
6. Return to the web administration interface, on the FILE SYSTEM tab, click SmartQuotas and review the Quotas
& Usage tab.
7. Click the Settings sub-tab and verify that the Scheduled Reporting option is ON.
8. In the Report Frequency section, click Change schedule.
9. In the Report Frequency section, select Daily, and in the Generate report every box, type 1, and verify Day(s) is
selected.
10. Select the Generate multiple reports per specified day option.
11. In the Generate report every box, type 3, and then select Minutes.
12. Leave the default time settings. These are the start and stop times for the scheduling of reports.
13. Click Select.
14. In Scheduled Report Archiving and Manual Report Archiving sections, leave the default settings.
15. Leave the Email Mapping setting empty for this lab.
16. Click Advisory Limit Notification Rules, and then complete the following steps:
a. Select the Notify Owner box.
b. Select the Create Cluster Event box.
c. Click Event: While Advisory Limit Remains Exceeded.
d. Select the Notify Owner box.
e. Select the Create Cluster Event box.
f.
195
j.
j.
196
11. To add a quota to the new directory, switch back to the web administration interface. On the FILE SYSTEM tab,
click SmartQuotas, and then click Create a storage quota.
12. From the Quota Type list, select Directory Quota.
13. In the Directory Path field, type /ifs/data/studentquota or use Browse to navigate to the directory.
14. In the Usage Accounting section, leave this area unselected.
15. In the Usage Limits section, select Specify Usage Limits.
16. Select Set a hard limit, and in the Hard Limit Value box, type 300, and verify MB displays for units.
197
17. For Show available Space as, verify the default selection Size of hard threshold.
18. In the Limit Notifications section, leave Use Default Notification Rules selected.
19. Click Create Quota. A Quotas & Usage page displays a success message. If you require a custom notification for
this quota, you may change the configuration in the Quotas & Usage table.
20. In the Quotas & Usage table, click View details for the directory and review all of you settings.
21. To test the quota, in the Remote Desktop window, from the Windows client desktop, click Start, right-click This
PC, and then click Map network drive.
22. In the Folder field, type \\cloud9\studentquota, and then click Finish.
23. In Windows Explorer, right-click the newly mapped drive, and then click Properties. Note that the capacity is
300 MB.
24. Close the Properties page.
25. Right-click the mapped drive and then click Disconnect. If you see a warning dialog that reports that you have
files open on the share you are about to disconnect, click Yes.
198
199
Summary:
200
Tasks:
References:
Module 5, Lesson 3
201
9. On the SnapshotIQ page, click each of the 4 sub-tabs to review SnapshotIQ capabilities:
Summary
Snapshots
Snapshot Schedules
Settings
Snapshot Frequency: Select Daily, and then configure the following settings:
o Generate snapshot every: Type 1, and leave Day(s) selected.
o Generate multiple snapshots per specified day: Select this option.
Leave default settings for the rest of the time and date information.
NOTE: When creating a snapshot policy, keep in mind the length of time that you want to set for expiration
of the snapshots. If you are taking a snapshot every two minutes as you do in our lab, you may not want to
keep each snapshot more than one hour. If you use a setting that takes a snapshot every few days, then
you may want to set the expiration time so that you have at least one saved snapshot when the next
snapshot is taken.
If you manually delete the policy, the snapshots are not deleted because a service running in the
background monitors the snapshots and does not allow them to be deleted or removed until the expiration
time that you set in the policy.
13. After the Snapshot Schedule is created, in the Snapshot Schedules table, click View details to review the
settings for your new schedule.
14. Leave the web administration interface open.
202
b. To list all snapshots that are available, press ENTER after typing:
ls -l
203
7. To review the snapshots from a Windows clients SMB connection, complete the following steps using root:
a. Click Start, and then right-click This PC.
b. Select Map Network Drive.
c. In the Map Network Drive dialog box, in the Drive box, leave the default drive letter.
d. In the Folder box, type \\Cloud9\ifs.
e. Click Finish.
8. In Windows Explorer, in the navigation pane, select the mapped drive, and double-click the .snapshot directory.
You should see a complete view of all of the snapshots that have taken on the cluster. Review the content of
these snapshots.
9. For an alternate method of restoring a snapshot, complete the following steps:
a. In Windows Explorer, browse to the mapped drive that contains the studentshare1 folder.
b. Right-click the studentshare1 folder, and then click Properties.
c. In the Properties dialog box, click the Previous Version tab. A list of all the snapshots that have been
taken of the directory displays.
You have three options when navigating to and highlighting a snapshot:
Open View a read-only copy of that snapshot to ensure that it is the correct one.
Restore Restore the directory to the state it was when the selected snapshot was taken.
Summary:
204
Tasks:
References:
Module 5, Lesson 4
205
4. To create a demo_archive subdirectory, in the navigation pane, click the /ifs folder, and then in the details
pane, click Add Directory.
5. In the New Directory Properties box, in the Directory name field, type demo_archive.
6. Select all Permissions boxes, and then click Submit.
7. On the DATA PROTECTION tab, click SyncIQ, and then click the Policies sub-tab.
8. On the SyncIQ Policies page, click Create a SyncIQ Policy.
9. On the Create SyncIQ Policy page, in the Settings section, in the Policy name box, type a name for the policy.
(for example, PolicyTest)
NOTE: Policy names can include letters, numbers, hyphens, and underscore characters only, but they cannot
contain spaces.
10. In the Description field, type a detailed description about the policy. (for example, My Test Policy).
11. In the Action section, select Copy.
12. In the Run job section, select Only manually.
13. To configure the source directory, in the Source Cluster section, for the Source Root directory box, browse to
/ifs/data/studentshare1.
By default, no file criteria settings display. However, the default file criteria definition is file name is equal to '*'
where the wildcard character * represents any value. This criteria defines all files.
14. For the IF Condition:
a. In the first field, select Created.
b. In the second field, select newer than.
c. In the third field, select 5.
d. In the final field, select days.
15. In the Target Cluster section, for Target Host, type cloud9.
16. In the Target directory field, type the absolute path (beginning with /ifs) for the target-cluster directory to
which files will be replicated. For this lab, use /ifs/demo_archive.
17. In the Target Snapshot section, because SnapshotIQ is licensed and enabled on the target cluster:
a. In the Snapshot Alias Name field, leave the default entry, SIQ-%<SrcCluster>-%<PolicyName>.
b. In the Snapshot Naming Pattern field, leave the default naming pattern, SIQ-%<SrcCluster>%<PolicyName>-%Y-%m-%d_%H-%M.
206
c. In the Snapshot expiration section, click Snapshots expire after, type 1, and select Days for the unit.
NOTE: This will control the virtual cluster from running out of space due to the amount of snapshots.
18. In the Advanced Settings section, review the default settings. Do not modify these settings without assistance
from Isilon Technical Support.
19. Click Create Policy. The SyncIQ Policies page then displays a list of all configured SyncIQ policies.
207
208
Summary:
209
Tasks:
As the Cloud9 Senior IT admin, you know that storage space costs
and those customers are always looking for ways to save money.
Apply the training in running an assessment on the Isilon cluster,
specifying settings and view the deduplication report showing the
savings a company like Live-Stream, a multimedia customer can
achieve due to duplication of files across the cluster.
References:
Module 5, Lesson 5
210
5. In the OneFS web administration interface, click File System Management, and then click Deduplication.
NOTE: Observe that deduplication is not enabled.
6. Click Settings.
7. In the Assess Deduplication section, click Browse.
8. On the Select a Directory page, click the data folder, and then click Select.
If you assess multiple directories, disk savings are not differentiated by directory in the deduplication report.
9. Click Save Changes. You should see a green success message at the top of the window.
10. On the CLUSTER MANAGEMENT tab, click Job Operations.
11. Click the Job Types sub-tab.
12. In the Job Types table, in the DedupeAssessment row, in the Actions column, click More, and then click Start
Job.
13. On the Start a Job dialog box, click Start Job.
14. A Starting Job message displays briefly.
15. Under Job Operations, click Job Summary.
16. When the DedupeAssessment job completes, the job is removed from the Active Jobs table.
NOTE: This may take a few minutes to complete.
17. On the FILE SYSTEM tab, click Deduplication.
18. Click the Summary sub-tab.
In the Deduplication Assessment Reports table, in the row of the most recent assessment job, click View
Details.
19. On the Deduplication Report page, view the amount of disk space that will be saved if you deduplicate the
directory. The number of blocks that will be deduplicated is displayed in the Deduped blocks value.
20. When you have completed viewing the report, click Close.
211
On the About This Cluster page, verify that SmartDedupe Status is Evaluation.
212
213
Tasks:
References:
Module 5, Lesson 6
214
2. Wait for the node to reach the Wizard prompt, and then repeat Step 1 for the Compliance-Node2 and
Compliance-Node3 tabs, waiting each time for the VM to reach the Wizard prompt.
3. On Compliance-Node3, at the Wizard prompt, type 4, and then type yes to confirm the operation. This will
cause the node to reboot into Compliance mode.
4. Repeat step 3 for Compliance-Node2 and Compliance-Node1 to boot all three nodes into Compliance mode.
Wait until all three nodes are at the Wizard prompt before continuing to the next step.
5. After all three nodes have rebooted, on the Compliance-Node1 tab at the Wizard prompt, type 1 to create a
new cluster.
6. A request for a SmartLock Compliance license is displayed. Type the license key provided by the instructor, and
then press ENTER.
215
9. The license is verified and you are prompted to change the compadmin password. Use the Isilon2! password
and then verify the password by retyping.
10. At the prompt for UI admin password change, use the Isilon2! password, and then verify the password by
retyping it.
11. At the prompt, type yes to enable Support IQ.
12. At the prompt for company name, type Isilon.
13. At the prompt for contact name, type Employee.
14. At the prompt for contact phone, type 2063157500.
15. At the prompt for the contact email, type employee@isilon.com.
16. At the Configure Name prompt, type Compliance.
17. Press ENTER to accept the default encoding, utf-8.
18. Type 1 to configure the netmask, and enter 255.255.255.0.
19. Type 3 to configure the int-a IP ranges, and then type 1 to Add an IP range.
20. Type 128.221.252.21 for the Low IP address.
21. Press BACKSPACE as necessary to type 128.221.252.29 for the High IP address. (The range is 128.221.252.21 to
128.221.252.29).
22. Press ENTER at the int-a IP ranges prompt to confirm the range.
23. Press ENTER at the interface int-a prompt to confirm the current configuration.
24. Type 1 at the prompt for the external subnet.
25. Type 1 to configure the netmask. Type 255.255.255.0 for the ext-1 netmask.
26. Type 3 to configure the ext-1 IP range, and then type 1 to add an IP range.
27. Type 192.168.0.21 for the Low IP address.
28. Press BACKSPACE as necessary to type 192.168.0.29 for the High IP address. (The range is 192.168.0.21 to
192.168.0.29.).
29. Press ENTER at the ext-1 IP ranges prompt to confirm the entered IP.
30. Press ENTER at the interface ext-1 prompt to confirm the current configuration.
31. Type 192.168.0.1 for the default gateway.
216
217
218
4. List the specific areas you can access with the compadmin account?
5. Log out of the Compliance cluster web administration interface, and log back in as admin with the Isilon2!
password. Notice the full access of admin vs. compadmin, and the lack of root.
Minimize all web administration interface browser windows.
219
16. Now create either an smb or nfs connection to this directory and copy some files from the client system to the
directory.
17. In PuTTY, press ENTER after typing:
isi worm domains list -v
This command works for deleting WORM committed files before the expiration date only if you are logged in as
root on the Enterprise cluster through the CLI. Privileged delete functionality must not be permanently disabled
for the SmartLock directory that contains the file.
220
You now have created a SmartLock directory with a commitment after 10 minutes and a minimum retention of
the data for 1 month.
221
You have changed the file retention date for the worm domain. Files will be retained for the greater of the
override date and the individual file retention date.
11. Now create either an smb or nfs connection to this directory and copy some files from the client system to the
directory. Use the compadmin/Isilon2! user account and password to map the drive.
12. In PuTTY, press ENTER after typing:
sudo isi worm domains list -v
This command works for deleting WORM committed files before the expiration date only if you are logged in as
compadmin on the compliance cluster through the CLI. Privileged delete functionality must not be permanently
disabled for the SmartLock directory that contains the file.
16. Press ENTER after typing:
sudo isi worm files delete /ifs/data/SmartLock/sl1/<file name>
222
Summary:
223
224
Module 7
Monitoring
225
Module 7 - Monitoring
Lab 7.0: Cluster Events
Scenario 7.0:
Tasks:
Cloud9 has always had the admin team jointly monitor the
hardware and report to the senior IT issues with the hardware.
With your new Isilon cluster, you need to explain to your team
about cluster events. Using the training you just received, review
events looking for any failures, warnings, etc. Understand what is
being relayed by looking at details of events and Access Overview.
Practice displaying events from the web administration interface
and CLI as well as analysis what events belong to which event
categories. You will also practice event management on how to
quiet/unquiet or cancel/uncancel events.
References:
Module 7, Lessons 1 2
226
5. On the right side of the page, in the Action column, click View details.
6. Review the Event type, Message, Scope, and Severity.
7. Write down the Event type. _____________________________________________________
8. Using the Reading Event Type slide in your Student guide, validate the Event Category that this Event Type
belongs to.
_______________________________________________________________________________________
9. What Events are Yellow? _______________________________________________________
10. Review the Event type, Message, Scope, and Severity.
11. Write down the Event type. _____________________________________________________
12. Using the Reading Event Type slide in your Student guide, validate the Event Category that this Event Type
belongs to.
_______________________________________________________________________________________
13. What Events are red? _________________________________________________________
14. Review the Event type, Message, Scope, and Severity.
15. Write down the Event type. _____________________________________________________
16. Using the Reading Event Type slide in your Student guide, validate the Event Category that this Event Type
belongs to.
_______________________________________________________________________________________
17. Mouse over Help, Click Help on This Page in the upper right corner of your web browser.
18. Use the Event Type from step 15 to find the Event ID information in Help. Compare this information to what
you had read on the View details page.
19. Click the Events sub-tab.
20. Click the Type column header to get all Coalesced Events to the top of the New Events section.
21. Click one of the Coalescing Event dots.
227
22. Scroll down to review the Event Details but also to see the Coalesced Events listed at the bottom of the web
page.
23. Click the Events sub-tab.
24. Choose an Event and click the Quiet link in the Actions column on the far right side.
25. Scroll down and validate your event shows up in the Quieted Events list.
6. Does this match the event information you had reviewed in the web administration interface? Yes or No
NOTE: This should match the majority of the information if not identical to what you saw in the web
administration interface.
7. Press ENTER after typing:
isi events quiet #.##
228
Is the event listed and what does the message say about the event?
Some events are recurring and when canceled can pop right back into the event list. As such to keep the event
from showing up in the event list one would want to quiet the event rather than cancel said event.
14. Press ENTER after typing:
isi_classic events notifications
You will have 4 options that will help you with notifications.
229
You will only see default Isilon event notifications at this time.
16. Press ENTER after typing:
isi events settings
You should see your new notification created with 10 categories and 269 event types listed in the description.
Summary:
In this lab, you learned how to view events, understand the event
and address the event from the web administration interface and
the CLI. After completing this lab you should be comfortable
displaying events, reading and interpreting and acting to either
quiet or cancel said events.
230
Tasks:
1. Activate InsightIQ.
2. Configure local user and administrator account.
3. Configure network settings and time zone.
4. Configure datastore.
5. Add a cluster.
6. Enable and configure FSA.
7. Manage IIQ instance.
References:
Module 7, Lesson 3
231
4. Press the SPACEBAR or PAGE DOWN key to scroll through the eleven paragraphs of the license agreement
(EULA).
To agree to the terms of the EULA, at the end of the agreement, press ENTER after typing:
yes
232
233
13. Review the IP address and netmask, and then press ENTER to accept the default of y.
14. Type 2, and then press ENTER. You are prompted to choose an interface option. Accept the default option of 0,
and then press ENTER.
NOTE: If you have multiple Ethernet interfaces, repeat the steps.
15. For the Default Gateway, type 192.168.0.1, and then press ENTER.
16. Once the reconfiguration of eth0 is completed, press 0, and then press ENTER.
Review to make sure the following settings are configured correctly:
Gateway: 192.168.0.1
IP address: 192.168.0.221
Netmask: 255.255.255.0
17. Type 1, and then press ENTER. You are returned to the local administrator prompt.
18. Type exit, and then press ENTER.
19. You are returned to the IIQ Login main page. Two addresses display; one for the InsightIQ application and one
to manage the VM.
20. Press the DOWN ARROW to set the Set Timezone option, and then press ENTER.
21. Type 2 to select Americas, and then press ENTER.
22. Type 49 for United States, and then press ENTER.
23. Type 21 for Pacific Time, and then press ENTER.
24. You are shown local and universal time. Check the local time against the time on the Windows Client system to
make sure it is current and correct.
NOTE: If the time is not correct, type 2 for No, and then press ENTER.
25. Type 1, and then press ENTER.
26. You are returned to the Login page. Close the VM.
234
235
Directory chart maximum depth: Type an integer that represents the maximum depth of the
directories that you want InsightIQ to analyze. To specify an unlimited depth, type -1.
File/directory list size: Leave the default value of 1000, or type an integer that represents the
maximum number of top-contributing files and directories to list in the InsightIQ Data Usage view.
Path squash depth: Leave the default value of 5, or type an integer that represents the maximum
number of directory levels to include in a path.
Maximum result set age in days: Type an integer that represents, in days, how long to retain each data
set before automatically deleting it.
To retain data sets indefinitely, type 0. You can manually delete a data set at any time.
Maximum result set count: Type an integer that represents the maximum number of data sets to
retain.
To retain an unlimited number of data sets, type 0.
7. Click Submit.
8. Click the DASHBOARD tab to review your monitored cluster.
9. Log out of the browser session.
236
Summary:
237
Tasks:
1. Interface overview.
2. View InsightIQ performance reports.
3. View InsightIQ file system reports.
References:
Module 7, Lesson 4
238
6. On the InsightIQ Dashboard, locate the Aggregated Cluster Overview shown by #1. These are recent trend
charts for the last 12 hours, sometimes known as sparklines #2.
7. Scroll down on the dashboard and highlight the following:
a. Similar statistics are displayed for each cluster as is displayed at an aggregate level above.
b. Performance details for this specific cluster can be jumped to by clicking Performance details.
c. File system details for this specific cluster can be jumped to by clicking File system details.
d. Estimated usable capacity will display on clusters OneFS 7.2 that have run an FSA job. Click Capacity
Reporting to provide details of the origin of the Usable Capacity number.
e. Click the + icon to expand the details for that cluster.
f.
The order can be changed by clicking and dragging the handle on the right.
Task 2.2 Select the Date Range and View the Report
1. For best results in this lab, select the date range of 10/26/2014 - 11/1/2014.
2. Click View Report.
239
7. Any chart can be downloaded as a CSV by clicking this link. Administrators can also SSH to the InsightIQ server
and dump large sections of performance data to CSV file. This can, also, be automated with cron.
8. The charts are all interactive and allow data detail to be shown by simply hovering over that part of the chart.
Administrators can also click and drag to move the timeline, double-click to zoom in and double-click while
holding the shift key to zoom out.
Scroll down to the Connect Client section, in the Breakout by section above the chart, click Node.
Here the administrator can see that there is some imbalance in the cluster. They could explore this data during
different time periods to see if Node 13 is constantly having more connects and if so, consider change
SmartConnect to balance the connects better. The administrator could easily automate this report get a daily or
weekly email with this chart in the PDF.
NOTE: Details can be seen by hovering not only over the chart, but on the heat maps for each client.
240
To see what data flow looks like, in the Breakout by section, click Direction.
241
2. Check the Live Performance Reporting box. This will make the report show up as an option in Live Performance
Reporting.
3. Check the Scheduled Performance Report box. This generates a report at a specific frequency on a specific
cluster. When this is selected, more scheduling options will appear.
4. Select cribsbiox as the cluster the scheduled report will be generated against.
5. Leave the default period of 24 hours to be displayed in the report.
6. Leave the default of Daily for how often to generate the report.
7. Select the Email this report as a PDF attachment each time it is generated box.
Optionally enter the email address of who should receive this report.
NOTE: Because this lab is on an isolated network, the email will not be delivered.
For the scheduled report, the choices are displayed for data breakdown options.
2. Select Protocol.
3. Click Add another performance module.
4. From the menu, select Protocol Operations Average Latency.
5. Select to break out the date by Protocol here, as well.
6. Highlight that changing the order of data displayed in the report is as easy as dragging the handle in the upperright of the module and moving it up and down.
7. Click Finish.
This generates reports that show both active clients, broken down by the protocols they are using. The second
chart shows the average latency of those protocols. Confirmation of successfully saving the report is displayed.
242
There are three main sub commands: export, list, and describe. As of 3.1, both performance data and
file system data can be exported.
In this example, you will create an export of the same type that you did for creating a custom report. This lab
will only cover export of performance data; the next lab will cover export of files system data.
The same options that are in the web administration interface are here, but they have a short name by which
to call them from the command line.
243
This displays all the breakout options for all the data modules. Like the web administration interface, the
breakout options for Active Clients are node and protocol.
Show the full description of the Protocol Operations Average Latency data module
This provides a detailed description of the module as well as the format and breakout options.
This highlights all the options administrators have to export all performance data. Many more options exist
here than is in this demonstration.
Export a report
This will export the active clients data in a file called my_report_for_clients. This creates a CSV file of the first
part of the same report as earlier configured in the web interface previously except the interval is 2 hours
instead of 24, to make the export go faster.
This will export the protocol latency data in a file called my_report_for_latency. This creates a CSV file of the
second part of the same report as earlier configured in the web administration interface previously, except the
interval is 2 hours instead of 24, to make the export go faster.
244
This will show each report. The heading and the data by default show everything is in UNIX time. This can be
easily changed in tools like Excel or by specifying a time zone in the export command.
The Time headings now have the time zone in them. The time data shows date and time in 24-hour time
formatting. This makes it easier to examine and digest the data.
245
Delete Report
1. Press ENTER after typing:
rm -rf my_report_*
Total Capacity - This is the total raw capacity of the entire cluster, not including overhead.
Unallocated Capacity - In the context of Isilon OneFS, there should only be a number here with there is a new
node type add that is not yet 3 more nodes. So there is capacity on that new node, but data cannot be put on it
until there are at least 3 of that node time.
Allocated Capacity - This is the capacity available for data to be stored on. This is usually the same and Total
Capacity.
Reserved for Virtual Hot Spares - This is reservation of space at a cluster level for drive failures to insure there
is enough capacity for a drive rebuilt to complete as OneFS does not have stand-by hot spares and uses all the
drives, all the time.
User Data including Protection - This is all the physical space consumed by the data currently stored on the
cluster, including the protection overhead to store it safely.
246
Snapshots Usage - This is the space consumed by all the snapshots on the cluster.
Remaining Capacity - This is the left over raw capacity that can still have data written to.
Estimated Additional Protection Overhead - This number is based on the latest File System Analytics job that
was run. This tells InsightIQ how much data physically vs logically is being consumed, which is used to give an
estimate for future data that will be added. This assumes that the data to be added will be similar to the data
currently stored. Not this number is very low because there are many thin provisioned files on the cluster. That
means they are logically very large, but physically very small. This makes the number small, however, if the data
to be added is similar to what is stored, this should not be an issue.
Overhead estimation based on FSA Report - This is drop-down list that shows all the File System Analytics
(FSA) jobs and gives the option to choose an estimation-based on a report other than that latest.
Estimated XXX of Usable Capacity - This is estimation of how much more logical (what the end user would
understand) data can be added to the cluster.
247
Scroll down the page and select Largest Physical Size from the Top 2000 Files by menu.
NOTE: The extension of the files here. In later steps, you will create filters that will change these results.
Scroll down the page and select Largest Logical Size from the Top 2000 Files by menu.
NOTE: The extension of the files here. In later steps, you will create filters that will change these results.
248
Scroll down the page and select Oldest Modified Time from the Top 2000 Directories by menu.
NOTE: By hovering over any of the directory buttons a full path can be displayed.
Find the largest files on the cluster that meet the filter rules
Scroll down and select Largest Physical Size filter again from the Top 2000 Files by menu.
NOTE: This time, the previous files are not showing because they do not meet the filter rules. Only .vmdk files
in the /ifs/vmware path are shown here.
249
Hover over any of the bars, and the details are displayed.
NOTE: In this example, there are 194 files that are included in the filter between 10GB and 100GB.
250
Explore the extensions and the age of the data being stored
Scroll down to the File Count by Last Modified chart and click File Extension link.
NOTE: Notice how clearly the type of files being stored on the cluster can be seen as it relates to their age. In
this example, that 219K files have .svn-base extension and are between 180 days and 1 year of age.
Explore the directory location and the age of the data being stored
Scroll down to the "File Count by Physical Size" chart and click File Extension link in the Breakout by heading.
NOTE: Observe again that the same charts are used, but the differences are being clearly highlighted. In this
example, over a total of 6 files were added with no extension. 6 between 8 KB and 128KB, 4 between 128 KB
and 1 MB, while 4 files of larger size were deleted.
251
Deduplication Summary
Deduplicated Data - This is the total data that exists within paths that have had deduplication
enabled, labeled.
Space Used - This is the space that data is now consuming. In this example, what was once 6.01 TB
is now 1.54 TB.
There is also the pie chart this shows only the data that is been deduplicated.
Total Usage - This is the cluster's use space, which includes deduplicated and data that has not
been deduplicated.
Scroll down to review Physical Deduplicated Blocks per Job, Files Scanned for Deduplication per Job and
Input/Output Operations per Job.
NOTE: These charts show various details of each job in a visual way to allow administrators to see how much
work deduplication jobs are doing. Any chart can be hovered over to get details, such as Deduplication saving
from the job.
Click any of the bar graphs to get full details for that job.
252
Job Details
1. Observe the details displayed here, including Duration and Deduplication percentage. This can help
administrators to see if the value and impact of deduplication.
2. Click Close to dismiss pop-up window.
There are three main sub commands, export, list, and describe to be used for exporting all performance data.
Reminder as of 3.1 both performance data and file system data can be exported.
253
The same options that are in the web administration interface are here, but they have a short name by which
to call them from the command line.
This displays all the breakout options for all the data modules. Like the web interface, the breakout options for
Active Clients are node and protocol.
This provides a detailed description of the module as well as the format and breakout options.
Observe all the options administrators have to export all performance data. Many more options exist here than
is in this demonstration.
254
In the case of top files and top directories, breakout-by is really a sort.
Notice from the options that a filter could have been applied as well.
For example, you can filter by path. If you add --filter directory:vmware, it would show only the total
top 1000 files that are within the path /ifs/vmware.
Also note that the document will have 20 lines, if not specified in the --number-breakouts, the system will
return the default of 12.
This should match the data seen in the web administration interface when looking at the top files sort by
physical size.
255
This should match what is seen in the web administration interface. There are more filter options that can be
applied here.
Verify you see the 4 clusters listed here: Dog_puddles, Angus, cribsbiox and cert2-long234567.
If this was not a demo vApp, you would want to log onto your cluster and review events either from the web
administration interface or CLI. Look for events that deal with IIQ.
Summary:
256
Tasks:
Knowing that Cloud9 has always used the CLI as much as the web
administration interface, apply the training you just received to
gather the status of the cluster using the isi statistics
command. If needed, use h to refresh the various subcommands,
but use these subcommands to gather the status of the seven
areas that cover the Isilon cluster.
References:
Module 7, Lesson 5
3. Confirm the options you will use in the next task. Identify the options for client statistics, history, clients by
degraded active clients, degraded connected clients, system, and drive.
4. To list valid arguments to a given option, press ENTER after typing:
isi statistics list
5. To see you the specific options for using orderby, press ENTER after typing:
isi statistics list orderby
257
2. To show you by node which clients are connected to which node, press ENTER after typing:
isi statistics client --orderby=Node
3. To show over all SMB history statistics, press ENTER after typing:
isi statistics history -d --stats=node.clientstats.connected.smb |more
5. To view of the overall performance of the cluster, press ENTER after typing: You can also do this per node.
isi statistics system
6. To see the performance per drive for the node you are logged into by your SSH session, press ENTER after
typing:
isi statistics drive --type=sas
7. To see the performance per drive for the whole cluster, press ENTER after typing:
isi statistics drive --type=sas --nodes=all
3. To show your performance for the top active results per node, press ENTER after typing:
isi_for_array "isi statistics drive | head -5"
258
7. To get detailed broken down cache reads and prefetches, press ENTER after typing:
isi_cache_stats -v
Summary:
In this lab, you verified the options for isi statistics and
then you used a set of the most common isi statistics
commands to practice gathering cluster data and then use various
output manipulation to record this data. After completing this lab
you should be comfortable with using the OneFS CLI to gather
statistics.
259
260
Module 8
Job Engine
261
Tasks:
References:
Module 8, Lesson 1
262
A column approach is used for the listing but notice that the state is not fully lined up so carefully observe that
the state is always after the number for the job.
4. Press ENTER after typing:
isi job events list -v
This is equal to clicking on the View Details button in the web administration interface. You can use |more to
review all the detailed.
5. Press ENTER after typing:
isi job events list --job-id ##
You can use any job type title to get this list and use a -v for more details.
Summary:
In this lab, you learned about the job engine and how to view it
from the web administration interface and CLI. After completing
this lab you should be comfortable getting status on the job engine,
history and schedule from either the web administration interface
or CLI.
263
Tasks:
Based on the training, use isi job config and isi job
impact to get the current status on the cluster and individual
nodes.
References:
Module 8, Lesson 2 3
264
265
Validate you have the four built-in Isilon Template Policies and your test Policy, for a total of five policies.
3. Press ENTER after typing:
isi job type list
Verify you have your list of ID type, Enabled status and Policy showing.
4. Press ENTER after typing:
isi job type view AVScan
266
This will show you all the job types so you can easily view other job reports.
Select a job to use in the next step.
7. Press ENTER after typing:
isi job events list --job-type "Name of job type"
Observe the ID for your Job type. This is a number in brackets [###].
8. Press ENTER after typing:
isi job reports view ###
267
Summary:
In this lab, you learned how to us the OneFS CLI and web
administration interface to review the status of the job engine,
impact policies, review and modify job priorities and
analyze/troubleshoot job status. After completing this lab you
should be comfortable with reviewing and modifying job policies as
well as analyzing and troubleshooting job status.
268
Reset to start Lab 1.0 Reset the VMware Workstations virtual machines back to the very beginning of Lab 1.0,
as if you had logged in for the first time.
Reset to start Lab 3.5 Reset the VMware Workstations virtual machines back to the beginning of Lab 3.5. The
virtual environment will be configured as if Labs 1.0-3.4 were all configured properly.
2. For each virtual machine, you will be prompted to confirm that you really want to shut down the virtual
machine. When prompted, click Power Off.
269
4. Reset the WinServer2008 to its original configuration. Right-click the WinServer2008 tab, select Snapshot, and
then click WinServer2008Original.
5. Repeat steps 3-4 using the Snapshots listed in the Snapshots for Lab Resets table. You need to reset the VMs in
the order listed.
To reset to beginning of Lab 1.0, use the Snapshots listed in the Snapshot to Original VM Configuration
column.
To reset to beginning of Lab 3.4, use the Snapshots listed in the Snapshot to Beginning of Lab 3.5
column.
TIP: For both resets, all machines are reset to original configuration except for Cloud9-Node1, Cloud9Node2, and Cloud9-Node3.
270
Virtual Machine
Snapshot to Original VM
Configuration
WinServer2008
WinServer2008Original
WinServer2008Original
LinuxServer
LinuxServerOriginal
LinuxServerOriginal
LinuxClient
LinuxClientOriginal
LinuxClientOriginal
InsightIQ_v3.1
IIQ31_Unconfigured
IIQ31_Unconfigured
IIQv3.1.DEMO
IIQ31_Demo
IIQ31_Demo
Cloud9-Node1
Cloud9-Node1-Unconfigured
Cloud9-Node1-AD-LDAP
Cloud9-Node2
Cloud9-Node2-Unconfigured
Cloud9-Node2-AD-LDAP
Cloud9-Node3
Cloud9-Node3-Unconfigured
Cloud9-Node3-AD-LDAP
Compliance-Node1
Compliance-Node1-Unconfigured
Compliance-Node1-Unconfigured
10
Compliance-Node2
Compliance-Node2-Unconfigured
Compliance-Node2-Unconfigured
11
Compliance-Node3
Compliance-Node3-Unconfigured
Compliance-Node3-Unconfigured
6. Turn all virtual machines on. In the left navigation pane, click PPAM_720, and then on the toolbar, click the
start arrow.
271
7. After the Status for each virtual machine is Powered On, depending on the set of Snapshots you selected, you
can now start Lab 1.0 or Lab 3.5.
272