Dell FluidFS Version 5
Dell FluidFS Version 5
Dell FluidFS Version 5
0
Administrator’s Guide
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2016 - 03
Rev. B
Contents
About This Guide....................................................................................................13
How to Find Information.....................................................................................................................13
Contacting Dell....................................................................................................................................13
Revision History................................................................................................................................... 13
Audience.............................................................................................................................................. 14
Related Publications............................................................................................................................ 14
Storage Manager Documents....................................................................................................... 14
Storage Center Documents.......................................................................................................... 14
Dell TechCenter.............................................................................................................................15
3
Managing Secured Management....................................................................................................... 29
Add a Secured Management Subnet............................................................................................30
Change the Secured Management Subnet Interface...................................................................31
Change the Netmask or Prefix for the Secured Management Subnet........................................ 31
Change the VLAN Tag for the Secured Management Subnet..................................................... 31
Change the VIPs for the Secured Management Subnet.............................................................. 32
Change the NAS Controller IP Addresses for the Secured Management Subnet...................... 32
Delete the Secured Management Subnet.................................................................................... 32
Enable or Disable Secured Management..................................................................................... 33
Managing the FluidFS Cluster Name.................................................................................................. 33
View the FluidFS Cluster Name.....................................................................................................34
Rename the FluidFS Cluster..........................................................................................................34
Managing Licensing............................................................................................................................ 34
View License Information............................................................................................................. 34
Accept the End-User License Agreement....................................................................................34
Managing the System Time................................................................................................................ 35
View or Set the Time Zone............................................................................................................35
View the Time................................................................................................................................35
Set the Time Manually ..................................................................................................................36
View the NTP Servers.................................................................................................................... 36
Add or Remove NTP Servers.........................................................................................................36
Enable or Disable NTP...................................................................................................................37
Managing the FTP Server.................................................................................................................... 37
Access the FTP Server................................................................................................................... 37
Enable or Disable the FTP Server.................................................................................................. 37
Managing SNMP.................................................................................................................................. 38
Obtain SNMP MIBs and Traps....................................................................................................... 38
Change the SNMP Read-only Community.................................................................................. 38
Change the SNMP Trap System Location or Contact................................................................. 38
Add or Remove SNMP Trap Recipients........................................................................................ 39
Enable or Disable SNMP Traps......................................................................................................39
Managing the Health Scan Throttling Mode......................................................................................39
Change the Health Scan Settings.................................................................................................40
Managing the Operation Mode.......................................................................................................... 40
View or Change the Operation Mode..........................................................................................40
Managing Client Connections............................................................................................................40
Display the Distribution of Clients Between NAS Controllers..................................................... 41
View Clients Assigned to a NAS Controller.................................................................................. 41
Assign or Unassign a Client to a NAS Controller..........................................................................41
Manually Migrate Clients to Another NAS Controller.................................................................. 41
Fail Back Clients to Their Assigned NAS Controller..................................................................... 42
Rebalance Client Connections Across NAS Controllers............................................................. 42
4
Shutting Down and Restarting NAS Controllers................................................................................ 42
Shut Down the FluidFS Cluster..................................................................................................... 42
Start Up the FluidFS Cluster.......................................................................................................... 43
Reboot a NAS Controller.............................................................................................................. 43
Managing NAS Appliance and NAS Controller Blinking.....................................................................43
Enable or Disable NAS Appliance Blinking................................................................................... 44
Enable or Disable NAS Controller Blinking.................................................................................. 44
Validate Storage Connections...................................................................................................... 44
3 FluidFS Networking............................................................................................45
Managing the Default Gateway.......................................................................................................... 45
View the Default Gateway.............................................................................................................45
Change the Default Gateway........................................................................................................45
Managing DNS Servers and Suffixes...................................................................................................45
View DNS Servers and Suffixes..................................................................................................... 46
Add or Remove DNS Servers and Suffixes................................................................................... 46
Change the Order of Preference for DNS Servers and Suffixes..................................................46
DNS Settings Dialog Box............................................................................................................... 47
Managing Static Routes...................................................................................................................... 47
View the Static Routes.................................................................................................................. 48
Add a Static Route.........................................................................................................................48
Change the Gateway for a Static Route.......................................................................................48
Delete a Static Route.....................................................................................................................48
Managing the Client Networks...........................................................................................................49
View the Client Networks............................................................................................................. 49
Create a Client Network............................................................................................................... 49
Change the Netmask or Prefix for a Client Network...................................................................50
Change the VLAN Tag for a Client Network................................................................................ 50
Change the Client VIPs for a Client Network...............................................................................50
Change the NAS Controller IP Addresses for a Client Network.................................................. 51
Delete a Client Network................................................................................................................ 51
View the Client Network MTU.......................................................................................................51
Change the Client Network MTU..................................................................................................51
View the Client Network Bonding Mode......................................................................................52
Change the Client Network Bonding Mode.................................................................................52
Viewing the Fibre Channel WWNs......................................................................................................52
Managing iSCSI SAN Connectivity......................................................................................................53
Add or Remove an iSCSI Port....................................................................................................... 53
Add an iSCSI Fabric........................................................................................................................53
Change the VLAN Tag for an iSCSI Fabric....................................................................................53
Change the NAS Controller IP Addresses for an iSCSI Fabric..................................................... 54
5
4 FluidFS Account Management and Authentication..................................... 55
Account Management and Authentication........................................................................................ 55
Default Administrative Accounts........................................................................................................ 56
Administrator Account.................................................................................................................. 56
Support Account........................................................................................................................... 56
Enable or Disable Dell SupportAssist............................................................................................ 57
CLI Account................................................................................................................................... 57
Default Local User and Local Group Accounts................................................................................. 58
Managing Administrator Accounts..................................................................................................... 58
View Administrators...................................................................................................................... 59
Add an Administrator.....................................................................................................................59
Assign NAS Volumes to a Volume Administrator.........................................................................60
Change the Permission Level of an Administrator...................................................................... 60
Change the Email Address of an Administrator...........................................................................60
Change an Administrator Password..............................................................................................61
Delete an Administrator.................................................................................................................61
Managing Local Users and Groups Using MMC.................................................................................61
Managing Local Users.........................................................................................................................62
Add a Local User............................................................................................................................62
Change the Primary Local Group to Which a Local User Is Assigned........................................ 63
Change the Secondary Local Groups to Which a Local User Is Assigned..................................63
Enable or Disable a Local User..................................................................................................... 63
Set the Password Policy for a Local User.....................................................................................64
Change a Local User Password.................................................................................................... 64
Delete a Local User....................................................................................................................... 64
Managing Local Groups......................................................................................................................65
View Local Groups........................................................................................................................ 65
Add a Local Group.........................................................................................................................65
Change the Users Assigned to a Local Group............................................................................. 66
Delete a Local Group.................................................................................................................... 68
Managing Active Directory................................................................................................................. 68
Reduce the Number of Subtrees for Searches............................................................................ 68
Enable Active Directory Authentication....................................................................................... 68
Modify Active Directory Authentication Settings......................................................................... 70
Modify Active Directory Controller Settings.................................................................................70
Disable Active Directory Authentication...................................................................................... 70
View Open Files............................................................................................................................. 70
Managing LDAP....................................................................................................................................71
Enable LDAP Authentication..........................................................................................................71
Change the LDAP Base DN........................................................................................................... 72
Add or Remove LDAP Servers....................................................................................................... 72
6
Enable or Disable LDAP on Active Directory Extended Schema................................................. 72
Enable or Disable Authentication for the LDAP Connection.......................................................73
Enable or Disable TLS Encryption for the LDAP Connection...................................................... 73
Disable LDAP Authentication........................................................................................................ 73
Managing NIS...................................................................................................................................... 74
Enable or Disable NIS Authentication...........................................................................................74
Change the NIS Domain Name.................................................................................................... 74
Add or Remove NIS Servers.......................................................................................................... 74
Change the Order of Preference for NIS Servers.........................................................................75
Managing User Mappings Between Windows and UNIX/Linux Users...............................................75
User Mapping Policies................................................................................................................... 75
User Mapping Policy and NAS Volume Security Style................................................................. 76
Managing the User Mapping Policy.............................................................................................. 76
Managing User Mapping Rules..................................................................................................... 76
7
Branch Cache.............................................................................................................................. 103
Configuring Branch Cache......................................................................................................... 103
Accessing an SMB Share Using UNIX or Linux...........................................................................104
Managing NFS Exports......................................................................................................................104
Configuring NFS Exports.............................................................................................................105
Setting Permissions for an NFS Export....................................................................................... 109
Accessing an NFS Export............................................................................................................ 109
Global Namespace............................................................................................................................ 110
Global Namespace Limitations................................................................................................... 110
Additional Documentation.......................................................................................................... 110
Using FTP........................................................................................................................................... 110
FTP User Authentication.............................................................................................................. 111
FTP Limitations............................................................................................................................. 111
Enable or Disable FTP.................................................................................................................. 111
Using Symbolic Links......................................................................................................................... 111
Limitations for Using Symbolic Links.......................................................................................... 112
File Access.................................................................................................................................... 112
Managing Quota Rules...................................................................................................................... 112
Quota Types.................................................................................................................................112
Group Quotas and User Groups................................................................................................. 113
Conflicts Between Group Quotas and User Quotas.................................................................. 113
Quotas and Mixed Security Style NAS Volumes......................................................................... 113
Configuring Quota Rules.............................................................................................................113
Managing Data Reduction.................................................................................................................118
Date Reduction Age-Based Policies and Archive Mode............................................................ 118
Data Reduction Considerations.................................................................................................. 119
Configuring Data Reduction....................................................................................................... 119
Viewing Data Reduction Savings.................................................................................................121
8
Managing NDMP............................................................................................................................... 132
Incremental Backups...................................................................................................................132
NDMP Two-Way Backup............................................................................................................ 133
Handling Hard Links.................................................................................................................... 134
Backing Up NAS Volume Data Using NDMP.............................................................................. 134
NDMP Environment Variables.....................................................................................................135
Supported DMA Servers...............................................................................................................137
Configuring NDMP...................................................................................................................... 137
Specifying NAS Volumes Using the DMA................................................................................... 139
NDMP Include/Exclude Path.......................................................................................................139
Viewing NDMP Jobs and Events................................................................................................ 140
Managing Replication....................................................................................................................... 140
How Replication Works............................................................................................................... 141
Target NAS Volumes................................................................................................................... 144
Managing Replication Partnerships............................................................................................ 144
Replicating NAS Volumes............................................................................................................147
Monitoring Replication Progress and Viewing Replication Events........................................... 150
Recovering an Individual NAS Volume....................................................................................... 150
Demote a Target NAS Volume.................................................................................................... 151
Using Replication for Disaster Recovery.....................................................................................151
9
9 FS Series VAAI Plugin........................................................................................167
Enable or Disable the FS Series VAAI Plugin.....................................................................................167
Installation Instructions.....................................................................................................................168
Plugin Verification............................................................................................................................. 168
Removal Instructions........................................................................................................................ 169
10
11 FluidFS Troubleshooting............................................................................... 187
Viewing the Event Log.......................................................................................................................187
View the Event Log......................................................................................................................187
View Details About an Event in the Event Log........................................................................... 187
Sort the Event Log....................................................................................................................... 187
Search the Event Log.................................................................................................................. 188
Running Diagnostics......................................................................................................................... 188
Run FluidFS Diagnostics on a FluidFS Cluster............................................................................ 188
Run Embedded System Diagnostics on a NAS Controller........................................................ 189
Configuring the BMC Network.........................................................................................................190
BMC Network Configuration Procedure....................................................................................190
Launching the iBMC Virtual KVM...................................................................................................... 191
Troubleshooting Common Issues....................................................................................................192
Troubleshoot Active Directory Issues.........................................................................................192
Troubleshoot Backup Issues.......................................................................................................193
Troubleshoot SMB Issues............................................................................................................194
Troubleshoot NFS Issues............................................................................................................ 198
Troubleshoot NAS File Access and Permissions Issues.............................................................203
Troubleshoot Networking Problems......................................................................................... 204
Troubleshoot Replication Issues................................................................................................ 205
Troubleshoot System Issues.......................................................................................................208
11
12
Preface
About This Guide
This guide describes how to use Enterprise Manager to manage and monitor your Dell storage
infrastructure.
For information about installing and configuring required Enterprise Manager components, see the Dell
Storage Manager Installation Guide.
Contacting Dell
Go to www.dell.com/support.
Revision History
Document number: 680-111-001
13
Audience
Storage administrators make up the target audience for this document. The intended reader has a
working knowledge of storage and networking concepts.
Related Publications
The following documentation is available for Dell storage components managed using Storage Manager.
14
• Storage Center Command Set for Windows PowerShell
Provides instructions for getting started with Windows PowerShell cmdlets and scripting objects that
interact with the Storage Center via the PowerShell interactive shell, scripts, and hosting applications.
Help for individual cmdlets is available online.
Dell TechCenter
Provides technical white papers, best practice guides, and frequently asked questions about Dell Storage
products. Go to: http://en.community.dell.com/techcenter/storage/.
15
16
1
FS8600 Scale-Out NAS with FluidFS
Overview
This section contains an overview of FS8600 scale-out Network Attached Storage (NAS).
To the client, the FluidFS cluster presents itself as a single file server, hosting multiple SMB shares and NFS
exports, with a single IP address and namespace. Clients connect to the FluidFS cluster using their
respective operating system's NAS protocols:
• UNIX and Linux users access files through the NFS protocol
• Windows users access files through the SMB protocol
• Users can also access files through the anonymous FTP protocol
Term Description
Fluid File System (FluidFS) Dell’s high-performance, scalable file system software installed on NAS
controllers.
Controller (NAS The two primary components of a NAS appliance, each of which functions
controller) as a separate member in the FluidFS cluster.
Peer controller The NAS controller with which a specific NAS controller is paired in a NAS
appliance.
Standby controller A NAS controller that is installed with the FluidFS software but is not part of a
FluidFS cluster. For example, a new or replacement NAS controller from the
Dell factory is considered a standby controller.
Backup power supplies Each NAS controller contains a backup power supply that provides backup
battery power in the event of a power failure.
FluidFS cluster One to four FS8600 scale-out NAS appliances configured as a FluidFS
cluster.
Storage Center Up to two Storage Centers that provide the NAS storage capacity.
Storage Manager Multisystem management software and user interface required for managing
the FluidFS cluster and Storage Centers(s).
FS8600 scale-out NAS A fully configured, highly available, and scalable FS8600 FluidFS cluster,
providing NAS (SMB and NFS) services. The cluster comprises NAS
appliances, storage provided by one or more Storage Centers and Storage
Manager.
FTP File Transport Protocol, used to transfer files to and from the FluidFS cluster.
NAS pool The sum of all storage provided by up to two Storage Centers minus space
reserved for internal system use.
NAS volume A virtualized volumes that consumes storage space in the NAS pool.
Administrators can create SMB shares and NFS exports on a NAS volume and
share them with authorized users.
LAN or client network The network through which clients access SMB shares or NFS exports. This
network is also used by the storage administrator to manage the FluidFS
cluster.
Client VIP One or more virtual IP addresses that clients use to access SMB shares and
NFS exports hosted by the FluidFS cluster.
SMB Share A directory in a NAS volume that is shared on the network using the Server
Message Block (SMB) protocol.
Network Data Protocol used for NDMP backup and restore operations.
Management Protocol
(NDMP)
Replication Copies NAS volume data between two FS8600 FluidFS clusters or between
two NAS volumes.
Snapshot An image of all the NAS volume data frozen as read-only at a specific point
in time.
Feature Description
Shared back-end infrastructure The Storage Center SAN and FS8600 scale-out NAS leverage the
same virtualized disk pool.
Unified block and file Unified Storage Center SAN and FS8600 scale-out NAS management
management and reporting using Storage Manager.
High-performance, scale-out Support for a single namespace spanning up to four NAS appliances
NAS (eight NAS controllers).
Capacity scaling Ability to scale a single namespace up to 4-PB capacity with two
Storage Centers.
Connectivity options Offers 1GbE and 10GbE copper and optical options for connectivity to
the client network.
Highly available and active- Redundant, hot-swappable NAS controllers in each NAS appliance.
active design Both NAS controllers in a NAS appliance process I/O.
Automatic load balancing Automatic balancing of client connections across network ports and
NAS controllers, as well as back-end I/O across Storage Center
volumes.
Multiprotocol support Support for SMB (on Windows), NFS (on UNIX and Linux), and FTP
protocols with ability to share user data across both protocols.
Client authentication Controls access to files using local and remote client authentication,
including LDAP, Active Directory, and NIS.
File security style Choice of file security mode for a NAS volume (UNIX, Windows, or
Mixed).
Cache mirroring The write cache is mirrored between NAS controllers, which ensures a
high-performance response to client requests and maintains data
integrity in the event of a NAS controller failure.
Journaling mode In the event of a NAS controller failure, the cache in the remaining
NAS controller is written to storage and the NAS controller continues
to write directly to storage, which protects against data loss.
Backup power supply Maintains data integrity in the event of a power failure by keeping a
NAS controller online long enough to write the cache to the internal
storage device.
NAS volume thin clones Clones NAS volumes without needing to physically copy the data set.
Antivirus scanning SMB antivirus scanning offloading using certified third-party, Internet
Content Adaptation Protocol (ICAP)-enabled antivirus solutions.
• 1Gb Ethernet client connectivity with 8Gb Fibre Channel back‑end connectivity to the Storage Center
• 10Gb Ethernet client connectivity with 8Gb Fibre Channel back‑end connectivity to the Storage
Center
• 10Gb Ethernet client connectivity with 10Gb Ethernet iSCSI back‑end connectivity to the Storage
Center
NOTE: There are two RAM configurations for the 10GbE models - 24GB and 48GB, which should
not be mixed in the same appliance, but can be mixed in the cluster.
Internal Storage
Each NAS controller has an internal storage device that is used only for the FluidFS images and for a
cache storage offload location in the event of a power failure. The internal hard drive does not provide
the NAS storage capacity.
Internal Cache
Each NAS controller has an internal cache that provides fast reads and reliable writes.
Related Links
Data Caching and Redundancy
Storage Center
The Storage Center provides the FS8600 scale-out NAS storage capacity; the FS8600 cannot be used as
a standalone NAS appliance. Storage Centers eliminate the need to have separate storage capacity for
block and file storage. In addition, Storage Center features, such as Dynamic Capacity and Data
Progression, are automatically applied to NAS volumes.
SAN Network
The FS8600 shares a back-end infrastructure with the Storage Center. The SAN network connects the
FS8600 to the Storage Center and carries the block-level traffic. The FS8600 communicates with the
Storage Center using either the iSCSI or Fibre Channel protocol, depending on which NAS appliance
configuration you purchased.
Internal Network
The internal network is used for communication between NAS controllers. Each of the NAS controllers in
the FluidFS cluster must have access to all other NAS controllers in the FluidFS cluster to achieve the
following goals:
• All metadata updates are recorded constantly to storage to avoid potential corruption or data loss in
the event of a power failure.
• Metadata is replicated on two separate volumes.
• Metadata is managed through a separate caching scheme.
• Checksums protect the metadata and directory structure. A background process continuously checks
and fixes incorrect checksums.
Failure Scenarios
The FluidFS cluster can tolerate a single NAS controller failure without impact to data availability and
without data loss. If one NAS controller in a NAS appliance becomes unavailable (for example, because
the NAS controller failed, is turned off, or is disconnected from the network), the NAS appliance status is
degraded. Although the FluidFS cluster is still operational and data is available to clients, you cannot
perform most configuration modifications, and performance might decrease because data is no longer
cached.
The following table summarizes the impact to data availability and data integrity of various failure
scenarios.
Simultaneous dual-NAS Unavailable Lose data in cache Data that has not been
controller failure in written to disk is lost
single NAS appliance
cluster
Simultaneous dual‑NAS Unavailable Lose data in cache Data that has not been
controller failure in written to disk is lost
multiple NAS appliance
cluster, same NAS
appliance
Steps
1. Start the Dell Storage Client application. The Dell Storage Client appears.
2. If the Dell Storage Client welcome screen displays, click Log in to a Storage Center or Data
Collector.
3. In the User Name field, type the EM Data Collector user name.
4. In the Password field, type the EM Data Collector password.
5. In the Host/IP field, type the host name or IP address of the server that hosts the Data Collector. If
the Data Collector and Client are installed on the same system, you can type localhost instead.
6. If you changed the web server port during installation, type the updated port in the Web Server Port
field.
7. Click Log In. The Dell Storage Client connects to the Data Collector and displays the Storage view,
including FluidFS clusters.
Steps
1. From the command line, type the following command at the first login as prompt:
cli
2. Type the FluidFS cluster administrator user name at the next login as prompt. The default user name
is Administrator.
3. Type the FluidFS cluster administrator password at the <user_name>’s password prompt. The default
password is Stor@ge!. You are logged on to the CLI and a Welcome window is displayed, listing the
available commands in the main menu.
If the client and server cannot agree on a common set of algorithms, the connection will fail. For
example, older OpenSSH clients will produce an error message similar to: no matching mac found:
client hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-
ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 server hmac-sha2-256,hmac-
sha2-512
or
Unable to negotiate with …: no matching key exchange method found. Their offer:
diffie-hellman-group-exchange-sha256
Recent versions of openssh (CentOS 6.6), putty (0.63), and SecureCRT (7.3.5) clients support the required
algorithms.
a. Log on to a UNIX/Linux workstation for which you want to use SSH key authentication.
b. From the command line, type the following command:
ssh-keygen -t rsa
c. Press Enter at the Enter file in which to save the key (/home/<user_name>/.ssh/id_rsa) prompt.
d. Press Enter at the Enter passphrase (empty for no passphrase) prompt and again at the Enter
same passphrase again prompt. An SSH key is generated at /home/<user_name>/.ssh/
id_rsa.pub.
2. Copy the SSH key to your clipboard.
3. Log on to the FluidFS cluster CLI through SSH using a password.
4. Type the following command, pasting in the copied SSH key:
system administrators passwordless-access add-ssh-keys Administrator add-
ssh-keys <SSH_key>
Now you can use the following command to log on to the FluidFS cluster from the workstation
without needing a password:
ssh <FluidFS_administrator_user_name>@<client_VIP_or_name>
You can also use the following format to run commands from the workstation without needing a
password:
Related Links
Connect to the FluidFS Cluster CLI Through SSH Using a Password
Service Port
Web Services 80
Secure Web Services 443
FTP 44421
FTP (Passive) 44430–44439
SSH 22
Storage Manager communication 35451
Secured management can be enabled only after the system is deployed. To make a subnet secure:
After the change takes effect, your management session will resume automatically. Management sessions
on all other subnets are disconnected.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab.
3. In the File System panel, expand Environment, select Network, and then click the Management
Network tab.
4. In the right pane, click Modify Restriction Settings. The Modify Restriction Settings dialog box
appears.
5. Enable or disable secured management.
From the Restriction drop-down menu:
• To enable secured management, select Restricted.
• To disable secured management, select Unrestricted
6. Click OK.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the Summary tab.
3. In the right pane, click Edit FluidFS Cluster Settings. The Edit FluidFS Cluster Settings dialog box
appears.
4. In the Name field, type a new name for the FluidFS cluster.
5. Click OK.
Managing Licensing
The license determines which NAS features are available in the FluidFS cluster.
You can set the system time using either of the following options:
• Manually set the time: Manually set the time for the FluidFS cluster.
• Automatically synchronize the time with an NTP server: Network Time Protocol (NTP) synchronizes
clocks over a network. If the FluidFS cluster is part of a Windows network, the Active Directory server
can serve as the NTP server. If the FluidFS cluster is not part of a Windows network, configure it to
synchronize with a local NTP server (if such a server exists), or with an NTP server on the Internet.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab.
3. In the File System panel, expand Environment and select Time.
4. In the right pane, click Edit Settings. The Modify Time Settings dialog box appears.
5. Clear the Use NTP Servers checkbox.
6. From the Time drop-down boxes, select the date and time.
7. Click OK.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab.
3. In the File System panel, expand Environment and select Time.
4. In the right pane, click Edit Settings. The Modify Time Settings dialog box appears.
5. Add or remove NTP servers.
• To add an NTP server, type the host name or IP address of an NTP server in the NTP Servers text
field and click Add.
• To remove an NTP server, select an NTP server from the NTP Servers list and click Remove.
6. Click OK.
Steps
Download the SNMP MIBs and traps from:
ftp://<FluidFS_administrator_user_name>@<client_VIP_or_name>:44421/mibs/
Related Links
Managing the FTP Server
• Normal: (Default mode) Health scan is running and scanning the file system to identify potential
errors.
• Maintenance: Health scan is running in high priority and scanning the file system to identify potential
errors.
• Off: Health scan is off and will not run.
Keep the health scan throttling mode set to Normal unless specifically directed otherwise by your
technical support representative.
• Normal: System is serving clients using SMB and NFS protocols and operating in mirroring mode.
• Write-Through Mode: System is serving clients using SMB and NFS protocols, but is forced to operate
in journaling mode. This mode of operation might have an impact on write performance, so it is
recommended when, for example, you have repeated electric power failures.
• No Service: System is not serving clients using SMB or NFS protocols and allows limited management
capabilities. This mode must be selected before replacing a NAS appliance.
• After FluidFS cluster hardware changes (for example, adding a NAS appliance)
• When a NAS controller that was down becomes available
Rebalancing client connections disconnects all client connections. Clients will then automatically
reconnect to the FluidFS cluster.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab.
3. In the File System tab navigation pane, select Client Activity.
4. In the right pane, click Rebalance Clients. The Rebalance Clients dialog box appears.
5. Click OK.
Related Links
View or Change the Operation Mode
Steps
1. If previously shut down, turn the Storage Centers back on before starting the FluidFS cluster.
2. Press and release the recessed power button at the back of each NAS controller to turn on the NAS
controllers.
3. Change the FluidFS cluster operation mode to Normal.
Related Links
View or Change the Operation Mode
FluidFS Networking 45
DNS if you are using Active Directory, and the DNS servers must be the same DNS servers that your Active
Directory domain controllers use.
46 FluidFS Networking
• To decrease the order of preference for a DNS server, select a DNS server and click Down.
6. DNS suffixes are listed in descending order of preference.
• To increase the order of preference for a DNS suffix, select a DNS suffix and click Up.
• To decrease the order of preference for a DNS suffix, select a DNS suffix and click Down.
7. Click OK.
Field/Option Description
DNS Servers IP Specifies the IP address of the DNS server providing name resolution services for
Addresses the FluidFS cluster and the associated DNS suffixes.
DNS Suffixes Specifies the suffixes to associate with the FluidFS cluster.
Cancel When clicked, discards all changes and closes the dialog box.
OK When clicked, saves all changes and closes the dialog box.
The solution is to define, in addition to a default gateway, a specific gateway for certain subnets by
configuring static routes. To configure these routes, you must describe each subnet in your network and
identify the most suitable gateway to access that subnet.
FluidFS Networking 47
Static routes do not have to be designated for the entire network—a default gateway is most suitable
when performance is not an issue. You can select when and where to use static routes to best meet
performance needs.
48 FluidFS Networking
Managing the Client Networks
The client networks define the client VIPs through which clients access SMB shares and NFS exports. To
ensure effective load balancing, use the following recommendations to determine the number of client
VIPs to define:
• If client access to the FluidFS cluster is not through a router (in other words, a flat network), define
one client VIP per FluidFS cluster.
• If clients access the FluidFS cluster through a router, define a client VIP for each client interface port
per NAS controller.
Related Links
LAN/Client Network
FluidFS Networking 49
Change the Netmask or Prefix for a Client Network
Change the netmask (IPv4) or prefix (IPv6) for a client network.
50 FluidFS Networking
Change the NAS Controller IP Addresses for a Client Network
Change the NAS controller IP addresses for a client network.
FluidFS Networking 51
View the Client Network Bonding Mode
View the current bonding mode (Adaptive Load Balancing or Link Aggregation Control Protocol) of the
client network interface.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab.
3. In the File System tab navigation pane, select Network.
4. In the right pane, click Edit Settings in the Client Interface section. The Network Settings dialog box
appears.
5. From the Mode drop-down menu, select a bonding mode (ALB or LACP).
6. Click OK.
52 FluidFS Networking
Managing iSCSI SAN Connectivity
iSCSI SAN subnets (Storage Center fault domains) or "fabrics" are the network connections between the
FluidFS cluster and the Storage Center. The SAN network consists of two subnets, named SAN and SANb.
The FluidFS cluster iSCSI SAN configuration can be changed after deployment if your network changes.
FluidFS Networking 53
Change the NAS Controller IP Addresses for an iSCSI Fabric
Change the NAS controller IP addresses for an iSCSI fabric.
54 FluidFS Networking
4
FluidFS Account Management and
Authentication
This section contains information about managing FluidFS cluster accounts and authentication. These
tasks are performed using the Dell Storage Client.
Administrator accounts control administrator-level access. Users and groups control client-level access
to SMB shares and NFS exports.
The FluidFS cluster supports administrator-level and client-level authentication for both local and remote
users and groups:
• Local users and groups: User and group identities defined and managed on and by the FluidFS
system. Local management is useful when you have only a limited number of users and groups. In
addition, authentication does not depend on external servers.
• External users and groups: User and group identities defined and managed on and by an external
repository. External management is useful when managing access of many users and groups to many
different resources, but depends on the availability of the external database. FluidFS supports the
following external identity repositories:
– Active Directory: Configure the FluidFS cluster to access an Active Directory database to
authenticate Windows users.
NOTE: Active Directory can also be used as an LDAP database for UNIX/Linux users.
– NIS or LDAP: Configure the FluidFS cluster to access an NIS or LDAP database to authenticate
UNIX and Linux users.
NOTE: If you configure Active Directory and either NIS or LDAP, you can set up mappings
between the Windows users in Active Directory and the UNIX and Linux users in LDAP or NIS to
allow one set of credentials to be used for both types of data access.
Administrator Account
The Administrator account is used for FluidFS cluster management and provides access to the Dell
Storage Client and the FluidFS CLI. This account cannot be removed or renamed, and has write
permissions on all NAS volumes, folders, and files.
Support Account
The support account is used by Dell Technical Support when accessing the FluidFS system. The support
account and password are managed by the system administrator.
CAUTION: Operations performed as the support user are for advanced remote troubleshooting to
resolve critical system issues only. Misuse of this account can damage the FluidFS cluster and/or
its data.
NOTE: For strict security, enable the support account just before a remote troubleshooting session
and disable it immediately after the troubleshooting session.
CLI Account
The cli account is used in conjunction with an administrator account to access the command-line
interface of the FluidFS cluster.
Related Links
Connect to the FluidFS Cluster CLI Using a VGA Console
• NAS Cluster Administrator: The administrator can manage any aspect of the FluidFS cluster.
• NAS Volume Administrator: The following table summarizes which settings a volume administrator
can change for the NAS volumes to which they are assigned. They can also view, but not change, the
rest of the FluidFS cluster configuration.
View Administrators
View the current list of administrator accounts.
Add an Administrator
Add an administrator account to manage the FluidFS cluster using the Dell Storage Client and CLI. You
can only define other administrators with permission levels that are hierarchically lower than your own.
Prerequisites
Before you can create a local administrator, you must create a local user that will become an
administrator.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab, and select Maintenance.
3. In the right pane, click the Mail & Administrators tab.
4. In the Administrators section, click Create Administrator User. The Create Administrator User
dialog box appears.
5. Select a user to become an administrator:
a. Click Select User. The Select User dialog box appears.
b. From the Domain drop-down menu, select the domain to which the user belongs.
c. In the User field, type either the full name of the user or the beginning of the user name.
d. (Optional) Configure the remaining user search options as needed. These options are described
in the online help.
To change the maximum number of search results to return, select the maximum number of
search results from the Max Results drop-down menu.
e. Click Search.
f. Select a user from the search results.
g. Click OK.
6. From the Privilege drop-down menu, select the permission level of the administrator:
• FluidFS Cluster Administrator: These administrators can manage any aspect of the FluidFS
cluster.
Delete an Administrator
Delete an administrator account when it is no longer used for FluidFS cluster management. The built-in
Administrator account cannot be deleted.
When prompted to authenticate to access an SMB share, local users must use the following format for
the user name: <client_VIP_or_name>\<local_user_name>.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab and expand Environment, and then select Authentication.
3. In the right pane, click the Local Users and Groups tab and click Create Local User. The Create
Local User dialog box appears.
4. In the Username field, type a name for the local user. The user name can contain only the following
characters: letters, numbers, underscores, hyphens, spaces, and periods. Also, a period cannot be
used as the last character.
5. From the Primary Local Group drop-down menu, select the primary group to which the local user is
assigned.
6. In the Password field, type a password for the local user. If password complexity checking is enabled,
the password must be at least seven characters long and contain three of the following elements: a
lowercase character, an uppercase character, a digit, or a special character (such as +, ?, or ∗).
7. In the Confirm Password field, retype the password for the local user.
8. (Optional) Configure the remaining local user attributes as needed. These options are described in
the online help.
• To enable the local user, select the Enabled check box.
• To add or remove secondary groups for the local user, use the Add and Remove buttons.
9. Click OK.
When password complexity checking is enabled, passwords for local users must be at least seven
characters long and contain three of the following elements: a lowercase character, an uppercase
character, a digit, or a special character (such as +, ?, or *).
8. Click OK.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab, expand Environment and select Authentication.
3. In the right pane, click the Local Users and Groups tab.
4. Select a group and click Delete. The Delete dialog box appears.
5. Click OK.
* An Organizational Unit (OU) admin that has been delegated the "join a computer to the
domain" privilege, as well as being delegated full control over objects within that OU, including
computer objects.
* Before joining the FluidFS cluster to the domain, a computer object must be created by the OU
admin for the FluidFS cluster; privileges to administer are provided in the OU. The FluidFS
cluster computer object name, and the NetBIOS name used when joining it, must match.
When creating the FluidFS cluster computer object, in the User or Group field under
permissions to join it to the domain, select the OU admin account. Then, the FluidFS cluster
can be joined using the OU admin credentials.
• FluidFS clusters need read access for the tokenGroups attribute for all users. The default
configuration of Active Directory for all domain computers is to allow read access to the
tokenGroups attribute. If the permission is not given, Active Directory domain users that are in nested
groups or OUs encounter Access Denied errors, and users that are not in nested OUs or groups are
permitted access.
• The Active Directory server and the FluidFS cluster must use a common source of time.
• You must configure the FluidFS cluster to use DNS. The DNS servers you specify must be the same
DNS servers that your Active Directory domain controllers use.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab, expand Environment and select Authentication.
3. In the right pane, click the Directory Services tab.
4. Click Configure External User Database. The Edit External User Database dialog box appears.
5. Click Join Domain. The Join Domain dialog box appears. If you have already joined Active Directory,
the Join operation is hidden. You must leave the domain to see the option to join.
6. In the Domain field, type a domain to join the FluidFS cluster to.
7. In the Username field, type an Active Directory account name.
8. In the Password field, type the Active Directory account password.
9. Click OK.
Related Links
Managing the System Time
Managing DNS Servers and Suffixes
Related Links
Enable Active Directory Authentication
Managing LDAP
In environments that use Lightweight Directory Access Protocol (LDAP), you can configure the FluidFS
cluster to authenticate UNIX and Linux clients using LDAP for access to NFS exports. The LDAP database
can be provided by either an LDAP server or Active Directory.
The FluidFS clusters supports the following LDAP configurations:
• Anonymous LDAP: The connection from the FluidFS cluster to the LDAP servers is not authenticated.
The data is sent in plain text.
• Authenticated LDAP: The connection from the FluidFS cluster to the LDAP servers is authenticated
using a user name and password. The data is sent in plain text.
• LDAP over TLS/SSL: The connection from the FluidFS cluster to the LDAP servers is authenticated and
encrypted. To validate the certificate used by the LDAP server, you must export the SSL certificate
from the LDAP server and upload it to the FluidFS cluster.
Managing NIS
In environments that use Network Information Service (NIS), you can configure the FluidFS cluster to
authenticate clients using NIS for access to NFS exports.
• Automatic mapping: Automatically map all Windows users in Active Directory to the identical UNIX/
Linux users in LDAP or NIS, and map all UNIX/Linux users to the identical Windows users. Automatic
mapping is disabled by default.
• Mapping rules: Define mappings between specific Windows users in Active Directory and the identical
UNIX/Linux users in LDAP or NIS. These specific mapping rules take precedence over automatic
mapping. You can select the direction of the mapping, which can go in one direction or both.
• NTFS security style: Permissions are controlled by Windows and NTFS. The UNIX/Linux user will
adhere to the permissions of the corresponding Windows user, regardless of the UNIX/Linux
permission settings.
• UNIX security style: Permissions are based on the UNIX/Linux permissions. The Windows user will
adhere to the permissions of the corresponding UNIX/Linux user.
• Mixed security style: Both UNIX/Linux and Windows permissions are used. Each user can override the
other user's permission settings; therefore, be careful when using the Mixed security style.
The usable size of the NAS pool depends on how much space the system deducts from the NAS pool for
internal use. On average, the system deducts approximately 400 GB per NAS appliance for internal use.
The exact amount of internal space varies by configuration, but it is roughly calculated as follows per
FluidFS cluster:
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the Summary tab.
3. In the right pane, click Actions → Storage Centers → Expand NAS Pool. The Expand NAS Pool dialog
box appears.
4. In the NAS Pool Size field, type a new size for the NAS pool in gigabytes (GB) or terabytes (TB).
NOTE: The new size is bound by the size displayed in the Minimum New Size field and the
Maximum New Size field.
5. Click OK. If the container has more than one storage type, a drop-down menu will appear.
6. From the Storage Type drop-down menu, select the type of storage pool, which includes a single
data page size and a specified redundancy level.
7. Click OK. The progress of the expand NAS pool process is displayed in the Expand NAS Pool dialog
box.
Related Links
Viewing the Status of Background Processes
NAS volume availability depends on the availability of the Storage Centers. If a Storage Center is offline,
storage center LUNs will not be available for the FluidFS cluster, and access to the shares and/or exports
will be lost. Correct the Storage Center problem to resume service.
• UNIX: Controls file access using UNIX permissions. A client can change permissions only by using the
chmod and chown commands on the NFS mount point.
• NTFS: Controls file access by Windows permissions. A client can change the permission and
ownership using Windows (File Properties → Security tab).
• Mixed: Supports both NTFS and UNIX security styles. If you choose this option, the default security of
a file or directory is the last one set. Permissions and access rights from one method to another are
automatically translated. (For example, if a Windows administrator sets up file access permissions on a
file through an SMB share, a Linux user can access the file system through NFS and change all the file
permissions.) Therefore, this option is not recommended in production environments, except where
you are not concerned about file access security and just need some NAS volume space to store files
temporarily.
Both NTFS and UNIX security styles allow multi-protocol file access. The security style only determines
the method of storing and managing the file access permissions information within the NAS volume.
If you need to access the same set of files from both Windows and UNIX or Linux, the best way to
implement multi-protocol access is by setting up individual user mapping rules or by enabling automatic
Modifying the file security style of a NAS volume affects only those files and directories created after the
modification.
Thick provisioning allows you to allocate storage space on the Storage Centers statically to a NAS volume
(no other volumes can take the space). Thick provisioning is appropriate if your environment requires
guaranteed space for a NAS volume.
• General requirements
An average read/write mix is 20/80. An average hourly change rate for existing data is less than 1%.
Example 1
Create NAS volumes based on departments. The administrator breaks up storage and management into
functional groups. In this example, the departmental requirements are different and support the design to
create NAS volumes along department lines.
• Advantages:
– The NAS volumes are easier to manage because they are set up logically.
– The NAS volumes are created to match the exact needs of the department.
• Disadvantage: The NAS volumes become harder to manage if the number of departments in the
organization increases.
Example 2
Group departments that have similar security requirements into NAS volumes. The administrator creates
three NAS volumes: one for UNIX, one for NTFS, and another for mixed.
• Advantage: The NAS volumes work separately between Windows and Linux.
• Disadvantage: Unwanted services could be provided to certain departments. For example, when the
SMB volume is backed up weekly for the administration and finance departments, the press and
marketing departments also get backups even though they do not require it.
• Advantage: The NAS volumes are created to match the exact needs for each feature.
• Disadvantage: User mapping is required. A user needs to choose one security style, either NTFS or
UNIX, and then, based on the security style chosen, the correct mapping for other users is set.
Term Description
Size Maximum size of a NAS volume defined by the storage administrator.
Used space Storage space occupied by writes to the NAS volume (user data and
snapshots).
Reserved space A portion of a thin-provisioned NAS volume that is dedicated to the NAS
volume (no other volumes can take the space). The amount of reserved space
is specified by the storage administrator. Reserved space is used before
unreserved space.
Unreserved space A portion of a thin-provisioned NAS volume that is not reserved (other volumes
can take the space). The amount of unreserved space for a NAS volume is:
(NAS volume size) – (NAS volume reserved space).
Unused space Storage space that is physically currently available for the NAS volume. The
amount of available space for a NAS volume is: (unused NAS volume reserved
space) + (NAS volume unreserved space.
Overcommitted space Storage space allotted to a thin-provisioned volume over and above the
actually available physical capacity of the NAS pool. The amount of
overcommitted space for a NAS volume is: (Total volume space) – (NAS pool
capacity).
With thin provisioning, storage space is consumed only when data is physically
written to the NAS volume, not when the NAS volume is initially allocated.
More storage space can be allocated to the NAS volumes than has been
allocated in the NAS pool itself.
1. Configure the NAS volumes to write data to the lowest tier defined in the configured Storage Profile.
a. Click the Storage view and select a FluidFS cluster.
b. Click the Summary tab.
c. In the right pane, click Edit FluidFS Cluster Settings. The Edit FluidFS Cluster Settings dialog box
appears.
d. Click the SC Storage Profile tab.
e. Select the Import to Lowest Tier check box.
f. Click OK.
2. Migrate the data from the existing NAS product to the FluidFS cluster.
3. Configure the NAS volumes to resume normal operation and write data according to the configured
Storage Profile.
a. Click the Storage view and select a FluidFS cluster.
b. Click the Summary tab.
c. In the right pane, click Edit FluidFS Cluster Settings. The Edit FluidFS Cluster Settings dialog box
appears.
– Enter a Network ID in the Allow Access Only to Users Coming from These Client Networks
box, and click Add
7. Click OK.
NOTE: Snapshot files and folders will continue to be accessible by backup operators and local
administrators even if Restrict Snapshot Access is enabled.
SCSI Unmap
When SCSI Unmap is enabled, deleted pages are returned to the storage pool as block or file storage.
NOTE: Snapshot space is not available for NAS volumes with files processed by data reduction.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab, expand NAS Volumes and select a NAS volume.
3. In the right pane, click Delete. The Delete dialog box appears.
4. Click OK.
• Has the same size as its base volume, is thin-provisioned, and its reserved space is 0 (and therefore it
consumes no space)
• Quota usage is copied from the base snapshot of the base volume
• Quota rules have the default definitions (as with a new NAS volume). Directory quotas have the same
definitions as the base volume at the time of the snapshot.
• Has the same permissions on folders including the root directory as the base volume
• Has the same security style and access time granularity definitions as the base volume
• No SMB shares, NFS exports, or snapshot schedules are defined
• You cannot create a clone NAS volume of a clone NAS volume (nested clones) unless a clone NAS
volume is replicated to another FluidFS cluster and then cloned.
• You cannot delete a base volume until all of its clone NAS volumes have been deleted.
• A snapshot cannot be deleted as long as clone NAS volumes are based on it.
• Restoring to an older snapshot fails if it would result in a base snapshot getting deleted.
• You can replicate a clone NAS volume only after the base volume is replicated. If the base snapshot in
the base volume is removed, and a clone NAS volume exists on the replication target FluidFS cluster,
replication between NAS volumes will stop. To resume replication, the cloned NAS volume on the
target FluidFS cluster must be deleted.
• You cannot create a clone NAS volume from a replication source NAS volume snapshot (a snapshot
with a name starting with rep_) or NDMP snapshot. However, you can create a clone NAS volume of a
replication target NAS volume.
• Prior to creating a clone NAS volume, data reduction and the snapshot space consumption threshold
alert must be disabled on the base volume (previously deduplicated data is allowed).
• Data reduction cannot be enabled on a clone NAS volume.
• After a NAS volume is cloned, data reduction cannot be reenabled until all clone NAS volumes have
been deleted.
• A clone NAS volume contains user and group recovery information, but not the NAS volume
configuration.
• Clone NAS volumes count toward the total number of NAS volumes in the FluidFS cluster.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab, expand NAS Volumes and select a NAS volume.
3. In the right pane, click the Snapshots & Clones tab and select a snapshot.
4. Click Create NAS Volume Clone. The Create NAS Volume Clone dialog box appears.
5. In the Name field, type a name for the NAS volume clone.
6. In the Folder pane, select a parent folder for the NAS volume clone.
7. Click OK.
To assign other users access to an SMB share, you must log in to the SMB share using one of the these
administrator accounts and set access permissions and ownership of the SMB share.
Share-Level Permissions
The default share-level permissions (SLP) for a new share is full control for authenticated users. This
control can be modified either:
– To drill down to a particular folder and view the subfolders, double-click the folder name.
– To view the parent folders of a particular folder, click Up.
• To enter a new directory to share, type the path to the directory to create in the Path field and
select the Create Folder If It Does Not Exist check box.
• To browse existing directories and create a new directory to share:
Click Select Folder. The Select Folder dialog box appears and displays the top-level folders for
the NAS volume. Navigate to the folder in which to create the new folder and click Create Folder.
– To drill down to a particular folder and view the subfolders, double-click the folder name.
– To view the parent folders of a particular folder, click Up.
7. (Optional) Configure the remaining SMB share attributes as needed. These options are described in
the online help.
• Type descriptive text for the benefit of administrators in the Notes field. This text is not displayed
to SMB clients.
• To prevent clients without permissions for the SMB share from being able to view the SMB share
and its folders and files, select the Access Based Enumeration check box.
8. Click OK.
Click Select Folder. The Select Folder dialog box appears and displays the top-level folders
for the NAS volume. Locate and select the folder, and click OK.
– To drill down to a particular folder and view the subfolders, double-click the folder name.
– To view the parent folders of a particular folder, click Up.
• To browse existing directories and create a new folder:
Click Select Folder. The Select Folder dialog box appears and displays the top-level folders
for the NAS volume. Navigate to the folder in which to create the new folder and click Create
Folder. The Create Folder dialog box appears. In the Folder Name field, type a name for the
folder, then click OK to close the Create Folder dialog box. Select the new folder and click
OK.
– To drill down to a particular folder and view the subfolders, double-click the folder name.
– To view the parent folders of a particular folder, click Up.
h. From the Folder template drop-down menu, select the form that the user’s folders should take:
• Select /Domain/User if you want the user’s folders to take the form: <initial_path>/
<domain>/<username>.
• Select /User if you want the user’s folders to take the form: <initial_path>/<username>.
i. (Optional) Configure the remaining SMB home shares attributes as needed. These options are
described in the online help.
• To prevent clients without permissions for an SMB home share from being able to view the
SMB home share and its folders and files, click the Content tab and select the Access Based
Enumeration check box.
• Use an Active Directory domain account that has its primary group set as the Domain Admins group.
• Use the FluidFS cluster Administrator account (used if not joined to Active Directory or Domain Admin
credentials are not available).
Change the Owner of an SMB Share Using an Active Directory Domain Account
The Active Directory domain account must have its primary group set as the Domain Admins group to
change the owner of an SMB share. These steps might vary slightly depending on which version of
Windows you are using.
1. Open Windows Explorer and in the address bar type: \\<client_VIP_or_name>. A list of all SMB
shares is displayed.
2. Right-click the required SMB share (folder) and select Properties. The Properties dialog box appears.
3. Click the Security tab and then click Advanced. The Advanced Security Settings dialog box appears.
4. Click the Owner tab and then click Edit. The Advanced Security Settings dialog box appears.
5. Click Other users or groups. The Select User or Group dialog box appears.
6. Select the domain admin user account that is used to set ACLs for this SMB share or select the
Domain Admins group. Click OK.
7. Ensure that Replace owner on subcontainers and objects is selected and click OK.
8. Click the Permissions tab and follow Microsoft’s best practices to assign ACL permissions for users
and groups to the SMB share.
A Windows administrator should follow the best practices defined by Microsoft for ACLs and SLPs.
NOTE:
• Do not attempt to create an SMB share using MMC. Use MMC only to set SLPs.
NOTE: Actual data-access checks in FluidFS are still made against the original security ACLs.
This feature applies only to NAS volumes with Windows or mixed security style (for files with Windows
ACLs).
• If the FluidFS cluster that you are trying to manage is joined to an Active Directory, log in to the
management station with <domain>\Administrator.
• Before using MMC, connect to the FluidFS cluster by using the client VIP address in the address bar of
Windows Explorer. Log in with the administrator account and then connect to MMC.
NOTE: You might need to reset the local administrator password first.
Steps
1. Select Start → Run.
2. Type mmc and click OK. The Console 1 - [Console Root] window opens.
3. Select File → Add/Remove Snap-in.
4. Select Shared Folders and click Add.
5. In the Shared Folders window, select Another computer and type the FluidFS cluster name (as
configured in the DNS). Alternatively, you can use a client VIP.
6. Click Finish. The new shares tree is displayed in the Console Root window.
7. Right-click the required SMB share, and choose Properties.
8. In the Share Properties window, click the Share Permission tab to set SLPs.
1. From the Start menu, select Run. The Run window opens.
2. Type the path to the SMB share to which you want to connect:
\\<client_VIP_or_name>\<SMB_share_name>
3. Click OK.
1. Open Windows Explorer and choose Tools → Map Network Drive. The Map Network Drive dialog
box appears.
2. From the Drive drop-down list, select any available drive.
3. Type the path to the SMB share to which you want to connect in the Folder field or browse to the
SMB share:
\\<client_VIP_or_name>\<SMB_share_name>
4. Click Finish.
1. From the Start menu, select Computer. The Computer window is displayed.
2. Click Network.
3. Locate the NAS appliance and double-click it.
4. From the SMB shares list, select the SMB share to which you want to connect.
Branch Cache
Branch cache, when properly configured in both the client computers and the FluidFS, significantly
improves performance for consecutive reads from different clients on the same network of large file over
WAN. To optimize WAN bandwidth when users access content on remote servers, branch cache reads
content from the main office and caches the content at branch office locations, allowing client
computers at branch offices to retrieve the data locally. When branch cache is configured, Windows
branch cache clients first retrieve content from the storage system and then cache the content on a
computer within the branch office. If another branch-cache-enabled client in the branch office requests
the same content, the storage system first authenticates and authorizes the requesting user. The storage
system then determines whether the cached content is still up-to-date and, if it is, sends the client
metadata about the cached content. The client then uses the metadata to retrieve content directly from
the local host of the cache, if such data exists locally.
Branch Cache Limitations
• FluidFs will not calculate hash for files smaller than 64KB, or larger than 256MB.
• The hash calculation will not be performed on read-only / full / replication destination volume.
• Branch Cache V2 segment will be a fixed size of TBD.
– To drill down to a particular folder and view the subfolders, double-click the folder name.
– To view the parent folders of a particular folder, click Up.
• To view a new directory to share, type the path to the directory to create in the Folder Path field
and select the Create Folder If It Does Not Exist check box.
• To browse existing directories and create a new directory to share:
– To drill down to a particular folder and view the subfolders, double-click the folder name.
– To view the parent folders of a particular folder, click Up.
7. (Optional) Configure the remaining NFS export attributes as needed. These options are described in
the online help.
• Type descriptive text for the benefit of administrators in the Notes field. This text is not displayed
to NFS clients.
• To change the client access settings for the NFS export, use the Add, Remove, and Edit buttons.
8. Click OK.
– To drill down to a particular folder and view the subfolders, double-click the folder name.
– To view the parent folders of a particular folder, click Up.
• To browse existing directories and create a new directory to share:
Click Select Folder. The Select Folder dialog box appears and displays the top-level folders for
the NAS volume. Navigate to the folder in which to create the new folder and click Create Folder.
The Create Folder dialog box appears. In the Folder Name field, type a name for the folder, then
click OK to close the Create Folder dialog box. Select the new folder and click OK.
– To drill down to a particular folder and view the subfolders, double-click the folder name.
– To view the parent folders of a particular folder, click Up.
6. Click OK.
To mount an NFS export folder, from a shell on a client system, use the su command to log in as root
and run the following command:
# mount <options> <client_VIP_or_name>:/<volume_name>/<exported_folder>
<local_folder>
To mount an NFS export folder and force the use of NFS v4, from a shell on a client system, use the
su command to log in as root and run the following command:
# mount —t nfs4 <client_VIP_or_name>:/<volume_name>/<exported_folder>
<local_folder>
To mount an NFS export folder and force the use of NFS v3, from a shell on a client system, use the
su command to log in as root and run the following command:
# mount —o nfsvers=3,rsize=32768,wsize=32768 <client_VIP_or_name>:/
<volume_name>/<exported_folder> <local_folder>
Access an NFS Export With UNIX or Linux That Does Not Use TCP by Default
Mount an NFS export folder with a UNIX or Linux client that does not use TCP. Older versions of UNIX
and Linux do not use TCP by default.
To mount an NFS export folder, from a shell on a client system, use the su command to log in as root
and run the following command:
Global Namespace
Global namespace is a virtual view of shared folders in an organization. This feature allows the
Administrator to provide a single point of access for data that is hosted on two or more separate servers.
Global namespace is enabled by default, and can be configured using the CLI. See the Dell FluidFS
Version 5.0 FS8600 Appliance CLI Reference Guide for detailed information about global namespace
commands.
Additional Documentation
For more information about configuring namespace aggregation, see:
• http://en.community.dell.com/techcenter/extras/m/white_papers/20442194
• http://en.community.dell.com/techcenter/extras/m/white_papers/20442085
Using FTP
File Transfer Protocol (FTP) is used to exchange files between computer accounts, transfer files between
an account and a desktop computer, or to access online software archives. FTP is disabled by default.
Administrators can enable or disable FTP support, and specify the landing directory (volume, path) on a
per-system basis.
FTP user access to a file is defined by file permissions. FTP anonymous users are treated as nobody.
Access permission is denied or granted, depending on the file’s ACLs or UNIX access mode. FTP access
FTP Limitations
• The number of concurrent FTP sessions is limited to 800 sessions per NAS Appliance.
• Idle FTP connections time out and close after 900 seconds (15 minutes).
• The FTP client does not follow symbolic links, NFS referrals, or SMB wide-links.
• FTP changes in directory structure (create new file, delete, rename) trigger SMB change notifications.
• FTP access triggers file-access notification events (the File Access Notification feature).
• FTP presents the underlying file system as case sensitive.
• File-name limitations:
– File names are case sensitive.
– File names cannot be longer than 255 characters.
– Names containing any of the following characters are not allowed:
* . and ..
* @Internal&Volume!%File
– Names that have a suffix of four, or multiple of three, characters between two ~ signs. For
example, ~1234~ and ~123123~ are not allowed.
File Access
Symbolic links are enabled by default. You cannot configure symbolic links in FluidFS, but you can access
them using the following Microsoft tools:
• mklink – basic utility used to create both symbolic and hard links (hard links are not supported over
SMB, but locally only).
• fsutil – file system utility that enables working with reparse points and modifying symbolic links policy.
Quota Types
The following quota types are available:
• Specific user quota: This quota applies only to the user. Example: A user named Karla is given a 10
GB quota.
• Each user in a specific group: This quota applies to each user that belongs to the group. Example:
Three users named Karla, Tim, and Jane belong to the Administrators group. Each user in this
group is given a 10 GB quota.
• Quota for an entire group: This quota applies to all users in the group collectively. Example: Three
users named Karla, Tim, and Jane belong to the Administrators group. This group is collectively
given a 10 GB quota, so the total combined space used by the three users cannot exceed 10 GB. If, for
example Karla uses 7 GB, and Tim uses 2 GB, Jane can use only 1 GB.
Change the Soft Quota or Hard Quota Limit for a User or Group Quota Rule
Change the soft quota or hard quota limit of a user or group quota rule.
Enable or Disable the Soft Quota or Hard Quota Limit for a User or Group Quota Rule
Enable or disable the soft quota or hard quota limit of a user or group quota rule.
Edit the Soft Quota or Hard Quota Settings for a Quota Directory
Administrators can enable or disable the hard and soft quota limits as well as change the quota values for
a quota directory.
• Data deduplication: Uses algorithms to eliminate redundant data, leaving only one copy of the data
to be stored. The FluidFS cluster uses variable-size block level deduplication as opposed to file level
deduplication or fixed-size block level deduplication.
• Data compression: Uses algorithms to reduce the size of stored data.
Data reduction also provides space savings for snapshots taken after files have been reduced. The
minimum file size to be considered for data reduction processing is 64 KB. Data reduction is applied per
NAS controller, that is, the same chunks of data that are owned by the different NAS controllers are not
considered duplicates.
Because quotas are based on logical rather than physical space consumption, data reduction does not
affect quota calculations.
If you disable data reduction, data remains in its reduced state during subsequent read operations by
default. You have the option to enable rehydrate-on-read when disabling data reduction, which causes a
rehydration (the reversal of data reduction) of data on subsequent read operations. You cannot rehydrate
an entire NAS volume in the background, although you could accomplish this task by reading the entire
NAS volume.
For more information about enabling and disabling archive mode, see the Dell FluidFS Version 5.0
FS8600 Appliance CLI Reference Guide.
• Data reduction processing has a 5-20% impact on the performance of read operations on reduced
data. It does not have any impact on write operations or read operations on normal data.
• Storage Center data progression is impacted. After data reduction processing, the Storage
Centermigrate reduced data up to Tier 1 disks.
• Increased internal traffic during data reduction processing.
• Data is rehydrated for antivirus scanning.
• Data is rehydrated before being replicated to a target NAS volume. If replication is already configured,
the data being reduced was already replicated
• You cannot enable data reduction on a clone NAS volume.
• Data reduction stops automatically when a NAS volume has less than 5 GB of unused space.
Therefore, a NAS volume resize can inadvertently stop data reduction.
Managing Antivirus
The FluidFS cluster antivirus service provides real-time antivirus scanning of files stored in SMB shares.
The antivirus service applies only to SMB shares; NFS is not supported. The scan operation is transparent
to the client, subject to the availability of an antivirus server.
Files are scanned when a client tries to read or execute the file.
When an SMB share client requests a file from the FluidFS cluster, the cluster passes the file to an antivirus
server for scanning and then takes one of the following actions:
• If the file is virus-free, the FluidFS cluster permits client access. The FluidFS cluster does not scan that
file again, providing it remains unmodified since the last check.
• If the file is infected, the FluidFS cluster denies client access. The client does not know that the file is
infected. Therefore:
– A file access returns a system-specific file not found state for a missing file, depending on
the client's computer.
– An access denial might be interpreted as a file permissions problem.
Only storage administrators can recover an uninfected version of the file, or access and process the
infected file. To gain access to an infected file, you must connect to the SMB share through another SMB
share on which the antivirus service is disabled. Otherwise, the FluidFS cluster recognizes the file as
infected, and denies access. You can also access the file through an NFS export, because NFS does not
support antivirus scanning.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab.
3. In the File System tab navigation pane, select Data Protection.
4. In the right pane, click the AntiVirus tab.
5. Click Add AntiVirus Scanner. The Add AntiVirus Scanner dialog box appears.
6. In the Name field, type the host name or IP address of the antivirus server.
7. In the Port field, type the port that the FluidFS cluster uses to connect to the antivirus server. The
default port number is 1344.
8. Click OK.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab.
3. In the File System tab navigation pane, select Data Protection.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab.
3. In the File System tab navigation pane, select SMB Shares.
4. In the right pane, select an SMB share and click Edit Settings. The Edit SMB Share Settings dialog
box appears.
5. In the Edit SMB Share Settings navigation pane, select AntiVirus Scanners.
6. Enable or disable Virus Scan:
• To enable Virus Scan, select the Enabled checkbox.
• To disable Virus Scan, clear the Enabled checkbox.
7. (Optional) If you are enabling Virus Scan, configure the remaining anti-virus scanning attributes as
needed. These options are described in the online help.
• To exempt directories from antivirus scanning, select the Folders Filtering check box and specify
the directories in the Directories excluded from scan list.
• To exempt file extensions from antivirus scanning, select the File Extension Filtering check box
and specify the extensions in the Extensions excluded from scan list.
• To change the maximum size of files that are included in antivirus scanning, type a size in the Do
not scan files larger than field in megabytes (MB), gigabytes (GB), terabytes (TB), or petabytes
(PB).
• To deny access to files larger than the specified anti-virus scanning file size threshold, select the
Deny access to unscanned files check box.
8. Click OK.
Change the Antivirus Scanning File Size Threshold for an SMB Share
Change the maximum size of files that are included in antivirus scanning for an SMB share.
– To drill down into a particular folder and view the subfolders, double-click the folder name.
– To view the parent folders of a particular folder, click Up.
• To type a directory to exempt from antivirus scanning, type a directory (for example, /folder/
subfolder) in the Folders text field, and then click Add.
• To remove a directory from the antivirus scanning exemption list, select a directory and click
Remove.
10. Click OK.
• Extensions excluded from scan: Specifies file extensions (file types) to exclude from scanning, such as
docx.
• Directories excluded from scan: Specifies directory paths to exclude from scanning, such as /tmp/
logs (alternatively, folders and sub-folders).
Managing Snapshots
Snapshots are read-only, point-in-time copies of NAS volume data. Storage administrators can restore a
NAS volume from a snapshot if needed. In addition, clients can easily retrieve files in a snapshot, without
storage administrator intervention.
Snapshots use a redirect-on-write method to track NAS volume changes. That is, snapshots are based on
a change set. When the first snapshot of a NAS volume is created, all snapshots created after the baseline
snapshot contain changes from the previous snapshot.
Various policies can be set for creating a snapshot, including when a snapshot is to be taken and how
long to keep snapshots. For example, mission-critical files with high churn rates might need to be backed
up every 30 minutes, whereas archival shares might only need to be backed up daily.
If you configure a NAS volume to use VM-consistent snapshots, each snapshot creation operation such
as scheduled, manual, replication, or NDMP automatically creates a snapshot on the VMware server. This
feature enables you to restore the VMs to the state they were in before the NAS volume snapshot was
taken.
Because snapshots consume space on the NAS volume, ensure that you monitor available capacity on
the NAS volume and schedule and retain snapshots in a manner that ensures that the NAS volume always
has sufficient free space available for both user data and snapshots. Also, to be informed when snapshots
are consuming significant NAS volume space, enable a snapshot consumption alert.
The FluidFS cluster automatically deletes one or more snapshots for a NAS volume in the following cases:
• If you delete a NAS volume, the FluidFS cluster deletes all of the snapshots for the NAS volume.
• If you restore a NAS volume from a snapshot, the FluidFS cluster deletes all the snapshots created
after the snapshot from which you restored the NAS volume.
Storage Manager has a Retain Each Snapshot for checkbox. When enabled, you can specify a value
for minutes, hours, days, or weeks.
10. Click OK.
Rename a Snapshot
Rename a snapshot.
Delete a Snapshot
Delete a snapshot if you no longer need the point-in-time copy of the data.
• Restore individual files: After a snapshot is created, the FluidFS cluster creates a client-accessible
snapshots directory containing a copy of the files included in the snapshot. Clients can easily restore
individual files from a snapshot using copy and paste, without storage administrator intervention. This
method is useful for the day-to-day restore activities of individual files.
• Restore a NAS volume from a snapshot: The storage administrator can restore an entire NAS volume
by rolling the state back to the time of an existing snapshot. This method is useful in the case of an
application error or virus attacks.
Snapshots retain the same security style as the active file system. Therefore, even when using snapshots,
clients can access only their own files based on existing permissions. The data available when accessing a
specific snapshot is at the level of the specific share and its subdirectories, ensuring that users cannot
access other parts of the file system.
• The FluidFS cluster deletes any snapshots created after the snapshot from which you restored the
NAS volume. Snapshots created before the snapshot from which you restored the NAS volume are
not affected.
• Current SMB clients of the NAS volume are automatically disconnected.
• Current NFS clients of the NAS volume receive stale NFS file handle error messages. You must
unmount and then remount the NFS exports.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab.
3. In the File System tab navigation pane, expand NAS Volumes and select a NAS volume.
4. In the right pane, click the Snapshots & Clones tab.
5. Select a snapshot and click Restore NAS Volume. The Restore NAS Volume dialog box appears.
6. Click OK.
1. Right-click the file, select Properties, and then click the Previous Versions tab. A list containing
available previous versions of the file is displayed.
2. Click the version to restore, and then click Restore.
Managing NDMP
The FluidFS cluster supports Network Data Management Protocol (NDMP), which is an open standard
protocol that facilitates backup operations for network attached storage, including FluidFS cluster NAS
volumes. NDMP should be used for longer-term data protection, such as weekly backups with long
retention periods.
The FluidFS cluster supports remote and three-way backup architecture implementations, wherein a
supported, external Data Management Application (DMA) server mediates the data transfer between the
FluidFS cluster and the storage device. The FluidFS cluster supports full, differential, and incremental
NDMP Level Based Backup (levels 0-9), Full, Incremental/Differential Token Based Backup, and Direct
Access Recovery (DAR). The FluidFS cluster supports NDMP versions 2, 3, and 4 (default mode).
The FluidFS cluster includes an NDMP server that is responsible for the following operations:
• Processing all NDMP backup and restore requests sent from DMA servers
• Sending all NDMP replies and notification messages to DMA servers
• Transferring data over the network to or from remote NDMP tape or data servers
The NDMP server handles all communications with the DMA servers and other NDMP devices through an
XDR encoded TCP (Transmission Control Protocol) data stream.
The backup type is controlled by the NDMP environment variable TYPE. Both backup types support the
same functionalities, but the tar backup type might be able to process the information more efficiently
for certain DMA servers.
Incremental Backups
Each time a backup is performed, the NDMP server stores the timestamp for the backup. When the
NDMP server performs an incremental backup, it uses the timestamp stored for the previous full or
incremental backup to determine if a directory or file needs to be included.
• dump: Each directory visited will be backed up and a file history entry will be generated. It does not
matter whether the directory has changed.
• tar: Backs up and generates a file history entry only for the directories that have changed.
Therefore, the amount of data backed up using a tar backup will be less than that of a dump backup. The
size difference depends on the number of directories in the backup data set.
NOTE: iSCSI solutions do not support the direct attach NDMP feature.
NOTE: If a controller loses the connectivity to the tape, the NDMP session assigned to the controller
will fail.
This mode of backup could create a problem in the case of a selective restore when the selected files or
directories to be restored contain hard link files that are not the first instance encountered during backup.
In this case, the restore fails and an NDMP message is sent to the DMA server indicating the first instance
of the file that should also be included in the selective restore.
To work around this problem, change the behavior during backup. If a backup is started with the
DEREF_HARD_LINK environment variable set to Y, the backup will back up all instances of the hard link
files as if they were regular files, rather than just backing up the first instance of the hard link files. In this
case, a selective restore will always have the file data. The disadvantage of this option is that backups
might take longer and more space is required to back up a data set with hard link files.
The following steps are involved in backing up NAS volume data using NDMP.
NOTE: NDMP does not provide high availability (HA). If a backup session is interrupted due to
connection loss, the session is terminated.
NOTE: Manually deleting the temporary snapshot for the current backup session is not allowed and
will immediately terminate the session.
NOTE: If a backup session is terminated with an error, the temporary snapshot might be left in
place, and the system will delete the snapshot automatically.
Steps
1. The DMA server creates a connection to the FluidFS cluster IP address.
2. The NDMP server on the FluidFS cluster creates a temporary snapshot of each NAS volume that the
DMA server designated for backup. Alternatively, when performing a backup of replication target NAS
volumes, the FluidFS cluster does not create a dedicated NDMP snapshot. Instead, it uses the base
replica snapshot from the last successful replication.
Temporary NDMP snapshots are named using the following format:
ndmp_backup_<session_ID>_<controller_number>
3. The NDMP server copies the NAS volume data to the DMA server.
4. After receiving the data, the DMA server moves the data to a storage device, such as a local disk or
tape device.
5. After the backup completes, the NDMP server deletes the temporary snapshots.
FILESYSTEM Specifies the path to be used for the backup. The path Backup None
must be a directory.
DEREF_HARD_LINK Specifies whether hard link files’ data content is backed Backup N
up for all instances of the same file. The valid values are
Y and N.
Configuring NDMP
Before you can begin an NDMP backup, you must add a DMA server and configure the NDMP user name,
password, and client port.
• Client VIP (or a DNS name) that the DMA server accesses. If you ever change the client VIP, you must
also make the appropriate change on the DMA servers.
NOTE: NDMP has no load balancing built in. A single DMA backing up 10 NAS volumes from a
single client VIP forces all 10 sessions on the same NAS controller. Therefore, use DNS round-
robin to provide load balancing by specifying the DNS name of the FluidFS cluster in the DMA.
• NDMP user name and password (default user name is backup_user).
• Port that the NDMP server monitors for incoming connections (default port is 10000).
• Host name of the FluidFS cluster, which uses the following format:
<controller_number>.<FluidFS_cluster_name>
• OS type: Dell Fluid File System
• Product: Compellent FS8600
• Vendor: Dell
Most backup applications automatically list the available NAS volumes to back up. Otherwise, you can
manually type in the NAS volume path. The FluidFS cluster exposes backup NAS volumes at the following
path:
/<NAS_volume_name>
To improve data transfer speed, increase the number of concurrent backup jobs to more than one per
NAS controller, distributing the load across the available NAS controllers.
Requirements
The following requirements must be met to include or exclude NDMP paths:
• The path specified can be a directory or a file. If the path is a directory, all child elements of that
directory will be included in (or excluded from) the backup.
Each path specified is a child of the backup root directory and must start with a forward slash (/).
• The maximum number of paths that you can include or exclude is 32.
• Each path can be a maximum of 128 bytes long.
• The first or the last element of the path can contain a wildcard character (*).
• If both include and exclude paths are defined, the NDMP server will first check for include, then check
for exclude.
Managing Replication
Replication allows you to copy NAS volume data from the local (source) FluidFS cluster to a remote
(target) FluidFS clusterFluidFS cluster to a different NAS volume on the local FluidFS cluster or to a remote
(target) FluidFS cluster.
The following figure shows an overview of remote replication between NAS volumes on different FluidFS
clusters.
The following figure shows an overview of local replication between NAS volumes on a single FluidFS
cluster or to a different NAS volume on the local FluidFS cluster.
Replication can be used in various scenarios to achieve different levels of data protection.
The amount of time replication takes depends on the amount of data in the NAS volume and the amount
of data that has changed since the previous replication operation.
When replicating a NAS volume to another FluidFS cluster, the other FluidFS cluster must be set up as a
replication partner. Each FluidFS cluster can have multiple replication partners, enabling you to replicate
different NAS volumes to different partners, depending on operational requirements. However, each
individual NAS volume can be replicated to only one target NAS volume on one replication partner. The
following figure summarizes which replication scenarios are supported.
A replication policy can be set up to run according to a set schedule or on demand. Replication
management flows through a secure SSH tunnel from system to system over the client network.
To access or recover data, you can promote a target NAS volume to a recovery NAS volume and grant
clients access to the recovery NAS volume data. The recovery NAS volume will appear as if it is a local
NAS volume.
• Unlike source NAS volumes, you cannot create snapshots of target NAS volumes.
• The target FluidFS cluster must have enough free space to store the target NAS volumes.
• The system retains only the current replica of the source NAS volumes. To roll back to a previous
point in time, you must use snapshots.
• You can either replicate the source NAS volume to an existing NAS volume or to a new target NAS
volume. If you replicate to an existing NAS volume, the NAS volume must not contain any data you
want to retain. Any data residing on the NAS volume will be overwritten and cannot be recovered.
• Target NAS volumes count toward the total number of NAS volumes in the FluidFS cluster.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab.
3. In the File System tab navigation pane, select Replications.
4. Click the Remote Cluster tab.
5. In the right pane, select a remote FluidFS cluster and click Delete. The Delete dialog box appears.
6. Click OK.
Replication Throttling
With replication throttling, users can fine-tune network bandwidth usage for replication of a pair of NAS
volumes between two clusters. Users can limit FluidFS replications bandwidth usage by:
• Lowering bandwidth usage during work hours and higher bandwidth consumption during nighttime.
• Increasing bandwidth usage during weekends
Limitations
The following limitations apply to replication throttling:
• The maximum number of active outgoing replications is 10. If there are more, they are queued.
• The maximum number of active incoming replications is 100. If there are more, they are queued.
• The maximum number of replication partners is 100.
• The maximum number of replicated NAS volumes or containers (source and target) on a cluster is
1024.
• The maximum number of replication schedules per system is 1024.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab.
3. In the File System tab navigation pane, expand NAS Volumes and select a NAS volume.
4. In the right pane, click the Replication tab.
5. Click Delete. The Delete dialog box appears.
6. Click OK.
Schedule Replication
After a replication is created, you can schedule replication for a NAS volume to run regularly. You can
schedule replication only from the source FluidFS cluster.
Pause Replication
When you pause replication, any replication operations for the NAS volume that are in progress are
suspended. While replication is paused, scheduled replications do not take place. If you require multiple
replications to be paused, perform the following steps for each replication. You can pause replication
only from the source FluidFS cluster.
The following considerations apply when using replication for disaster recovery:
• If the original source NAS volume is no longer available, you can configure the recovery NAS volume
to replicate to another NAS volume in the original source FluidFS cluster. However, if the original
source NAS volume is available, fail back to it. Failing back to the original source NAS volume usually
takes less time than failing back to a new NAS volume. If the FluidFS clusters have a common
snapshot, they only need to synchronize the data that changed after that snapshot was created. If no
common snapshot is available, or if replicating to a new NAS volume, all data must be synchronized.
• A single FluidFS cluster cannot contain two sets of SMB home shares. Consider the example that
Cluster A and Cluster B both have SMB home shares, for different sites or user bases. Cluster A and
Cluster B both serve as replication destinations for each other’s NAS volume that contains the SMB
home shares. If the administrator tries to fail over Cluster A’s NAS volume that contains SMB home
shares to Cluster B, Cluster B rejects this operation because it already has SMB home shares defined
on it.
For example, suppose Marketing and Sales have their own NAS volumes, each with an SMB share on the
NAS volumes named marketing_share and sales_share respectively. A DNS entry named
FluidFSmarketing, is created for Marketing and another DNS entry for Sales named FluidFSsales is
created. Both NAS volumes point to the same set of client VIPs on source Cluster A. Marketing can access
the Marketing NAS volume or SMB share using \\FluidFS marketing\marketing, and Sales can access the
Sales NAS volume or SMB share using \\FluidFSsales\sales.
Initially, both DNS entries FluidFSmarketing and FluidFS sales point to the same set of client VIPs. At this
point, both the marketing and sales SMB shares can be accessed from either one of the DNS names,
FluidFSmarketing or FluidFS sales. When you want to fail over a single NAS volume (for example
Marketing) change the DNS entries for FluidFSmarketing to resolve to the client VIPs on Cluster B.
Maintain a table to track which DNS entries are used to access each NAS volume. This helps when
performing failover and setting up group policies.
…………………………
1. From Cluster B, promote the target volumes in Cluster B. This transforms the original target volumes
(B1, B2, .. Bn) to standalone NAS volumes and makes them writable.
2. Delete the replication policies for the original source volumes (A1, A2, .., An).
3. Apply the source volume configuration from the original source volumes in Cluster A to the target
volumes in Cluster B.
4. Restore the users and groups configuration from Cluster A. This restores the Cluster B users and
groups to Cluster A settings.
5. Ensure that Cluster B is used to temporarily serve client requests during the failover time.
a. Choose one of the following options:
• IP address-based failovers: Change the IP addresses for Cluster B to match the IP addresses
used by Cluster A. Existing client connections might break and might need to be re-
established.
• DNS-based failovers: Point the DNS names from your DNS server to Cluster B instead of
Cluster A.
Ensure that the DNS server on Cluster B is the same as the DNS server or in the same DNS
farm as the DNS server of Cluster A. Existing client connections might break and might need
to be re-established. You must unmount and re-mount the NFS exports on the clients.
b. (Single NAS volume failovers) Manually update the DNS entry for the NAS volume that was failed
over. This redirects clients that are accessing this volume from Cluster A to Cluster B, while other
clients keep accessing other volumes using the same DNS name. Client systems might need to
refresh their DNS cache.
c. (Single NAS volume failovers) To force SMB and NFS clients to Cluster B, you must delete the SMB
shares and NFS exports on Cluster A. This forces the SMB and NFS clients to reconnect, at such
time they are connected to Cluster B. After restoring the source volume’s configuration on
Cluster B, all of the SMB shares and NFS exports will be present on the target volume (on Cluster
B), so no SMB share/NFS export configuration information is lost.
The failed over volume can now be accessed using the exact same DNS name and SMB
share/NFS export name as it was when hosted on Cluster A, except now it is hosted on Cluster B.
d. Join Cluster B to the AD server or LDAP/NIS.
Ensure that the AD server and LDAP server are in the same AD/LDAP farm or same server.
1. Fix the reason that caused Cluster A to fail and if required reinstall FluidFS.
2. Rebuild the FluidFS cluster:
• IP address-based failovers: Use the settings for Cluster A that you recorded earlier, but change
the IP addresses for Cluster A to match the IP addresses originally used by Cluster B.
• DNS-based failovers: Use the settings for Cluster A that you recorded earlier.
3. From Cluster B, set up a replication partnership between Cluster B and Cluster A.
4. Configure replication for all the promoted recovery volumes in Cluster B, and specify that they
replicate back to the original source volumes in Cluster A.
The replication policy must be a one-to-one match on a volume basis, for example:
…………………………
• Interfaces
• Disks
• Backup power supplies
• Fans
• Power supplies
6. To view more information about hardware components in the NAS appliance diagram, mouse over a
hardware component in the NAS appliance diagram. A tool tip appears and displays information
including the name and status of the hardware component.
7. To adjust the zoom on the NAS appliance diagram, change the position of the zoom slider located to
the right of the NAS appliance diagram.
• To zoom in, click and drag the zoom slider up.
• To zoom out, click and drag the zoom slider down.
8. To move the NAS appliance diagram in the Controller View tab, click and drag the NAS appliance
diagram.
6. To adjust the zoom on the NAS appliance diagram, change the position of the zoom slider located to
the right of the NAS appliance diagram.
• To zoom in, click and drag the zoom slider up.
• To zoom out, click and drag the zoom slider down.
7. To move the NAS appliance diagram in the Appliance Front View tab, click and drag the NAS
appliance diagram.
5. To view more information about hardware components in the NAS controller diagram, mouse over a
hardware component in the NAS controller diagram. A tool tip appears and displays information
including the name and status of the hardware component.
The following graphic shows an example of a tool tip that appears after hovering the mouse cursor
over a network port.
6. To adjust the zoom on the NAS appliance diagram, change the position of the zoom slider located to
the right of the NAS appliance diagram.
• To zoom in, click and drag the zoom slider up.
• To zoom out, click and drag the zoom slider down.
7. To move the NAS appliance diagram in the Controller View tab, click and drag the NAS appliance
diagram.
NOTE: If any of the external services are configured with IPv6 link-local addresses, the monitor will
always show these services as Unavailable.
– Total MB/Sec: Displays all read and write traffic in Megabytes per second.
– SMB Write MB/Sec: Displays SMB write traffic in Megabytes per second.
– SMB Read MB/Sec: Displays SMB read traffic in Megabytes per second.
– Replication Write MB/Sec: Displays replication write traffic in Megabytes per second.
– Replication Read MB/Sec: Displays replication read traffic in Megabytes per second.
– NDMP Write MB/Sec: Displays NDMP write traffic in Megabytes per second.
– NDMP Read MB/Sec: Displays NDMP read traffic in Megabytes per second.
– NFS Write MB/Sec: Displays NFS write traffic in Megabytes per second.
– NFS Read MB/Sec: Displays NFS read traffic in Megabytes per second.
– NFSWrite IO/Sec: Displays NFS write Input/Output operations per second.
– NFS Read IO/Sec: Displays NFS read Input/Output operations per second.
– SMB Write IO/Sec: Displays SMB write Input/Output operations per second.
– SMB Read IO/Sec: Displays SMB read Input/Output operations per second.
– Total MB/Sec: Displays all read and write traffic in Megabytes per second.
– SMB Write MB/Sec: Displays SMB write traffic in Megabytes per second.
– SMB Read MB/Sec: Displays SMB read traffic in Megabytes per second.
– NDMP Write MB/Sec: Displays NDMP write traffic in Megabytes per second.
– NDMP Read MB/Sec: Displays NDMP read traffic in Megabytes per second.
– NFS Write MB/Sec: Displays NFS write traffic in Megabytes per second.
– NFS Read MB/Sec: Displays NFS read traffic in Megabytes per second.
– NFS Write IO/Sec: Displays NFS write Input/Output operations per second.
– NFS Read: IO/Sec Displays NFS read Input/Output operations per second.
1. Click the Storage view and select a FluidFS cluster, then select a NAS controller.
2. Click the Performance tab.
3. In the right pane, click the Load Balancing tab. The load balancing statistics are displayed.
4. (Optional) Customize the display as needed. These options are described in the online help.
• To view the statistics of a different time frame, select one of the following time period options:
Last Day, Last 3 Days, Last 5 Days, Last Week, Last Month, or Custom. If you select Custom,
specify the Start Time and End Time of the data to display and then click Update.
• To combine the data into a single chart with multiple Y axes, click Combine Charts.
• To change the data metrics to display, select one or more of the following data metrics:
• Full File Clone– Offload the creation of a virtual disk full clone
• Fast File Clone (Native Snapshot) – Offload the creation of a virtual disk linked clone
• Extended Statistics – Query for space usage on FS series datastores
Installing the plugin enables VAAI NAS primitives for all datastores residing on FS Series v4 or later
systems, adding the following functionalities:
1. Virtual machine cloning from vCenter will request FS Series appliances to generate a full copy of the
corresponding machine.
2. The creation of virtual machine linked clones will be offloaded to FS series appliances.
The plugin is provided in two alternate forms. Both forms can be downloaded from the FTP server ftp://
FluidFS_Cluster_public IP:44421/vaai_plugin:
Both forms provide equal functionality, differing only in the way they are installed.
or
Plugin Verification
To check if the VAAI plugin is installed in an ESXi host, type the following command in the ESXi console:#
esxcli software vib list | grep Dell_FluidFSNASVAAI
A positive reply should return:
Dell_FluidFSNASVAAI 1.1.0-250 DELL VMwareAccepted 2015-02-17
To verify that an FS Series datastore has VAAI enabled use the command vmkfstools –P in the ESXi host
console. The following example illustrates the query and output for a datastore named FSseries_datastore
residing on a FS Series v4 or later system:
Mode: public
Capacity 200 GB, 178.3 GB available, file block size 4 KB, max file size
16777216 TB
UUID: 1cec81cb-6db87d1c-0000-000000000000
nfs:FSseries_Datastore
Steps
1. Click the Storage view and select a FluidFS cluster folder.
2. Click the Summary tab.
3. In the right pane, click Delete. The Delete dialog box appears.
4. Click OK.
• The Storage Center that currently provides storage for the FluidFS cluster is running out of space.
• You want to spread out the storage load.
• You want to allocate more storage to the NAS pool than is supported by a single Storage Center.
Steps
1. Click the Storage view.
2. In the Storage pane, expand FluidFS Clusters and select a FluidFS cluster.
3. Click the Summary tab.
4. In the right pane, select Actions→ Storage Centers→ Add Storage Centers. The Add Storage Center
wizard appears and displays the Select Storage Centers (only supported Storage Centers shown)
page.
5. Select the additional Storage Center to provide storage for the FluidFS cluster and click Next.
6. (iSCSI only) Select two fault domains on the Select iSCSI Fault Domains from Storage Center page
and click Next.
Related Links
Expand the Size of the NAS Pool
– If client access to the FluidFS cluster is not through a router (in other words, a flat network), define
one client VIP per FluidFS cluster.
– If clients access the FluidFS cluster through a router, define a client VIP for each client interface
port per NAS controller.
• New NAS controller IP addresses are available to be added to the new NAS appliance. Verify that there
are two additional IP addresses available per NAS appliance.
NOTE: Due to the complexity and precise timing required, schedule a maintenance window to add
the NAS appliance(s).
Steps
1. (Directly cabled internal network only) If the FluidFS cluster contains a single NAS appliance, with a
direct connection on the internal network, re-cable the internal network as follows.
a. Cable the new NAS appliance(s) to the internal switch.
b. Remove just one of the internal cables from the original NAS appliance.
c. Connect a cable from each NAS controller port vacated in Step b to the internal switch.
d. Remove the second internal cable from the original NAS appliance.
e. Connect a cable from each NAS controller port vacated in Step d to the internal switch.
2. Click the Storage view and select a FluidFS cluster.
3. Click the Hardware tab.
4. In the Hardware tab navigation pane, select Appliances.
5. In the right pane, click Add Appliances. The Add Appliances wizard appears and displays the Select
Appliances to Add page.
6. Select the NAS appliance to add to the FluidFS cluster.
a. In the top pane, select the NAS appliance.
Related Links
Viewing the Status of Background Processes
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the Hardware tab.
3. In the Hardware tab navigation pane, expand Appliances→ NAS appliance ID, then select NAS
controller ID.
4. In the right pane, click Detach. The Detach dialog box appears.
5. Click OK. The progress of the detach process is displayed in the Detach dialog box. If you close the
dialog box, the process will continue to run in the background. The NAS controller is detached when
the NAS controller State changes to Detached (the State is displayed at System tab→ Appliances→
Controller).
Related Links
Viewing the Status of Background Processes
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the Hardware tab.
3. In the Hardware tab navigation pane, expand Appliances→ NAS appliance ID, then select NAS
controller ID.
4. In the right pane, click Attach. The Attach dialog box appears.
5. Click OK. The progress of the attach process is displayed in the Attach dialog box. If you close the
dialog box, the process will continue to run in the background. The NAS controller is attached when
the NAS controller State changes to Formatted (the State is displayed at System tab→ Appliances→
Controller).
6. (Fibre Channel only) After the attach operation completes, record the new WWNs and manually
update fabric zoning on the Fibre Channel switch.
Related Links
Viewing the Status of Background Processes
Steps
1. Detach the existing NAS controller.
2. Ensure that all cables are labeled.
3. Disconnect all cables from the back of the existing NAS controller.
4. Remove the existing NAS controller from the NAS appliance chassis.
a. Press the controller release button to disengage the controller handle.
b. Push the controller handle down until the controller disengages from the appliance.
c. Use the controller handle to pull the controller out of the appliance.
Related Links
Attach a NAS Controller
Detach a NAS Controller
Steps
1. Configure the SMTP settings for the Data Collector.
a. In the top pane of the Dell Storage Client, click Edit Data Collector Settings. The Edit Data
Collector Settings dialog box appears.
b. Click the SMTP Server tab.
c. In the From Email Address field, enter the email address to display as the sender of emails from
the Data Collector.
d. In the Host or IP Address field, enter the host name or IP address of the SMTP server.
e. If the port number of the SMTP server is not 25, enter the correct port number in the Port field.
f. If the SMTP server requires authentication, select the Authentication check box, then enter the
username and password in the SMTP User Name and SMTP User Password fields.
g. Click OK.
2. Configure an email address for your Storage Manager user account.
a. In the top pane of the Dell Storage Client, click Edit User Settings. The General tab of the Edit
User Settings dialog box appears.
NOTE: The upload process is a long-running operation. If you close the wizard, the upload
process will continue to run in the background. At a later time you can click Check for Upgrade
again to re-enter the wizard and view the upload progress.
The following table describes the steps that occur during the upload process.
Step Description
Check for Update The Update FluidFS Cluster wizard checks for the latest FluidFS version
available.
Download Package The FluidFS service pack is downloaded to the Data Collector.
Verify Package Integrity The checksum of the downloaded FluidFS service pack is re-computed
to verify the integrity of the service pack.
Upload Package to The FluidFS service pack is uploaded to a NAS controller in the FluidFS
FluidFS cluster.
Register Package Storage Manager waits for FluidFS to register that the package has
arrived and make the service pack available for installation.
8. Click Finish when you are ready to install the service pack. The progress of the installation process is
displayed.
NOTE: During the installation process, communication with the FluidFS cluster will be
interrupted. This might result in a communication error. However, the installation process will
continue to run in the background.
NOTE: The installation process is a long-running operation. If you close the wizard, the
installation process will continue to run in the background. You can view the installation
progress using the File System tab→Maintenance → Internal→ Background Processes tab.
Related Links
Viewing the Status of Background Processes
Managing the FTP Server
• SMB shares
• NFS exports
• Snapshot schedules
• Quota rules
A NAS volume configuration backup can be made available to be restored using the following methods:
• The storage administrator can manually copy the .clusterConfig folder to the NAS volume from its
backup or from another NAS volume. When using a backup from another system, the restore
operation works only if the saved configuration was taken from a system using the same FluidFS
version.
• The storage administrator can copy the .clusterConfig folder to the NAS volume from its backup
or from another NAS volume using an NDMP restore. When using a backup from another system, the
restore operation works only if the saved configuration was taken from a system using the same
FluidFS version.
• The .clusterConfig folder is automatically copied to target NAS volumes during replication.
1. Ensure the .clusterConfig folder has been copied to the root folder of the NAS volume on which
the NAS volume configuration will be restored. One way to access the root folder of a NAS volume is
to open Windows Explorer and in the address bar type: \\<client_VIP_or_name>\C$
\<NAS_volume>\.
2. Click the Storage view and select a FluidFS cluster
3. Click the File System tab.
4. In the File System tab navigation pane, expand NAS Volumes and select a NAS volume.
5. In the right pane, click Restore Volume Config. The Restore Volume Config dialog box appears.
• The storage administrator can manually copy the .clusterConfig folder to a NAS volume in the
system from its backup or from another system. When using a backup from another system, the
restore operation works only if the saved configuration was taken from a system using the same
FluidFS version.
• The storage administrator can copy the .clusterConfig folder to a NAS volume in the system from
its backup or from another system using an NDMP restore. When using a backup from another
system, the restore operation works only if the saved configuration was taken from a system using the
same FluidFS version.
• The .clusterConfig folder is automatically copied to target NAS volumes during replication.
• The storage administrator can manually copy the .clusterConfig folder to a NAS volume in the
system from its backup or from another system. When using a backup from another system, the
restore operation works only if the saved configuration was taken from a system using the same
FluidFS version.
• The storage administrator can copy the .clusterConfig folder to a NAS volume in the system from
its backup or from another system using an NDMP restore. When using a backup from another
system, the restore operation works only if the saved configuration was taken from a system using the
same FluidFS version.
• The .clusterConfig folder is automatically copied to target NAS volumes during replication.
WARNING: Reinstalling the FluidFS software on all NAS controllers will revert your system to
factory defaults. All data on the FluidFS cluster will be unrecoverable after performing the
procedure.
Steps
1. Press and release the recessed power button at the back of the NAS controller to shut down the NAS
controller.
NOTE: Power off only the NAS controller on which you are reinstalling the FluidFS software. Do
not power off the remaining NAS controllers. Powering off a NAS controller disconnects client
connections while clients are being transferred to other NAS controllers. Clients will then
automatically reconnect to the FluidFS cluster.
2. Press and release the recessed power button at the back of the NAS controller to turn on the NAS
controller.
3. When you see the F11 = BIOS Boot Manager prompt, press F11.
4. Select the boot device USB Flash Disk.
5. Select Reinstall Dell FluidFS<FluidFS_release_to_install>.
NOTE: Reinstall the NAS controller to FluidFS version 2.0 only if you are redeploying the NAS
controller in a FluidFS version 2.0 cluster.
6. Confirm the action by typing resetmysystem (version 3.0) or resetmysystem -v2 (version 2.0)
and pressing Enter.
7. Once the reinstallation completes, the NAS controller will reboot into standby mode.
8. After reinstalling FluidFS, attach the NAS controller to a FluidFS cluster.
Related Links
Attach a NAS Controller
Detach a NAS Controller
Running Diagnostics
Running diagnostics helps you detect problems with the FluidFS cluster. The diagnostic options available
for the FluidFS cluster are:
• Client Connectivity Diagnostic: Tracks a specific client’s attempt to connect to the FluidFS cluster.
Once the diagnostic is running, ask the client to reattempt the connection.
• File Accessibility Diagnostic: Tracks a specific client’s attempt to access a file. Once the diagnostic is
running, ask the client to reattempt file access.
• File System Diagnostic: Collects information on the core file system activities, resource consumption,
and status. If a problem occurs only during a specific activity, repeat that activity once the diagnostic
is running.
• General System Diagnostic: Collects general information about the FluidFS cluster status and
settings.
• Network Diagnostic: Collects network information and tracks a specific client’s attempt to connect to
the FluidFS cluster. Once the diagnostic is running, ask the client to reattempt the connection.
• Performance Diagnostic: Monitors the FluidFS cluster performance while running a basic benchmark
and collecting statistics. If possible, run this diagnostic when activity on the FluidFS cluster is minimal.
• Protocols Log Diagnostic: Collects information for SMB and NFS protocol activities, resources, and
status. If a problem occurs only during a specific activity, repeat that activity once the diagnostic is
running.
ftp://<FluidFS_administrator_user_name>@<client_VIP_or_cluster name>:44421/
diagnostics/archive/<diagnostic_name>
The diagnostic files can also be sent to a NAS volume location. They can then be collected via an SMB
share or NFS export.
Steps
1. Click the Storage view and select a FluidFS cluster.
2. Click the File System tab.
3. In the File System tab navigation pane, select Maintenance.
4. In the right pane, click the Support tab.
5. Select the diagnostic to run.
6. Click Run Diagnostic. The Run Diagnostic dialog box appears.
7. Enter any requested diagnostic parameters and click OK. The diagnostic parameters are described in
the online help. After the diagnostics have been run, Storage Manager will send diagnostic data using
Dell SupportAssist.
Related Links
Managing the FTP Server
If a major component or device in the system does not operate properly, running the embedded system
diagnostics might indicate component failure. To run embedded system diagnostics, a NAS controller
must be offline, which means it is not serving data.
The following table summarizes the embedded system diagnostics menu options.
Steps
1. Press and release the recessed power button at the back of the NAS controller to shut down the NAS
controller.
NOTE: Power off only the NAS controller on which you are running the embedded system
diagnostics. Do not power off the remaining NAS controllers. Powering off a NAS controller
disconnects client connections while their clients are being transferred to other NAS
controllers. Clients will then automatically reconnect to the FluidFS cluster.
2. Press and release the recessed power button at the back of the NAS controller to turn on the NAS
controller.
3. When you see the F10 = Launch Dell Embedded Diagnostics Module prompt, press F10. The ePSA
Pre-boot System Assessment window is displayed, listing all devices detected in the system. The
diagnostics starts executing the tests on all the detected devices.
4. After you are finished running the embedded system diagnostics, select Exit to exit the diagnostics
and reboot the NAS controller.
The FluidFS appliance hardware provides a special physical port known as the Lights-Out Management
(LOM) port. This port provides a standard TCP connection to a switch.
As of FluidFS v4, the interconnect network is an IPv6-only network. The BMC network configuration is no
longer dependent on the interconnect subnet.
You can configure a different IP address for each controller in the cluster. However, the network and
default gateway are shared among all controllers. If you check/uncheck the “Enabled” checkbox, you are
enabling/disabling the BMC network on all controllers.
Next steps
When you click the Edit link below the table of IP addresses, a new window will open in which you can
edit an IP address. Edit the IP address and click OK.
NOTE:
You cannot add or delete a controller IP address, you can only edit the IP address for a controller.
Steps
1. Connect a network cable to the LOM (Lights Out Management) Ethernet port on a NAS controller.
The LOM Ethernet port is located on the lower right side of the back panel of a NAS controller.
2. Connect a Windows client to the iBMC.
a. Connect a Windows client to the same network used for the LOM Ethernet port.
b. Open a web browser. In the address bar of the web browser, type the iBMC IP address of the NAS
controller. The iBMC login page appears.
c. In the Username field, type ADMIN.
d. In the Password field, type the iBMC password.
e. Click OK. The iBMC Properties page appears.
3. Launch the iBMC virtual KVM.
a. In the navigation pane, expand vKVM & vMedia and click Launch.
b. In the right pane, click Launch Java KVM Client. The Video Viewer appears and displays the
FluidFS cluster console.
Cause Quota enforcement is performed based on the UID and GID of the file (UNIX) or
the SID and the GSID of the primary group of the user (NTFS), if defined.
For Active Directory users, the Primary Group setting is not mandatory, and if not
defined, the used space is not accounted to any group. For group quota to be
effective with Active Directory users, their primary group must be assigned.
Workaround When configuring the FluidFS cluster to connect to an Active Directory domain:
1. Ensure that you use a FQDN and not the NetBIOS name of the domain or IP
address of the domain controller.
2. Ensure that the user has permissions to add systems to the domain.
3. Use the correct password.
4. Configure DNS.
5. The FluidFS cluster and Active Directory server must use a common source of
time. Configure NTP and verify the system time is in sync with the domain
controller time.
6. If multiple NAS appliances are used, ensure that you set different NetBIOS
names. The system defaults to SMB Storage as the name.
Troubleshooting Snapshots
Description Snapshot creation and deletion fails.
Workaround • For a manual request failure, retry taking or deleting the snapshot after a minute
or two.
• If the request originated from the snapshot scheduler, wait another cycle or
two. If the failure persists, try taking or deleting the snapshot manually on the
same NAS volume.
• If the system is under a heavy workload, wait until the workload decreases and
reissue the snapshot request.
• Check the snapshot schedule. A very dense snapshot schedule has a negative
impact on the overall performance of the system. The accumulated snapshot
rate must not exceed 20 snapshots per hour per system.
• Check the total number of snapshots in the system. If the number is in the
thousands, delete a few snapshots and retry.
• Ensure the client VIP is specified in the backup job.
Cause NDMP internal errors are indicators of a file system not being accessible or a NAS
volume not being available.
If the backup appliance can connect to a FluidFS cluster, but cannot log in:
1. Use the default user name “backup_user” configured in Storage Manager for
the NDMP client while setting up the NDMP backup/restore in your backup
application.
2. Use the password configured in Storage Manager for the NDMP client while
setting up the NDMP backup/restore in your backup application.
If the backup application can log into the FluidFS cluster, but no NAS volumes are
available for backup, verify that the FluidFS cluster has NAS volumes created on it.
Cause Because the anti-virus servers are not available on the FluidFS cluster, files cannot
be opened on an anti-virus enabled SMB share.
Workaround Ensure that the problem appears only on anti-virus enabled SMB shares, while
clients accessing other SMB shares do not experience such problems.
Check the status of the anti-virus servers and the network path between the
FluidFS cluster and the anti-virus servers.
Workaround Check the permissions on the file/folder and set the required permissions.
Workaround Check the current ACL setting in the Windows client. Redefine the ACLs for the files
by using a Windows client the same way you initially defined it. Verify that you set
the ACLs as the owner of the files, directories, and SMB shares. If you cannot
redefine your ACLs because you currently do not have permissions, perform the
following steps:
Cause The client clock must be within 5 minutes of the Active Directory clock.
Workaround Configure the client to clock-synch with the Active Directory server (as an NTP
server) to avoid clock skews errors.
Workaround The client needs to reconnect and open the file again.
Cause If multiple users are working on the same file and one user deletes the opened file,
it is marked for deletion, and is deleted after it is closed. Until then, the file appears
in its original location but the system denies any attempt to open it.
Workaround Notify the client who tried to open the file that the file has been deleted.
Cause When a file is opened using the SMB protocol, the opening application
communicates the sharing mode that must be used while this file is open.
This sharing mode describes what other clients' activities are allowed on this file,
while it is open.
This definition is sent by the application and the client cannot control/configure it.
Once there is a violation of the sharing definition, the client receives an access
denied error and an event is issued.
Workaround This is an informative event. The administrator may contact the locking client and
request to close the application referencing this file.
It could be that the application that opened the file did not shut down gracefully. It
is recommended to reboot the client if possible.
Workaround The system recovers itself automatically, an event is issued when recovered.
Workaround • If the system is in an optimal state (all NAS controllers are online) and the
number of SMB clients accessing one of the NAS controllers reaches the
maximum, consider adding another NAS appliance.
• If the system is in optimal state (all NAS controllers are online) but the clients are
significantly unbalanced between NAS controllers, rebalance the clients using
Storage Manager.
• If the system is in a degraded state (one or more NAS controllers are down) and
the SMB clients are connected to the remaining NAS controller, wait until the
system returns to optimal or decrease the number of SMB clients using the
system.
Workaround List the available SMB shares and verify that all SMB shares are displayed and
nothing has changed unintentionally.
Verify that you can access the problematic SMB share using a Windows client:
1. Click Run.
2. Enter the client access VIP and share name: \\<client_VIP_or_name>
\<SMB_share_name>
Cause This is a known issue with Windows. Windows attempts to map the SMB share by
its name and also by the name truncated by one character.
Workaround 1. If the FluidFS cluster is being restored, communicate the current status to the
client and instruct the client to wait for the restore process to complete.
2. In the case of another client deleting or altering a directory, there are three
options:
• The client meant to access the target system for read purposes, but also tried to
modify a file by mistake.
• The client accessed the wrong system due to similarity in name/IP address.
• The client accessed a NAS volume that was made a replication target without
the client’s knowledge.
Cause • The client connects using NFS/UDP and there is a firewall in the way.
• The client is not in the NFS export list, the FluidFS cluster could not recognize
the client system through NIS, or the FluidFS cluster does not accept the
identity the client provided.
• The FluidFS cluster is down or has internal file system problems.
• The mount command got through to the port mapper, but the rpc.mountd NFS
mount daemon was not registered.
• The client system’s IP address, IP range, domain name, or netgroup is not in the
NFS export list for the NAS volume it is trying to mount from the FluidFS cluster.
• Either the remote path or the local path is not a directory.
• The client does not have root authority or is not a member of the system group.
NFS mounts and unmounts are only allowed for root users and members of the
system group.
Workaround If the issue is due to NFS/UDP and firewall, check whether the client mounts using
UDP (this is usually the default) and there is a firewall in the path. If a firewall exists,
add an appropriate exception to the firewall.
If the issue is due to permissions:
If the FluidFS cluster is not responding due to the program not being registered,
check if the port mapper on your client is up.
If the issue is due to access denied:
• Get a list of the FluidFS cluster exported file systems using the command:
showmount -e <client_VIP_or_name>
• Check the system name or netgroup name is not in the user list for the file
system.
• Check the file systems related to the NFS export through Storage Manager.
If the issue is due to the directory, check the spelling in your command and try to
run the mount command on both directories.
Cause This failure is commonly caused by spelling mistakes on the client system or when
accessing the wrong server.
Workaround 1. Check the available NFS exports on the FluidFS cluster; verify that all the
required exports exist.
2. On the problematic client, verify that the relevant export is available to this
client:
% showmount -e <client_VIP_or_name>
/abc 10.10.10.0
/xyz 10.10.10.0
If the NFS export is available, review the NFS export name spelling in the
relevant mount command on the client. It is recommended to copy and paste
the NFS export name from the showmount output to the mount command.
Cause File ownership is UID/UNIX and the user is not privileged to access the file, or, file
ownership is SID/ACL and after translation to UID/UNIX the permissions do not
allow access to the file.
Workaround • For native access (when a SMB client accesses SID/ACL file or NFS client
accesses UID/UNIX file) change the permissions to allow access.
Cause The secure NFS export requirement means that the accessing clients must use a
well-known port (below 1024), which usually means that they must be root (uid=0)
on the client.
Workaround Identify the relevant NFS export and verify that it is set as secure (requires secure
client port).
• If the NFS export must remain secure, see the NFS client documentation in
order to issue the mount request from a well-known port (below 1024).
• If a secure NFS export is not required (for example, the network is not public),
ensure that the export is insecure and retry accessing it.
Cause The export list filters client access by IP address, network, or netgroup, and screens
the accessing client.
Workaround 1. Verify the relevant NFS export details. Write down all existing options so that
you are able to revert to them.
2. Remove IP address/client restrictions on the NFS export and retry the mount.
If the mount succeeds, verify that the IP address or domain is explicitly
specified, or that it is part of the defined network or netgroups. Once the
mount succeeds, adjust the original options accordingly.
Pay attention to pitfall scenarios, where the network netmask is not intuitive,
for example, 192.175.255.254 is part of 192.168.0.0/12 but not of
192.168.0.0/16.
Cause This error is usually the outcome of a communication error between the FluidFS
cluster and the NIS/LDAP server. It can be a result of a network issue, directory
server overload, or a software malfunction.
Workaround Repeat the below process for each configured NIS/LDAP server, each time leaving
just a single NIS/LDAP used, starting with the problematic server.
1. Inspect the NIS/LDAP server logs and see whether the reason for the error is
reported in the logs.
2. Network tests: Try pinging the FluidFS cluster from a client located in the same
subnet as the NIS/LDAP server. Try pinging the NIS/LDAP server from a client
located in the same subnet as the FluidFS cluster.
If packet loss is evident on one of the above network tests, resolve the
network issues in the environment.
You can temporarily work around the problem by removing the netgroup
restriction on the NFS export and/or by defining an alternative directory server.
Identify the relevant NFS export and the options defined for it, while focusing on
the netgroup definition. Document the used netgroup in order to restore it once
the issue is solved and remove the netgroup limitation.
Workaround 1. If the FluidFS cluster is being restored, communicate the current status to the
client and instruct the client to wait for the restore process to complete.
2. In the case of another client deleting or altering a directory, there are three
options:
Cause An NFS client attempted a chmod or chgrp operation while not being the owner of
the file.
Workaround This is a minor, user-level issue. Frequent events of this type might indicate a
malicious attempt to access restricted data.
Cause An NFS export can be defined as a read-only NFS export. A client accessing a read-
only NFS export cannot perform write operations or modify included files.
Workaround This event, by itself, does not require any administrative intervention.
• The client meant to access the target system for read purposes, but also tries to
modify a file by mistake.
• The client accesses the wrong system due to similarity in name/IP address.
• The client is accessing a NAS volume that was made a replication target without
the client’s knowledge.
Workaround Inform the client that snapshot data cannot be modified. A snapshot is an exact
representation of the NAS volume data at the time of its creation.
Cause NFS servers (versions 2 and 3) use the Remote Procedure Call (RPC) protocol for
authentication of NFS clients. Most RPC clients have a limitation, by design, of up to
16 groups passed to the NFS server. If a user belongs to more than 16 UNIX groups,
as supported by some UNIX types, some of the groups are not passed and are not
checked by the NFS server and therefore the client's access might be denied.
Workaround A possible way to verify this problem is to use newgrp to temporarily change the
primary group of the user and thus ensure it is passed to the server.
The simple workaround, although not always feasible, is to remove the user from
unnecessary groups, leaving only 16 groups or less.
Cause • The client cannot modify a file due to lack of permissions on the file.
• The NAS volume has reached full capacity and the file system denies any write
requests, including overwrites.
• The NAS volume is a target in a replication and is read-only.
Workaround 1. If the problem appears only on some files, this is a permission issue. Verify that
the user account has modify permissions on the file or use a different user
account.
2. If the problem is related to a specific NAS volume, verify there is enough free
space on the NAS volume or expand it, and verify that the accessed NAS
volume is not a target of a replication.
Cause It is impossible to change only the file owner ID to UID if the original file ownership
is SID/GSID.
Workaround To change the file ownership to UNIX style ownership, set UID and GID at same
time.
Cause A UNIX/Linux client is trying to access the file system using the smbclient
command, for example:
smbclient //<FluidFS_cluster_name>/<SMB_share> -U user%password
-c ls
Workaround It is recommended that you use the NFS protocol interfaces to access the FluidFS
cluster file system from UNIX/Linux clients. To work around this issue:
Cause By default, Ubuntu 7.x NFS clients do not specify RPC credentials on their NFS calls.
As a result, files created from these clients, by any user, are owned by 4294967294
(nfsnone) UID and GID.
Workaround To force UNIX credentials on NFS calls, add the sec=sys option to the FluidFS
cluster mounts in the Ubuntu fstab file.
1. Ping the server from a client on the FluidFS cluster subnet and verify that it
responds.
2. Issue a request to the server from a client on the FluidFS cluster subnet and
verify that it responds.
3. Check the server logs to see what is causing the server not to respond to
requests.
Cause Flow control is not enabled on the switch(es) connected to a FluidFS cluster
controller.
Workaround See the switch vendor's documentation to enable flow control on the switch(es).
Cause The source and target systems are incompatible for replication purposes.
Workaround Verify that both the source and target have the same number of NAS controllers.
Cause Replication fails because the target FluidFS cluster is not available to serve the
required replication.
Cause Replication fails because the target FluidFS cluster is temporarily unavailable to
serve the required replication.
Workaround The replication continues automatically when the file system releases part of the
resources. Verify that the replication continues automatically after a period of time
(an hour).
Cause Replication fails because the file system of the target NAS volume is down.
Cause Replication fails because the file system of the target NAS volume is not optimal.
Workaround Check the system status of the target system to understand why the file system is
not optimal. The replication continues automatically after the file system recovers.
Cause Replication fails because the target NAS volume is busy freeing up space.
Workaround The replication continues automatically when the space is available. Verify that the
replication automatically continues after a period of time (an hour).
Cause Replication fails because the target NAS volume was previously detached from the
source NAS volume.
Workaround Perform the detach action on the source NAS volume. If required, reattach both
NAS volumes in a replication relation.
Replication Disconnection
Description Replication between the source NAS volume and the target NAS volume fails
because the connection between the source and target systems is lost.
Cause Network infrastructure connection issue between the source and the target.
Workaround Check whether the replication is automatically restored. If the replication is not
automatically restored, check the network communication between the source
FluidFS cluster and the target FluidFS cluster. Network communication can be
checked by using a third-party system in the same subnet that can ping both the
source and target FluidFS clusters. Also, verify that the FluidFS replication ports are
open on your firewall to allow replication between the source and target FluidFS
cluster.
Cause Replication fails because the FluidFS version of the source FluidFS cluster is higher
than the FluidFS version of the target FluidFS cluster.
Workaround Upgrade the FluidFS version of the target FluidFS cluster to match the FluidFS
version of the source FluidFS cluster.
Cause Replication fails because there is not enough space in the target NAS volume.
Cause Replication fails because the file system of the source NAS volume is busy
replicating other NAS volumes.
Workaround The replication continues automatically when the file system releases part of the
resources. Verify that the replication automatically continues after a period of time
(an hour).
Workaround Check whether the FluidFS cluster is down in the source system. If the FluidFS
cluster is down, you must start the file system on the source FluidFS cluster. The
replication continues automatically when the file system starts.
Cause Replication fails because the file system of the source is not optimal.
Workaround Check the file system status of the source system to understand why the file
system is not optimal.
Cause Replication failed because the source NAS volume is busy reclaiming space.
Workaround The replication continues automatically when space is available. Verify that the
replication automatically continues after a period of time (an hour).
Workaround 1. If you manually configured the NAS system clock, verify that the time is set
correctly in Storage Manager.
2. Identify the FluidFS cluster NTP server from Storage Manager. Record the host
name(s) or IP address(es) for further reference.
3. If no NTP server is defined, define one. It is recommended synchronizing the
NAS system clock with the NTP server used by the Active Directory domain
controller. This avoids time difference issues and possible authentication
problems. In many cases the domain controller is also the NTP server.
4. Verify that the NTP server is up and provides the NTP service.
5. Check the network path between the FluidFS cluster and the NTP server, using
ping, for example. Verify that the response time is in the millisecond range.
The file system might take a long time to clean the cache to storage either due to
lot of data, or due to an intermittent connection to the storage. During the
powering down stage, the issue could be due to the OS kernel hanging on the NAS
controller or failing to sync its state to the local drive.
Workaround • If the file system has stopped and if one of the NAS controllers is still up, you
can physically power down the NAS controller using the power button.
• If the file system has not stopped, you must let it continue stopping. The file
system reaches a 10 minute timeout, flushes its cache to local storage, and
continues the shutdown process.
Cause Selecting a security style for a NAS volume dictates the dominant protocol to be
used to set permissions on files in the NAS volume: NFS for UNIX security style NAS
volumes and SMB for NTFS security style NAS volumes.
Consequently, this makes some operations invalid:
• Setting UNIX permissions for a file in an NTFS security style NAS volume.
• Setting UID/GID ownership for a file in an NTFS security style NAS volume.
• Setting an ACL for a file in a UNIX security style NAS volume.
• Changing the read-only flag for a file in a UNIX security style NAS volume.
• Setting SID/GSID ownership for a file in a UNIX security style NAS volume.
The NAS volume security style must reflect the main protocol used to access its
files.
Workaround If a user frequently needs to perform a cross-protocol security related activity, split
the data into separate NAS volumes based on the main access protocol.
Workaround • Connect a keyboard and monitor to the NAS controller that failed the attach
operation, and view the error message to determine why the attach operation
failed.
• Verify that while the NAS controller was detached, the IP assigned to it on the
client network was not allocated to another host. While the NAS controller is
detached, it loses its identity, including IP addresses. When it is attached, its
identity is applied back to the NAS controller, including the IP addresses.
• Verify that the default gateway is in the Primary subnet. If the default gateway is
not in the Primary subnet, change the default gateway. For attach to succeed,
the default gateway must be able to be pinged.
• After an attach operation fails, the NAS controller must manually be reset to
standby mode.
Workaround • Connect a keyboard and monitor to the NAS controller that is taking a long
time to boot up.
• If the system is booting, and is at the boot phase, let the upgrades finish. This
can take up to 60 minutes to complete.
• Do not reboot the NAS controller manually if it is in the boot phase.