7/31/2019 Symantec FileStore Command-Line Administrator's Guide
1/542
Symantec FileStore
Command-LineAdministrator's Guide
5.6
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
2/542
Symantec FileStore Command-Line AdministratorsGuide
Thesoftwaredescribedin this book is furnishedundera license agreement andmaybe used
only in accordance with the terms of the agreement.
Product version: 5.6
Document version: 5.6.0
Legal Notice
Copyright 2011 Symantec Corporation. All rights reserved.
Symantec, the Symantec logo, Veritas, Veritas Storage Foundation, CommandCentral,
NetBackup, Enterprise Vault, and LiveUpdate are trademarks or registered trademarks of
Symantec corporation or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required
to provide attribution to the third party (Third Party Programs). Some of the Third Party
Programs areavailableunderopen sourceor free software licenses.The License Agreement
accompanying the Software does not alter any rights or obligations you may have under
those open source or free software licenses. See the Third-party Legal Notices document
for this product, which is available online or included in the base release media.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization ofSymantec Corporation and its licensors, if any.
THE DOCUMENTATIONIS PROVIDED"ASIS" ANDALL EXPRESS ORIMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BELEGALLYINVALID. SYMANTECCORPORATION SHALL NOTBELIABLEFORINCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
TheLicensedSoftwareand Documentation are deemedto be commercial computer software
as defined in FAR12.212 andsubjectto restricted rights as defined in FARSection 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance,display or disclosure of theLicensedSoftwareandDocumentation by theU.S.
Government shall be solely in accordance with the terms of this Agreement.
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
3/542
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
http://www.symantec.com/http://www.symantec.com/7/31/2019 Symantec FileStore Command-Line Administrator's Guide
4/542
Technical Support
Symantec Technical Support maintains support centers globally. Technical
Supports primary role is to respond to specific queries about product features
andfunctionality. The Technical Support group also createscontentfor ouronline
Knowledge Base. The Technical Support group works collaboratively with the
other functional areas within Symantec to answer your questions in a timely
fashion.Forexample,theTechnicalSupport groupworkswith Product Engineering
andSymantec Security Response to provide alerting services andvirus definition
updates.
Symantecs support offerings include the following:
A range of support options that give you the flexibility to select the right
amount of service for any size organization Telephone and/or Web-based support that provides rapid response and
up-to-the-minute information
Upgrade assurance that delivers software upgrades
Global support purchased on a regional business hours or 24 hours a day, 7
days a week basis
Premium service offerings that include Account Management Services
For information about Symantecs support offerings, you can visit our Web site
at the following URL:
www.symantec.com/business/support/index.jsp
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Contacting Technical Support
Customers with a current support agreement may access Technical Support
information at the following URL:
www.symantec.com/business/support/contact_techsupp_static.jsp
Before contacting Technical Support, make sure you have satisfied the systemrequirements that are listed in your product documentation. Also, you should be
at thecomputer on which theproblem occurred, in case it is necessaryto replicate
the problem.
When you contact Technical Support, please have the following information
available:
Product release level
http://www.symantec.com/business/support/index.jsphttp://www.symantec.com/business/support/contact_techsupp_static.jsphttp://www.symantec.com/business/support/contact_techsupp_static.jsphttp://www.symantec.com/business/support/index.jsp7/31/2019 Symantec FileStore Command-Line Administrator's Guide
5/542
Hardware information
Available memory, disk space, and NIC information
Operating system Version and patch level
Network topology
Router, gateway, and IP address information
Problem description:
Error messages and log files
Troubleshooting that was performed before contacting Symantec
Recent software configuration changes and network changes
Licensing and registration
If your Symantecproduct requires registrationora license key, accessourtechnical
support Web page at the following URL:
www.symantec.com/business/support/
Customer service
Customer service information is available at the following URL:
www.symantec.com/business/support/
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
Questions regarding product licensing or serialization
Product registration updates, such as address or name changes
General product information (features, language availability, local dealers)
Latest information about product updates and upgrades
Information about upgrade assurance and support contracts
Information about the Symantec Buying Programs
Advice about Symantec's technical support options
Nontechnical presales questions
Issues that are related to CD-ROMs or manuals
http://www.symantec.com/business/support/http://www.symantec.com/business/support/http://www.symantec.com/business/support/http://www.symantec.com/business/support/7/31/2019 Symantec FileStore Command-Line Administrator's Guide
6/542
Support agreement resources
If you want to contact Symantec regarding an existing support agreement, please
contact the support agreement administration team for your region as follows:
[email protected] and Japan
[email protected], Middle-East, and Africa
[email protected] America and Latin America
Documentation
Product guides are available on the media in PDF format. Make sure that you are
using the current version of the documentation.The document version appears
on page 2 of each guide. The latest product documentation is available on the
Symantec website.
http://www.symantec.com/business/support/overview.jsp?pid=15107
Your feedback on product documentation is important to us. Send suggestions
for improvements and reports on errors or omissions. Include the title and
document version (located on the second page), and chapter and section titles of
the text on which you are reporting. Send feedback to:
About Symantec Connect
Symantec Connect is the peer-to-peer technical community site for Symantecs
enterprise customers. Participantscanconnect andshare information with other
product users, including creating forum posts, articles, videos, downloads, blogs
and suggesting ideas, as well as interact with Symantec product teams and
Technical Support. Content is rated by the community, and members receive
reward points for their contributions.
http://www.symantec.com/connect/storage-management
Additional enterprise services
Symantec offers a comprehensive set of services that allow you to maximize yourinvestment in Symantec products and to develop your knowledge, expertise, and
global insight, which enable you to manage your business risks proactively.
Enterprise services that are available include the following:
These services remove theburdenof managing andmonitoringsecurity devices
and events, ensuring rapid response to real threats.
Managed Services
mailto:[email protected]:[email protected]:[email protected]://www.symantec.com/business/support/overview.jsp?pid=15107mailto:[email protected]://www.symantec.com/connect/storage-managementhttp://www.symantec.com/connect/storage-managementmailto:[email protected]://www.symantec.com/business/support/overview.jsp?pid=15107mailto:[email protected]:[email protected]:[email protected]7/31/2019 Symantec FileStore Command-Line Administrator's Guide
7/542
Symantec Consulting Services provide on-site technical expertise from
Symantec anditstrustedpartners.Symantec Consulting Services offer a variety
of prepackaged and customizable options that include assessment, design,
implementation, monitoring, and management capabilities. Each is focused onestablishing andmaintainingtheintegrity andavailabilityof your IT resources.
Consulting Services
Education Services providea full array of technical training, security education,
security certification, and awareness communication programs.
Education Services
To access more information about enterprise services, please visit our Web site
at the following URL:
www.symantec.com/business/services/
Select your country or language from the site index.
http://www.symantec.com/business/services/http://www.symantec.com/business/services/7/31/2019 Symantec FileStore Command-Line Administrator's Guide
8/542
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
9/542
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Chapter 1 Introducing Symantec FileStore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
About FileStore ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
About FileStore features ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Simple installation .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Active/Active Scalable NFS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23Active/Active CIFS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
NFS Lock Management (NLM) .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Administration .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Storage tiering .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
High-performance data replication .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Integrated content scanning using Symantec AntiVirus for
FileStore ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
About the core strengths of FileStore ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
FileStore key benefits and other applications ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
High performance scaling and seamless growth .... . . . . . . . . . . . . . . . . . . . . . . . 26
High availability ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27Consolidating and reducing costs of storage .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Enabling scale-outcompute clusters and heterogeneous sharing
of data ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
FileStore on the Web .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Using the FileStore product documentation .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Chapter 2 Creating users based on roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
About user roles and privileges ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
About the naming requirements for adding new users ... . . . . . . . . . . . . . . . . . . . . . 32
About using the FileStore command-line interface ... . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Logging in to the FileStore CLI ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
About accessing the online man pages ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
About creating Master, System Administrator, and Storage
Administrator users ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Creating Master, System Administrator, and Storage Administrator
users ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
About the support user ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Contents
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
10/542
Configuring the support user account ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Displaying the command history .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Chapter 3 Displaying and adding nodes to a cluster . . . . . . . . . . . . . . . . . . . . . . 49About the cluster commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
About FileStore installation states and conditions ... . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Displaying the nodes in the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
About adding a new node to the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Installing the FileStore software onto a new node .... . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Adding a node to the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Deleting a node from the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Shutting down the cluster nodes ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Rebooting the nodes in the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Chapter 4 Configuring storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
About storage provisioning and management ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
About configuring storage pools ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Configuring storage pools ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
About configuring disks ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Configuring disks ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
About performing local replication initialization .... . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Detachingone or more pools from the FileStore cluster as a detached
pool set ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Displaying detached pools ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75Attaching a replication storage pool to a FileStore cluster ... . . . . . . . . . . . . . . . . . 75
About displaying information for all disk devices ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Displaying information for all disk devices associated with nodes in
a cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Increasing the storage capacity of a LUN .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Formatting/reinitializing a disk ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Printing WWN information .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Initiating FileStore host discovery of LUNs .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Importing pools forcefully ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
About I/O fencing .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Configuring I/O fencing .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
About quotas for file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Using quota commands for enabling, disabling, and displaying file
system quotas ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Using quota commands for setting and displaying file system
quotas ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
About quotas for CIFS home directories ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Using quotas for CIFS home directories ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Contents10
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
11/542
Displaying the quota values for CIFS home directories ... . . . . . . . . . . . . . . . . . . . 105
About iSCSI ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Configuring the iSCSI initiator ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Configuring the iSCSI initiator name .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109Configuring the iSCSI device ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Configuring discovery on iSCSI ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
About configuring the iSCSI targets ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Configuring the iSCSI targets ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
About data archive and retention (DAR) ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
How DAR interacts with other FileStore applications ... . . . . . . . . . . . . . . . . . . . . . 121
Configuring data archive and retention .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Chapter 5 Configuring Symantec FileStore networksettings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
About network mode commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Displaying the network configuration and statistics ... . . . . . . . . . . . . . . . . . . . . . . . 129
About bonding Ethernet interfaces ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Bonding Ethernet interfaces ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
About DNS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Configuring DNS settings ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
About IP commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
About configuring IP addresses ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Configuring IP addresses ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
About configuring Ethernet interfaces ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Displaying current Ethernet interfaces and states ... . . . . . . . . . . . . . . . . . . . . . . . . . 144
Configuring Ethernet interfaces ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
About configuring routing tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Configuring routing tables ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
About LDAP .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Before configuring LDAP settings ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
About configuring LDAP server settings ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Configuring LDAP server settings ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
About administering FileStore cluster's LDAP client ... . . . . . . . . . . . . . . . . . . . . . . 158
Administering the FileStore cluster's LDAP client ... . . . . . . . . . . . . . . . . . . . . . . . . . 159
About NIS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160Configuring the NIS-related commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
About NSS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Configuring NSS lookup order ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
About VLAN interfaces ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Configuring VLAN interfaces ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Contents
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
12/542
Chapter 6 Configuring your NFS server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
About NFS server commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Accessing the NFS server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Displaying NFS statistics ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Displaying file systems and snapshots that can be exported .... . . . . . . . . . . . 173
Chapter 7 Creating and maintaining NFS shares . . . . . . . . . . . . . . . . . . . . . . . . . 175
About NFS file sharing .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Displaying exported directories ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Adding an NFS share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Sharing directories using CIFS and NFS protocols ... . . . . . . . . . . . . . . . . . . . . . . . . . 181
Exporting an NFS snapshot ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Unexporting a directory or deleting NFS options ... . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Chapter 8 Creating and maintaining file systems . . . . . . . . . . . . . . . . . . . . . . . . 187
About creating and maintaining file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Listing all file systems and associated information .... . . . . . . . . . . . . . . . . . . . . . . . 191
About creating file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Creating a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Adding or removing a mirror to a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Configuring FastResync for a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Disabling the FastResync option for a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . 198
Increasing the size of a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Decreasing the size of a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Checking and repairing a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Changing the status of a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Defragmenting a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Destroying a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
About snapshots ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Creating snapshots ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Displaying snapshots ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Configuring snapshots ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
About snapshot schedules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Creating snapshot schedules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213Displaying snapshot schedules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Configuring snapshot schedules ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
About instant rollbacks ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Creating a FileStore space-optimized rollback .... . . . . . . . . . . . . . . . . . . . . . . . . 219
Creating a full-sized rollback .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Listing FileStore instant rollbacks ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Restoring a file system from an instant rollback .... . . . . . . . . . . . . . . . . . . . . . 221
Contents12
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
13/542
Refreshing an instant rollback from a file system .... . . . . . . . . . . . . . . . . . . . 222
Making an instant rollback go online ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Making an instant rollback go offline ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Destroying an instant rollback .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224Creating a shared cache object for a FileStore instant
rollback .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Listing cache objects for a FileStore instant rollback .... . . . . . . . . . . . . . . . 226
Destroying a cache object of a FileStore instant rollback .... . . . . . . . . . . 227
About setting up file system alerts for file system usage .... . . . . . . . . . . . . . . . . 227
Setting file system alerts ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Unsetting file system alerts ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Displaying file system alerts ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
About the Partition Secure Notification (PSN) feature ... . . . . . . . . . . . . . . . . . . . . 230
Enabling the Partition Secure Notification (PSN) feature ... . . . . . . . . . . 231
Disabling the Partition Secure Notification (PSN) feature ... . . . . . . . . . . 231Listing the online file systems that have the Partition Secure
Notification (PSN) feature enabled .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Chapter 9 Using Symantec FileStore as a CIFS server . . . . . . . . . . . . . . . . . . 233
About configuring FileStore for CIFS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
About configuring CIFS for standalone mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Configuring CIFS server status for standalone mode .... . . . . . . . . . . . . . . . . . . . . . 237
About configuring CIFS for NT domain mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
Configuring CIFS for the NT domain mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
About leaving an NT domain .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Changing NT domain settings ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Changing security settings ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Changing security settings after the CIFS server is stopped .... . . . . . . . . . . . . 247
About Active Directory (AD) ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Configuring entries for NTP for authenticating to Active
Directory (AD) ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Configuring entries forFileStoreDNSforauthenticating to Active
Directory (AD) ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Joining FileStore to Active Directory (AD) ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Verifying that FileStore has joined Active Directory (AD)successfully ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
About configuring CIFS for Active Directory (AD) domain mode .... . . . . . . 253
Configuring CIFS for the AD domain mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Using multi-domain controller support in CIFS .... . . . . . . . . . . . . . . . . . . . . . . 258
About leaving an AD domain .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Changing domain settings for AD domain mode .... . . . . . . . . . . . . . . . . . . . . . 259
Removing the AD interface ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Contents
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
14/542
About setting NTLM ..... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Setting NTLM ..... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
About setting trusted domains ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Allowing trusted domains access to CIFS when setting an LDAPIDMAP backend to rid ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Allowing trusted domains access to CIFS when setting an LDAP
IDMAP backend to ldap .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
Allowing trusted domains access to CIF when setting an LDAP
IDMAP backend to hash .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
About configuringWindowsActive Directory as an LDAP IDMAP
backend for FileStore for CIFS .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Configuring the Active Directory schema with CIFS-schema
extensions .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Configuring LDAP as an IDMAP backend using the FileStore
CLI ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274Configuring the CIFS server with the LDAP backend .... . . . . . . . . . . . . . . . 274
Setting Active Directory trusted domains ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
About storing account information .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
Storing user and group accounts ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
About reconfiguring the CIFS service ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Reconfiguring the CIFS service ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
About managing CIFS shares ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
About the CIFS export options ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Setting share properties ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Displaying CIFS share properties ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288Allowing specified users and groups access to the CIFS
share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Denying specified users and groups access to the CIFS
share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Modifying an existing CIFS share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Modifying an existing CIFS share with different CIFS
options ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Exporting a CIFS snapshot ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Deleting a CIFS share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Sharing file systems using CIFS and NFS protocols ... . . . . . . . . . . . . . . . . . . . . . . . . 294
About mapping user names for CIFS/NFS sharing .... . . . . . . . . . . . . . . . . . . . . . . . . 297About load balancing for the normal clustering mode .... . . . . . . . . . . . . . . . . . . . . 298
About load balancing for the ctdb clustering mode .... . . . . . . . . . . . . . . . . . . . . . . . 300
Splitting a CIFS share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
About managing home directories ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Setting the home directory file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Setting up home directories ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Displaying home directory usage information .... . . . . . . . . . . . . . . . . . . . . . . . . 307
Contents14
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
15/542
Deleting home directories and disabling creation of home
directories ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
About ctdb clustering modes ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Exporting a directory as a CIFS share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310Exporting the same file system/directory as a different CIFS
share ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
About switching the clustering mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Switching from normal to ctdb clustering mode .... . . . . . . . . . . . . . . . . . . . . . 313
Switching from ctdb to normal clustering mode .... . . . . . . . . . . . . . . . . . . . . . 316
About migrating CIFS shares and home directories ... . . . . . . . . . . . . . . . . . . . . . . . . 317
MigratingCIFS shares andhome directoriesfrom normal to ctdb
clustering mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
MigratingCIFS shares andhome directoriesfrom ctdb to normal
clustering mode .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Setting the aio_fork option .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324Setting the netbios aliases for the CIFS server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
About managing local users and groups .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Creating a local CIFS user ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
About configuring local groups .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Configuring a local group .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Chapter 10 Configuring your FTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
About FTP .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Displaying FTP server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
About FTP server commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Using the FTP server commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
About FTP set commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Using the FTP set commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Implementing all of the FTP> set command changes ... . . . . . . . . . . . . . . . . . . . . . 345
About FTP session commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
Using the FTP session commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
Using the FTP logupload command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
About FTP local user commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
Using the FTP local user commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
About FTP local user set commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351Using the FTP local user set commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
Chapter 11 Configuring your HTTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
About configuring your HTTP server for accessing FileStore
data ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
About using the HTTP server commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
Starting the HTTP server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
Contents
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
16/542
Stopping the HTTP server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
Displaying the status for the HTTP server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
About HTTP set commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
Displaying the current HTTP sessions on each node .... . . . . . . . . . . . . . . . 363Setting theminimum numberof idle threads forhandling request
spikes ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Setting themaximum numberof idle threads forhandlingrequest
spikes ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Setting the maximum number of threads to be created .... . . . . . . . . . . . . 364
Setting the initial number of server threads ... . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Setting the maximum number of threads in each server
process ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Displaying the list of all configurable HTTP options and their
values ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
About HTTP alias commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365Adding a mapping from a virtualPath to a realPath .... . . . . . . . . . . . . . . . . . 366
Deleting a mapping that is visible to clients as a virtualPath .... . . . . . 367
Displaying all the aliases configured on the server ... . . . . . . . . . . . . . . . . . . . 367
About HTTP document root mapping commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Setting the root directory for the HTTP server ... . . . . . . . . . . . . . . . . . . . . . . . . 368
Displaying the current root directory for the HTTP server ... . . . . . . . . 368
Chapter 12 Configuring event notifications and audit logs . . . . . . . . . . . 369
About configuring event notifications and audit logs ... . . . . . . . . . . . . . . . . . . . . . 370
About severity levels and filters ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
About email groups .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Configuring an email group .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
About syslog event logging .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Configuring a syslog server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
Displaying events on the console ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
About SNMP notifications ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Configuring an SNMP management server ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Configuring events for event reporting .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Exporting events in syslog format to a given URL .... . . . . . . . . . . . . . . . . . . . . . . . . . 386
About audit logs ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387Configuring audit logs ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
Disabling the audit log for a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Chapter 13 Configuring backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
About backup .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
About NetBackup .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
About the NetBackup snapshot client ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
Contents16
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
17/542
About NetBackup snapshot methods .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
About NetBackup instant recovery .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
About Fibre Transport ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
About SAN clients ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397About FT media servers ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398
About the FT Service Manager ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398
About zoning the SAN for Fibre Transport ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398
About HBAs for SAN clients and FT media servers ... . . . . . . . . . . . . . . . . . . . . . . . . . 399
About connecting the fiber for SAN Client ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Adding a NetBackup master server to work with FileStore ... . . . . . . . . . . . . . . 400
Configuring or changing the virtual IP address used by NetBackup
and NDMP data server installation .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Configuring the virtual name of NetBackup .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
About Network Data Management Protocol ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
About NDMP supported configurations ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405About the NDMP policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
Configuring the NDMP policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Displaying all NDMP policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
About retrieving the NDMP data ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
Retrieving the NDMP data ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Restoring the default NDMP policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
About backup configurations ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Configuring backup .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
Configuring backups using NetBackup or other third-party backup
applications ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
Chapter 14 Configuring Symantec FileStore Dynamic StorageTiering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
About FileStore Dynamic Storage Tiering (DST) ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
How FileStore uses Dynamic Storage Tiering .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
About policies ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
About adding tiers to file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Adding tiers to a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Removing a tier from a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
About configuring a mirror on the tier of a file system .... . . . . . . . . . . . . . . . . . . 429Configuring a mirror to a tier of a file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Listing all of the files on the specified tier ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Displaying a list of DST file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
Displaying the tier location of a specified file ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
About configuring the policy of each tiered file system .... . . . . . . . . . . . . . . . . . . 432
Configuring the policy of each tiered file system .... . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Relocating a file or directory of a tiered file system .... . . . . . . . . . . . . . . . . . . . . . . . 438
Contents
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
18/542
About configuring schedules for all tiered file systems .... . . . . . . . . . . . . . . . . . . 438
Configuring schedules for all tiered file systems .... . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
Displaying files that will be moved and/or pruned by running a
policy ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440Allowing metadata information on the file system to be written on
the secondary tier ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Restricting metadata information to the primary tier only ... . . . . . . . . . . . . . . 442
Chapter 15 Configuring system information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
About system commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
About setting the clock commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
Setting the clock commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
About configuring the locally saved configuration files ... . . . . . . . . . . . . . . . . . . 448
Configuring the locally saved configuration files ... . . . . . . . . . . . . . . . . . . . . . . . . . . . 449Using the more command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
About coordinating cluster nodes to work with NTP servers ... . . . . . . . . . . . . 453
Coordinating cluster nodes to work with NTP servers ... . . . . . . . . . . . . . . . . . . . . . 454
Displaying the system statistics ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Using the swap command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
About the option commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
Using the option commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Chapter 16 Upgrading Symantec FileStore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
About upgrading patches or drivers ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465Displaying the current version of FileStore ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
About installing patches ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
About types of patches ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Installing patches ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Uninstalling patches ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
Synchronizing software upgrades on a node .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
Uninstalling driver updates ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
Chapter 17 Using Symantec AntiVirus for FileStore . . . . . . . . . . . . . . . . . . . . . . . 475
About Symantec AntiVirus for FileStore ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476About Symantec AntiVirus for FileStore licensing .... . . . . . . . . . . . . . . . . . . . . . . . . 477
About Symantec AntiVirus for FileStore commands .... . . . . . . . . . . . . . . . . . . . . . . 477
Displaying Symantec AntiVirus for FileStore configurations ... . . . . . . . . . . . 478
About configuring Symantec AntiVirus forFileStore on all the nodes
in the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Configuring Symantec AntiVirus for FileStore on the cluster's
nodes ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Contents18
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
19/542
About configuring Auto-Protect on FileStore file systems .... . . . . . . . . . . . . . . 481
Configuring Auto-Protect on FileStore file systems .... . . . . . . . . . . . . . . . . . . . . . . . 482
About excluding file extensions .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Configuring file extensions for the Symantec AntiVirus for FileStoreconfiguration file ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
About Symantec AntiVirus for FileStore LiveUpdate ... . . . . . . . . . . . . . . . . . . . . . . 484
Using Symantec AntiVirus for FileStore with LiveUpdate ... . . . . . . . . . . . . . . . 486
About using Symantec AntiVirus for FileStore quarantine
commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
Using Symantec AntiVirus for FileStore quarantine commands .... . . . . . . 491
Setting the Symantec AntiVirus for FileStore action policy ... . . . . . . . . . . . . . 493
About using Symantec AntiVirus for FileStore manual scan
commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Using Symantec AntiVirus for FileStore manual scan
commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495About scheduling a Symantec AntiVirus for FileStore scan job ... . . . . . . . . . 496
Scheduling a Symantec AntiVirus for FileStore scan job ... . . . . . . . . . . . . . . . . . 498
Chapter 18 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
About troubleshooting commands .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
Setting the CIFS log level ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
Retrieving and sending debugging information .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
Updating FileStore GUI-related operations ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507
About the iostat command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507
Generating CPU and device utilization reports ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
Displaying license information for the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
About excluding the PCI ID prior to the FileStore installation .... . . . . . . . . 510
Excluding the PCI IDs from the cluster ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Testing network connectivity ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
About the services command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
Using the services command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515
Using the support login .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517
About network traffic details ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517
Exporting and displaying the network traffic details ... . . . . . . . . . . . . . . . . . . . . . . 518
Accessing processor activity ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519Using the traceroute command .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520
Recovering from a non-graceful shutdown .... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
Contents
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
20/542
Contents20
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
21/542
Introducing SymantecFileStore
This chapter includes the following topics:
About FileStore
About FileStore features
About the core strengths of FileStore
FileStore key benefits and other applications
FileStore on the Web
Using the FileStore product documentation
About FileStoreFileStore was formerly known as Storage Foundation Scalable File Server.
FileStore is a highly-scalable and highly-available clustered Network Attached
Storage (NAS) software appliance. Based on Storage Foundation Cluster File
System technology, FileStore is a complete solution formulti-protocolfileserving.
FileStore provides an open storage gateway model, including a highly- available
and scalable Network File System (NFS), CIFS, and FTP file serving platform andan easy-to-use administrative interface.
The product includes the following key features:
Backup operations using both NDMP and/or the built-in NetBackup client
Active/Active CIFS, including integration with Active Directory operations
Simple administration through a single GUI and/or CLI interface
1Chapter
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
22/542
Active/Active shared data NFS sharing including shared read/write and
LDAP/NIS support
Simpleadministration of Fibre Channel Host BusAdapters (HBAs), file systems,
disks, snapshots, and Dynamic Storage Tiering (DST)
SNMP, syslog, and email notification
High-speed asynchronous/episode-based replication for content distribution
and data mining
Multi-protocolsharing of filesystemsin a highly-scalable andhighly-available
manner
Support for single-node FileStore clusters
Create a snapshot schedule that stores the values by minutes, hour,
day-of-the-month, month, and day-of-the-week along with the name of thefile system
Seamless upgrade and patch management
Support information
Online man pages
The components of FileStore include a security-hardened, custom-install SLES
10 SP3 operating system, core Storage Foundation services including Cluster File
System, and the FileStore software platform. These components are provided on
a single DVD or DVD ISO image.
About FileStore featuresFileStore is designed to provide a full-suite of NAS features, in addition to
class-leading performance and scalability. A partial list of these features is
discussed in the following sections.
Simple installation
A singlenode in the cluster is booted froma DVD containing the operatingsystem
image, core Storage Foundation, and FileStore modules. While the node boots,the other nodes are defined using IP addresses.
After you install FileStore and the first node is up and running, the rest of the
cluster nodes are automatically installed with all necessary components. The key
services are then automatically started to allow the cluster to begin discovering
storage and creating file shares.
Introducing Symantec FileStoreAbout FileStore features
22
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
23/542
Active/Active Scalable NFS
With FileStore, all nodes in the cluster can serve the same NFS shares as both
read and write. This creates very high aggregated throughput rates, because you
can use sum of the bandwidth of all nodes. Cache-coherency is maintained
throughout the cluster.
Active/Active CIFS
CIFS is active on all nodes within the FileStore cluster. The specific shares are
read/write on the node they reside on, but can failover to any other node in the
cluster. FileStore supports CIFS home directory shares.
NFS Lock Management (NLM)
The NFS Lock Management (NLM) module allows a customer to use NFS advisory
client locking in parallel with core SFCFS global lock management. The module
consists of failing over the locks among FileStore nodes as well as forwarding all
NFS client lock requests to a single NFS lock master.
The result is that no data corruption occurs if a user or application needs to use
NFS client locking with an FileStore cluster.
Administration
FileStore contains a role-based administration model consisting of the followingkey roles:
Storage
Master
System
These roles are consistent with the operational roles in many data centers.
For each role, the administrator uses a simple menu-driven text interface. This
interface provides a single point of administration for the entire cluster. A user
logsin asone of those roles on one ofthe nodes in the cluster and runs commands
that perform the same tasks on all nodes in the cluster.
You do not need to have any knowledge of the Veritas Storage Foundation
technology to install oradminister an FileStorecluster. If you arecurrentlyfamiliar
with core SFCFS or Storage Foundation in general, you will be familiar with the
basic management concepts.
Introducing Symantec FileStoreAbout FileStore features
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
24/542
Storage tiering
FileStore's built-in Dynamic Storage Tiering (DST) feature can reduce the cost of
storage by moving data to lower cost storage. FileStore storage tiering also
facilitates the moving of data between different drive architectures.
DST lets you do the following:
Create each file in its optimal storage tier, based on pre-defined rules and
policies.
Relocate files between storage tiers automatically as optimal storage changes,
to take advantage of storage economies.
Prune files on secondary tiers automatically as files age and are no longer
needed.
Retain original file access paths to minimize operational disruption, forapplications, backup procedures, and other custom scripts.
Handle millions of files that are typical in large data centers.
Automate these features quickly and accurately.
High-performance data replication
Included as a standard feature in the Enterprise Edition of FileStore and optional
on the Standard Edition, FileStore Replication provides for high-performance
content distribution across multipleclusters.FileStoreReplication is asynchronous
(sometimes calledepisodic) andprovidesforfile-based replicationbetween clusters,
together with the advantage of being able to only transfer blocks within specific
files that have changed since the last update. With FileStore Replication, the
destination file system can be on-line for reads, and updates to that destination
can be as frequent as every fifteen minutes. FileStore Replication is ideal for
content distribution, or for creating hot-standby replicas of a production
environment.
Integrated content scanning using Symantec AntiVirus for FileStore
New to FileStore is the ability for customers to use Symantec AntiVirus forFileStore. Leveraging content-scanning and anti-virus technology similar to that
found in the Symantec Endpoint Protection range of products, this feature allows
forscheduledandreal-time(on-demand)scanning of files andother data contained
within the FileStore cluster. When conducted in real-time, this content-scanning
can be used with multiple file access protocols, including CIFS, NFS, FTP, and
HTTP. Files canbe automatically quarantinedandregularvirus definition updates
can be obtained by way of the standard Symantec LiveUpdate service.
Introducing Symantec FileStoreAbout FileStore features
24
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
25/542
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
26/542
FileStore key benefits and other applicationsFileStore can be used with any application that requires the sharing of files using
the NFS v3, CIFS, or FTP protocol. Use-cases such as home directories or decisionsupport applications that require sequential shared access, Web pages, and
applications are all ideal for FileStore. FileStore is also applicable when you want
general purpose, high-throughput scale-out processing for your data, together
with enterprise-class highly available cluster functionality.
High performance scaling and seamless growth
FileStore lets you scale storage and processing independently and seamlessly,
online. Because an application may need to scale either storage or processing, or
both, this capability gives you a lot of flexibility.
FileStore automates the installation of new nodes into the running cluster,
configures those nodes, and adds the nodes' capacity into the processing tier.
FileStore can scale from 1 to 16 nodes with near linear performance scaling. You
can add processing one node at a time, rather than buying a large, expensive
independent appliance.
A storage administrator can configure a new array or even add new LUNs from
an existing array into the FileStore cluster. FileStore can then scan the storage,
automatically see the new LUNs and place them under FileStore control for use
in the cluster. All of this is performed online.
At the storage end, resizing of existing file systems can be performed online withno interruption of service. A simple command is used to both add space to an
existing file system and to also reduce (dynamically shrink) the amount of free
space in a specified file system.
The product provides nearly linear scaling in terms of NFS operations per second
and total I/O throughput.
Figure 1-1 depicts this scaling capability.
Introducing Symantec FileStoreFileStore key benefits and other applications
26
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
27/542
Figure 1-1 Example of near-linear performance scaling with FileStore
When using 16-node clusters, extremely high throughput performance numbers
can be obtained. This is due to the benefits of near linear FileStore clusterscalability.
High availability
FileStore has an always on" file service that provides zero interruption of file
services for company critical data.
The loss of single or even multiple nodes does not interrupt I/O operations on the
client tier. This is in contrast to the traditional active/passive failover paradigm.
Further, with FileStore's modular N-to-N approach to clustered NAS, any node
can act as a failover for any other node.The FileStore architecture provides transparent failover for other key services
such as NFS lock state, CIFS and FTP daemons, reporting, logging, and
backup/restore operations. The console service that provides access to the
centralized menu-driven interface is automatically failed over to another node.
The installation service is also highly available and can seamlessly recover from
the initially installed node failing during the installation of the remaining nodes
in the cluster.
The use of Veritas Cluster Server technology and software within FileStore is key
to the ability of FileStore to provide best-of-breed high availability, in addition to
class-leading scale-out performance.
Consolidating and reducing costs of storage
The value of consolidating several independent islands of NAS appliances into
fewer, larger shared pools has many cost benefits.
Introducing Symantec FileStoreFileStore key benefits and other applications
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
28/542
A typical enterprise uses 30-40% of its storage. This low storage utilization rate
results in excessive spending on new storage when there is more than adequate
free space in the data center.
With FileStore, you can group storage assets into fewer, larger shared pools. Thisincreases the use of backend LUNs and overall storage.
FileStore also has built-in, pre-configured heterogeneous storage tiering. This
lets you use different types of storage in a primary and secondary tier
configuration. Using simple policies, data can be transparently moved from the
primary storage tier to the secondary tier. This is ideal when mixing drive types
and architectures such as high-speed SAS drives with cheaper storage, such as
SATA-based drives. Furthermore, data can be stored initially on the secondary
tier and then promoted to the primary tier dynamically based on a pattern of I/O.
This creates an optimal scenario when you use Solid State Disks (SSDs) because
there will often be a significant change between the amount of SSD storageavailable, and amount of other storage availability, such as SATA drives. Data
and files that are promoted to the primary tier are transferred back to the
secondary tier in accordance with the configured access time policy.
All of this results in substantially increased efficiency, and it can save you money
because you make better use of the storage you already have.
Enabling scale-out compute clusters and heterogeneous sharing ofdata
The trend toward scale-out, or grid computing continues to gain pace. There aresignificant performance and cost advantages of moving applications away from
large UNIXSymmetrical Multi-Processing(SMP) or mainframe environmentsand
towards a farmof commodity computer servers running a distributed application.
One of the key inhibitors to scale-out computing is the requirement to provide a
shared storage infrastructure for the compute nodes, and enable you to share
heterogeneously as well as scaleup as performancerequires.FileStore solves both
of these issues by providing a highly scalable and shared storage platform at the
storage tier and by facilitating heterogeneous sharing on the compute tier.
FileStore can provide the performance and availability you need for a large-scale
NFScompute andstorage tier. It providesenoughthroughput andseamlessfailover
for this type of architecture whether a few dozen compute nodes, or scaling to
several hundred nodes.
Introducing Symantec FileStoreFileStore key benefits and other applications
28
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
29/542
FileStore on the WebFor comprehensive, up-to-date information about FileStore, visit the Symantec
Web site:http://www.symantec.com/business/support/overview.jsp?pid=55079
Using the FileStore product documentationFileStore product documentation is available in PDF format on the FileStore
installation DVD in the /docs directory:
Symantec FileStore Web GUI Administrators Guide(sfs_admin_gui.pdf)
Symantec FileStore Command-Line Administrators Guide(sfs_admin.pdf)
Symantec FileStore Installation Guide(sfs_install.pdf)
Symantec FileStore Replication Guide(sfs_replication.pdf)
Symantec FileStore Release Notes (sfs_relnotes.pdf)
Find additional information at this location:
http://www.symantec.com/business/support/overview.jsp?pid=55079
Introducing Symantec FileStoreFileStore on the Web
http://www.symantec.com/business/support/overview.jsp?pid=55079http://www.symantec.com/business/support/overview.jsp?pid=55079http://www.symantec.com/business/support/overview.jsp?pid=55079http://www.symantec.com/business/support/overview.jsp?pid=550797/31/2019 Symantec FileStore Command-Line Administrator's Guide
30/542
Introducing Symantec FileStoreUsing the FileStore product documentation
30
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
31/542
Creating users based onroles
This chapter includes the following topics:
About user roles and privileges
About the naming requirements for adding new users
About using the FileStore command-line interface
Logging in to the FileStore CLI
About accessing the online man pages
About creating Master, System Administrator, and Storage Administrator
users
Creating Master, System Administrator, and Storage Administrator users
About the support user
Configuring the support user account
Displaying the command history
About user roles and privilegesYour privileges within Symantec FileStore (FileStore) are based on what user role
(Master, System Administrator,or Storage Administrator)youhave been assigned.
The following table provides an overview of the user roles within FileStore.
2Chapter
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
32/542
Table 2-1 User roles within FileStore
DescriptionUser role
Masters are responsible for adding or deletingusers, displaying users,and managing passwords. Only the Masters can add or delete other
administrators.
Master
System Administrators are responsible for configuring and
maintaining the file system, NFS sharing, networking, clustering,
setting the current date/time, and creating reports.
System
Administrator
Storage Administrators are responsible for provisioning storage and
exporting and reviewing reports.
Storage
Administrator
The Support account is reserved for Technical Support use only, and it cannot be
created by administrators.
See Using the support login on page 517.
About the naming requirements for adding new usersThe following table provides the naming requirements for adding new FileStore
users.
Table 2-2 Naming requirements for adding new users
DescriptionGuideline
Letter or an underscore (_)
Must begin with an alphabetic character and the rest of the string
should be from the following POSIX portable character set:
([A-Za-z_][A-Za-z0-9_-.]*[A-Za-z0-9_-.$]).
Starts with
Can be up to 31 characters. If user names are greater than 31
characters, you will receive the error, "Invalid user name."
Length
FileStore CLI commands are case-insensitive (for example, the user
commandis thesameas theUSERcommand). However, user-providedvariables are case-sensitive (for example, the username Master1 is
not the same as the username MASTER1).
Case
Hyphens (-) and underscores (_) are allowed.Can contain
Creating users based on rolesAbout the naming requirements for adding new users
32
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
33/542
Table 2-2 Naming requirements for adding new users (continued)
DescriptionGuideline
Valid user names include:
Name:
a.b
a_b
______-
Valid syntax
See Creating Master, System Administrator, and Storage Administrator users
on page 42.
About using the FileStore command-line interfaceYou can enter FileStore commands on the system console or from any host that
can access FileStore through a session using Secure Socket Shell (SSH) .
FileStore provides the following features to help you when you enter commands
on the command line:
Command-line help by typing a command and then a question mark (?)
Command-line manual (man) pages by typing man and the nameofthe command
you are trying to find
Table 2-3 Conventions used in the FileStore online command-line man pages
DescriptionSymbol
Indicates you must choose one of elements on either side of the pipe.| (pipe)
Indicates that the element inside the brackets is optional.[ ] (brackets)
Indicates that the element inside the braces is part of a group.{ } (braces)
Indicates a variable for which you need to supply a value. Variables
are indicated in italics in the man pages.
< >
Logging in to the FileStore CLIWhen you first log in to the FileStore CLI, use the default username/password of
master/master. After you have logged in successfully, change your password.
Creating users based on rolesAbout using the FileStore command-line interface
7/31/2019 Symantec FileStore Command-Line Administrator's Guide
34/542
Note: Changing the default password is important for system security. If you do
not change the default password, a warning message appears the next time you
log in.
See Creating Master, System Administrator, and Storage Administrator users
on page 42.
By default, the initial password for any user is the same as the username. For
example, if you logged in as user1, your default password would also be user1.
To use any of the CLI commands, first log in by using the user role you have been
assigned.Then enter thecorrect mode. These twostepsmust be performedbefore
you can use any of the commands.
Note: The End User License Agreement (EULA) is displ
Top Related