'HOO 3RZHU9DXOW 1 1 DQG 1 6<67(0 $'0,1,675$725 $1' &200$1' 5()(5(1&( *8,'( ZZZ GHOO FRP
___________________ Information in this document is subject to change without notice. © 19981999 Network Appliance, Inc. Licensed to Dell Computer Corporation. All rights reserved. Reproduction in any manner whatsoever without the written permission of Dell Computer Corporation is strictly forbidden.
UHIDFH $ERXW 7KLV *XLGH This guide describes how to configure, operate, and manage Dell PowerVault F720N, F740N, and F760N filers that run Data ONTAP 5.3 software. The guide is organized in three parts: Chapters 1 through 19 describe how to configure, operate, and manage Dell PowerVault 720N, 740N, and 760N filers. Appendix A, Command Reference, provides the commands that you use to control a filer. Glossary provides definitions of terms, acronyms, and abbreviations used in this guide.
The Users Guide provides instructions for configuring and operating a new filer that runs Data ONTAP 5.3 software. You may also have one or more of the following documents. NOTE: Documentation updates are sometimes included with your system to describe changes to your system or software. Always read these updates before consulting any other documentation because the updates often contain the latest information. Documentation is included with any options you purchase separately from your system.
7\SRJUDSKLFDO &RQYHQWLRQV Typographical conventions used in this guide are shown in the following table: &RQYHQWLRQ 7\SH RI ,QIRUPDWLRQ Italic type Words or characters that require special attention. File names. Placeholders for information you must supply. For example, if the guide says to enter the arp -d hostname command, you enter the characters arp -d followed by the actual name of the host. Man page names. Book titles in cross-references. Monospaced font Command and daemon names.
viii
&RQWHQWV &KDSWHU ,QWURGXFLQJ 'HOO )LOHUV About Filers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 What a Filer Is . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Components of a Filer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Filer and Filer Main Unit . . . . . . . . . . . . . . .
Monitoring and Maintaining Filer Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9 Periodic Administration Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9 &KDSWHU )LOHU $GPLQLVWUDWLRQ %DVLFV Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . About This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating Administrative Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7 Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Naming Conventions for Network Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . Interface Types the Filer Supports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . How Interfaces Are Numbered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . How Multiple Ports Are Identified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . How Interfaces Are Named . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sending Automatic Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-27 How Automatic Email Messages Are Controlled. . . . . . . . . . . . . . . . . . . . . . 2-27 How the autosupport Daemon Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-28 Mail Host Requirement for autosupport. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-28 About Configuring autosupport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding Hot Spare Disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Understanding Hot Swap. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Understanding Usable Space on Each Disk. . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Handling Disk Failures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Effects of Disk Failure on Filer Operation . . . . . . . . . . . . . . . . . . . . . . .
Example With Ages Option Specified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16 Example to Determine Volume Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17 Getting a File Statistics Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17 Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Command to Configure the SNMP Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2 SNMP Commands Supported by Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3 About the Dell Custom MIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3 About MIB Group Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 About Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Two Kinds of Trunks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18 Single-Mode Trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-19 Multiple-Mode Trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-19 Hardware Requirements for Trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-20 Virtual Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . .
Displaying the Status of a Trunk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sample Output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Displaying Trunk Statistics . . . . . . . . . . . . . . . . . .
NFS and CIFS Use of the Read-Only Bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4 About Read-only Bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4 How NFS Treats the Read-Only Bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4 How the Filer Tracks the NFS or CIFS Client Read-Only Bit . . . . . . . . . . . . . . 5-5 Naming Files Used by Both NFS and CIFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
CIFS File Name Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Case Preservation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Case Conversion Procedures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Forcing CIFS File Names to Lowercase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Displaying WAFL Credential Cache Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-21 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-21 Step . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-21 Sample Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-22 Displaying a Mapping Result for a UNIX Name. . . .
Filer Determines Permissions by Matching Longest Prefix. . . . . . . . . . . . . . . 6-4 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4 Edit /etc/exports After Changing Volume Names . . . . . . . . . . . . . . . . . . . . . . 6-4 Default /etc/exports Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5 /vol/vol0 and /vol/vol0 home Are Exported by Default. . . . . . . . . . . . . . . . . . .
Format for IP Subnet Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11 Export to a Subnet as You Do to a Client. . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11 Example:root access: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11 Example 2: read/write access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-12 Example 3: equivalent methods for exporting . . . . . . . . . . . . . . . . . . . .
Changing a Filers Description From Server Manager . . . . . . . . . . . . . . . . . . . 7-3 Viewing a Filers Description From the Filer Command Line. . . . . . . . . . . . . . 7-3 Changing a Filers Description From the Filer Command Line. . . . . . . . . . . . . 7-3 Adding CIFS Users to the Filer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3 When You Add CIFS Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Displaying Information About Shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15 Methods of Displaying Information About Shares . . . . . . . . . . . . . . . . . . . . . 7-15 Using Server Manager to View Information About Shares . . . . . . . . . . . . . . 7-16 Using the cifs Shares Command to View Information About Shares. . . . . . . 7-16 Examples of Displaying Share Information . . . . . . . . . . . . . . . . . . . . . . . 7-16 Deleting a Share . . . . . . . . . . . . . . . .
Active Event Log Naming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Log Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Event Log Detail Displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . How to Examine an Event in Detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Windows File Access Detail Displays . . . . . . . . . . . . . . . . . . . . . . . . . . .
Displaying CIFS Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-34 How and Why to Display CIFS Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-34 Statistics Displays With the cifs stat Command . . . . . . . . . . . . . . . . . . . . . . 7-34 Example Of cifs stat Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-35 Displaying CIFS Session Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the HTTP Virtual Firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5 About the HTTP Virtual Firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5 Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5 Using Virtual Hosting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5 About Virtual Hosting. . . . . . . . . . . . . .
Example 2 of snap sched Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6 Snapshots Created by This Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6 Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7 User-Defined Automatic Snapshots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
&KDSWHU TWUHH $GPLQLVWUDWLRQ About qtrees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . qtree Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Volumes and qtrees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Uses of qtrees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
&KDSWHU 4XRWDV DQG 0D[LPXP 1XPEHU RI )LOHV Restricting or Tracking Disk Usage by Using Disk Quotas . . . . . . . . . . . . . . . . . . 11-1 About Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1 Format of the Quotas File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1 Quota Target Field. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Metadata Being Backed Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2 How to Exclude Certain Types of Data From the Backup . . . . . . . . . . . . . . . 12-3 Windows NT ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3 Exclude List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3 Devices Used by the Dump Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Recommendations for Minimizing Backup Time and Data Loss . . . . . . . . . 12-11 Use Multiple Local Tape Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-12 Organize Data to be Backed Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-12 Limit the Amount of Data in Each Backup . . . . . . . . . . . . . . . . . . . . . . 12-12 Schedule the Backups Appropriately . . . . . . . . . . . . . . . . . . . . . . . . . . 12-12 Avoid Using an Exclude List . . . . . . . . . . . . . .
No Disk Slots Are Available for Expansion . . . . . . . . . . . . . . . . . . . . . . . 13-1 The Entire Filer Is Damaged and Unusable. . . . . . . . . . . . . . . . . . . . . . . 13-1 When You Do Not Recover Data From Tape. . . . . . . . . . . . . . . . . . . . . . . . . 13-2 Different Methods for Recovering Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2 What Data Cannot Be Recovered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How to Use a Filer Tape Drive to Restore Files to Another System. . . . . . . . . . 13-12 About This Section . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-12 Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-12 Format for Specifying Filer Tape Drive. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Verifying the Size of Each Volume. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-4 Verifying the Contents of the Destination Volume . . . . . . . . . . . . . . . . . . . . 15-4 Verifying the Relationship Between Filers. . . . . . . . . . . . . . . . . . . . . . . . . . . 15-4 Verifying Localhost as a Trusted Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-4 Recommendation for Copying a Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-4 Consequences of Deleting a Required Snapshot. . . . . . . . . . . . . . . . . . . . . . 16-5 How SnapMirror Works With Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-6 Quotas on the Mirror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-6 How to Apply the Same Quota Restrictions on the Former Mirror . . . . . . . .
Checking Data Replication Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Prerequisite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Explanation of Interface Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-5 Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-5 GB Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-7 Improving Filer Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-8 About This Section . . . . . . . . . . . . . . . . . . . . . . . . .
Disk Failure With a Hot Spare Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-6 About This Section. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-6 Filer Replaces Disk With Spare and Reconstructs Data . . . . . . . . . . . . . . . . 18-7 Related Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-7 Disk Errors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Filer Cant Register With the Windows NT Domain. . . . . . . . . . . . . . . . . . . 18-15 Using WINS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-15 Not Using WINS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-16 Incorrect Password or Unknown Username . . . . . . . . . . . . . . . . . . . . . . . . 18-17 Users Cannot Map a Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
CIFS Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . What the CIFS Options Do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The cifs.access_logging_enable Option. . . . . . . . . . . . . . . . . . . . . . . . . . . . . Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The cifs.symlinks.enable Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-7 Default. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-7 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-7 DNS Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-7 What the DNS Options Do. . . . . . . . . . . . . . . . . .
The nfs.v2.df.2gb.lim Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The nfs.v3.enable Option. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The timed.max_skew Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-13 Default. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-13 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-14 The timed.proto Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-14 Default. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The ip.match_any_ifaddr Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The ip.path_mtu_discovery.enable Option. . . . . . . . . . . . . . . . . . . . . . . . . . Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
$SSHQGL[ $ &RPPDQG 5HIHUHQFH $ User Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-3 File Formats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-114 Headers, Tasks, and Macros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-118 System Services and Daemons. . . . . . . . . . . . . . . . . . . . .
Table 2-15. Table 2-16. Table 2-17. Table 2-18. Table 2-19. Table 2-20. Table 2-21. Table 3-1. Table 3-2. Table 3-3. Table 4-1. Table 4-2. Table 4-3. Table 4-4. Table 4-5. Table 4-6. Table 4-7. Table 4-8. Table 5-1. Table 5-2. Table 5-3. Table 6-1. Table 6-2. Table 7-1. Table 7-2. Table 7-3. Table 7-4. Table 7-5. Table 7-6. Table 7-7. Table 7-8. Table 8-1. Table 8-2. Table 8-3. Table 9-1. Table 9-2. Table 9-3. Table 10-1. Table 10-2. Table 10-3. Table 10-4. Table 12-1. Table 12-2.
Table 12-3. Table 13-1. Table 13-2. Table 15-1. Table 15-2. Table 15-3. Table 15-4. Table 16-1. Table 16-2. Table 17-1. Table 17-2. Table 17-3. Table 17-4. Table 17-5. Table 17-6. Table 17-7. Table 18-1. Table 18-2. Table 18-3. Table 18-4. Table 18-5. Table 19-1. Shared by Multiple Filers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-20 Sample of Backing Up the Entire Filer . . . . . . . . . . . . . . . . . . . . . 12-22 restore Command Function Keys . . . . . . . . . . . . . . . . . . .
l
&+$37(5 ,QWURGXFLQJ 'HOO )LOHUV $ERXW )LOHUV :KDW D )LOHU ,V A filer is a hardware and software system. It acts on network requests from clients and processes them by writing data to or retrieving data from disks in PowerVault 700N Disk-Array Enclosure (DAE) storage systems that are connected to it. The software that enables the filer to perform these tasks is the Data ONTAP 5.3 operating system. &RPSRQHQWV RI D )LOHU A filer consists of the following major components listed in Table 1-1.
7DEOH )LOHU )HDWXUHV )HDWXUH 'HVFULSWLRQ Network file service The filer enables users on client workstations to create, delete, modify, and access files stored on it. Client workstations are connected to the filer through network connections. Multiprotocol file sharing Clients can use the following protocols to access data on the filer: CIFS (Common Internet File System)used by Windows clients. HTTP (HyperText Transmission Protocol) used by the World Wide Web.
&RPPDQG ([HFXWLRQ 7KURXJK WKH )LOHU·V &RPPDQG /LQH You use the filers command line to execute all Data ONTAP 5.3 administrative commands from the command line, with the exception of some Windows NT administrative commands. You can access the filers command line from A serial terminal connected to the Console port of the filer A telnet session to the filer You can also access some commands through a remote shell program, such as the UNIX rsh utility.
7DEOH )LOHU ,QWHUQDO &RPSRQHQWV &RPSRQHQW 'HVFULSWLRQ System board The system board is the main board of the filer. It has upgradable firmware. All components are connected to the system board. System memory System memory stores information temporarily. NVRAM (Nonvolatile Random Access Memory) Data ONTAP 5.3 uses NVRAM to log network transactions as a data integrity measure. In case of a system or power failure, Data ONTAP 5.3 uses the contents of NVRAM to restore network data to disk.
7DEOH 6ORWV DQG 3RUWV &RPSRQHQW 'HVFULSWLRQ Slots The filer contains expansion slots for network interface cards, tape drive adapters, and PowerVault 700N storage system adapters. Serial ports The two serial ports are as follows: The console port connects to the filer a serial terminal that you can use as a console. The diagnostics port is not used.
'DWD 6WRUDJH 0DQDJHPHQW Data ONTAP 5.3 stores data on disks in PowerVault 700N storage systems. Disks are organized into RAID groups, and RAID groups are organized into volumes. These items are explained in Table 1-5, along with what aspects of them you can administer. 7DEOH 'DWD 6WRUDJH 0DQDJHPHQW &RQFHSWV 'DWD 6WRUDJH &RQFHSW ([SODQDWLRQ 6WRUDJH $GPLQLVWUDWLYH $FWLRQV RAID (Redundant Array of Independent Disks) A feature that enables file access even if one disk in a RAID group is damaged.
7DEOH 'DWD 2UJDQL]DWLRQ 0DQDJHPHQW &RQFHSWV 'DWD 2UJDQL ]DWLRQ FRQFHSW volume ([SODQDWLRQ 'DWD 2UJDQL]DWLRQ $GPLQLVWUDWLYH $FWLRQV An independent file system.
Copy volumes Mirror volumes )LOHU $GPLQLVWUDWLRQ :LWK 'DWD 217$3 )LOHU $GPLQLVWUDWLRQ $FWLYLWLHV Administering a filer involves the following activities: Configuring the filer Monitoring and maintaining client access to data Monitoring and maintaining network access Monitoring and maintaining filer hardware Performing periodic administration tasks &RQILJXULQJ WKH )LOHU You configure the filer by running either the Setup Wizard or the setup program or both if necessary, then editing co
You maintain network access by following general filer network administration procedures and procedures specific to your protocol. These procedures are described in later chapters in this guide. 0RQLWRULQJ DQG 0DLQWDLQLQJ )LOHU +DUGZDUH You monitor hardware by gathering statistics about your hardware and analyzing them for performance. You maintain the hardware as described in the appropriate hardware guides.
7DEOH 3HULRGLF $GPLQLVWUDWLRQ 7DVNV FRQWLQXHG +RZ 2IWHQ 7DVN &RPPDQG RU )LOH Weekly Review filer disk usage on a peruser level. quota report FRPPDQG Test connectivity to NT Domain Controller. cifs testdc FRPPDQG Review current shared CIFS directories. cifs shares FRPPDQG Review NFS exports /etc/exports file Review filer network traffic statistics. netstat FRPPDQG Review network interface performance statistics on a per-interface level.
&+$37(5 )LOHU $GPLQLVWUDWLRQ %DVLFV 2YHUYLHZ $ERXW 7KLV &KDSWHU This chapter describes routine filer administration procedures that you need regardless of the file-sharing protocols licensed for your filer. This chapter emphasizes the filer characteristics that distinguish the filer from a general-purpose server. 8VLQJ WKH $GPLQLVWUDWLRQ +RVW $ERXW WKH $GPLQLVWUDWLRQ +RVW The filer recognizes a single client computer as the administration host.
7DEOH $GPLQLVWUDWLRQ +RVW 3ULYLOHJHV FRQWLQXHG ,I WKH DGPLQLVWUDWLRQ KRVW LV a CIFS client
'HVLJQDWLQJ WKH 5RRW 9ROXPH If you add volumes to your filer, you choose a volume to be the root volume during the multivolume configuration process. For more information about designating the multiple volume configuration process, read Chapter 3, Disk and File System Management.
7DEOH (GLWLQJ &RQILJXUDWLRQ )LOHV )URP D 1,)6 &OLHQW 6WHS $FWLRQ If the NFS client is... Then... the administration host Mount the filer root volume to the host. not the administration host 1. Mount the filer root volume to the administration host. 2. From the administration host, edit the /etc/exports file on the root volume to grant root permission to the client. 3. Use the filer console, a telnet client, or the rsh command to issue the following command to the filer: H[SRUWIV 4.
2EWDLQLQJ $FFHVV WR WKH )LOHU 6KHOO :D\V WR $FFHVV WKH &RPPDQG /LQH The filer supports a command-line interface. You can access the command line: directly, from the system console remotely, using telnet remotely, using a remote shell such as rsh 6KDULQJ D 6LQJOH WHOQHW DQG &RQVROH 6HVVLRQ The console and telnet share a single session. Everything entered through telnet is echoed at the console; everything entered at the console is echoed to the telnet session.
. 7DEOH &RPPDQGV $FFHSWHG )URP UVK cifs httpstat rdate timezone date mt reboot uptime df netstat restore version disk nfsstat route vif download options snap vol dump qtree snmp ypwhich exportfs quota sysconfig halt raid sysstat 8VH &WUO & WR 7HUPLQDWH WKH &RPPDQG 7KDW ,V 5XQQLQJ Ctrl-C terminates whatever command is being run from the console or a telnet session.
0XOWLSOH $GPLQLVWUDWLYH 8VHUV ,QFUHDVH )LOHU 6HFXULW\ Adding multiple administrative users to a filer means you no longer need to share the root password. Instead, administrative users access the filer, either locally or remotely, with a unique login name and password. The filer records each user name at login with a syslog message in /etc/messages, to enable auditing.
7DEOH &KDUDFWHU 5HVWULFWLRQV IRU 8VHU 1DPH &KDUDFWHU &KDUDFWHU * (asterisk) < (less than sign) \ (back slash) | (pipe) : (colon) + (plus sign) , (comma) ? (question mark) = (equal sign) ] (right bracket) / (forward slash) ; (semicolon) > (greater than sign) space [ (left bracket) 6WHSV WR &UHDWH D 1HZ $GPLQLVWUDWLYH 8VHU 8VLQJ D &RQVROH RU 7HOQHW To create a new administrative user using the filer console or a telnet session, perform the following steps: 1.
&DXWLRQ You are not prompted for a password when deleting a user. 6WHS To delete an administrative user, enter the following command: XVHUDGPLQ XVHUGHO XVHUBQDPH user_name is the login name you want to delete. /LVWLQJ $GPLQLVWUDWLYH 8VHUV 'HVFULSWLRQ Use the userlist option to get a list of administrative users on a filer. You can use the userlist option at any time to determine whether you need to add or delete administrative users.
6WHSV WR &KDQJH DQ $GPLQLVWUDWLYH 3DVVZRUG 8VLQJ D &RQVROH RU WHOQHW To change an administrative user password using a console or telnet, perform the following steps: 1. Enter the passwd command. 2. When prompted, enter the administrative user name of the user whose password you want to change. 3. Enter the old password. 4. Enter the new password.
3URFHGXUH WR %RRW WKH )LOHU To boot the filer, perform the following steps: 1. Ensure that the RN prompt is displayed on the console. 2. Enter the following command: boot 3URFHGXUH WR 5HERRW WKH )LOHU You can halt and reboot the filer in a single operation by entering the following command: UHERRW :KHUH WKH )LOHU %RRWV )URP When the filer boots, it uses the boot diskette in its diskette drive, if there is one. Otherwise, the filer boots from its hard disk.
8QGHUVWDQGLQJ WKH )LOHU 'HIDXOW &RQILJXUDWLRQ $ERXW WKH 'HIDXOW &RQILJXUDWLRQ The default configuration of a filer depends on whether the filer is running NFS, CIFS, or both; and NIS. Although the default configuration is usable for small sites, it is probably not secure enough for large sites or for sites connected to the Internet. Subsequent sections in this chapter describe in greater detail how you might want to modify the default configuration to suit your needs.
7DEOH 3HUPLVVLRQV IRU WKH 'HIDXOW 'LUHFWRULHV FRQWLQXHG 7KLV GLUHFWRU\ The /home directory )URP WKLV FOLHQW +DV WKHVH SHUPLVVLRQV NFS permissions associated with individual users and with groups through UNIX security database CIFS permissions assigned by the filer administrator for the HOME share $FFHVVLQJ WKH 'LUHFWRULHV Table 2-6 shows how to access the default directories. Replace filer with the host name of your filer.
7DEOH &RQWHQWV RI WKH HWF 'LUHFWRU\ FRQWLQXHG )LOH QDPH &RQWHQWV cifsconfig.txt CIFS commands that the filer used for configuration )LOH VKDULQJ SURWRFRO CIFS only The filer maintains this file automatically whenever you enter a cifs command, which can cause changes you make manually to be lost. To edit this file, terminate CIFS service by using the cifs terminate command, edit and save the file, then reboot the filer.
7DEOH 8VLQJ WKH KRPH 'LUHFWRU\ )RU 1)6 FOLHQWV )RU &,)6 FOLHQWV The /home directory is exported with read and write permissions to all NFS clients, and with root access to the administration host. The /home directory can be shared by CIFS users as the home share immediately after setup finishes. Clients can mount directories after the filer host name is added to the filer /etc/hosts file or to the clients name server.
See Editing Configuration Files for instructions about editing files from NFS and CIFS clients. 3. Save the edited file. 4. Reboot the filer to test the new configuration. If the new configuration does not work as desired, repeat steps 2 through 4.
7DEOH 'HIDXOW HWF UF &RPPDQG &RQWHQWV &RPPDQG ([SODQDWLRQ KRVWQDPH ILOHU Sets the filers host name. LIFRQILJ H KRVWQDPH® LIFRQILJ H KRVWQDPH® Sets the IP address for the filers Ethernet and Gigabit Ethernet interfaces with a default network mask. The arguments in single backquotes expand to filer if you specify filer as the host name during setup.
7DEOH 'HIDXOW HWF UF &RPPDQG &RQWHQWV FRQWLQXHG &RPPDQG ([SODQDWLRQ RSWLRQV QLV GRPDLQQDPH GHOO FRP RSWLRQV QLV HQDEOH RQ These options set the NIS domain name and enable NIS. WLPH]RQH 86 3DFLILF Sets the time zone. The argument to the timezone command specifies which file in the /etc/zoneinfo directory on the root volume describes the time zone you want. VDYHFRUH Saves the core file from a system panic, if any, in the /etc/crash directory on the root volume.
1DPLQJ &RQYHQWLRQV IRU 1HWZRUN ,QWHUIDFHV ,QWHUIDFH 7\SHV WKH )LOHU 6XSSRUWV The filer supports the following interface types: Ethernet Gigabit Ethernet Virtual +RZ ,QWHUIDFHV $UH 1XPEHUHG Interface numbers are assigned based on the slot in which the interface card is installed. For more information about how network interfaces are numbered, refer to the hardware guide for your specific filer. +RZ 0XOWLSOH 3RUWV $UH ,GHQWLILHG Some Ethernet interface cards support four ports.
7DEOH +RZ ,QWHUIDFHV $UH 1DPHG ,QWHUIDFH W\SH /HWWHU XVHG LQ QDPH ([DPSOHV RI QDPHV Ethernet (single) e e0 e1 Ethernet (quad-port) e e0a e0b e0c e0d e1a e1b 9LUWXDO ,QWHUIDFH 1DPHV The name of a virtual interface is a string that is no longer than 15 characters that meets the following criteria: It must begin with a letter. It must not contain a space. It must not already be in use for a virtual interface. Virtual interface names are case-sensitive.
7DEOH +RVW 1DPH ([DPSOH ,QWHUIDFH +RVW QDPH Single-port Ethernet card in slot 0 filer-0 Quad-port Ethernet card in slot 1 filer-1a filer-1b filer-1c filer-1d 5HDVRQV WR )ROORZ D 6SHFLDO 5HFRYHU\ 3URFHGXUH Certain configuration errors can require you to follow a special recovery procedure because The filer does not have a local text editor. Problems with interface configuration can make the filer inaccessible to clients from which the /etc/rc file can be edited.
&RUH )LOHV $ERXW &RUH )LOHV When a hardware or software failure causes the filer to crash, the filer creates a core file that Dell technical support can use to troubleshoot the problem. &RUH )LOH 6WRUDJH LQ HWF FUDVK On the first boot after a system crash, the filer stores the core file in the /etc/crash directory on the root volume. :KDW WKH VDYHFRUH &RPPDQG 'RHV The savecore command, which is included in the default /etc/rc file on the root volume Produces a core.n.nz file.
7DEOH &RUH 'XPS 6SDFH FRQWLQXHG 0HPRU\ LQ 0% 'LVNV 1HHGHG 224 12 256 or more 14 0HVVDJH /RJJLQJ $ERXW 0HVVDJH /RJJLQJ The filer maintains messages in the /etc/messages file on the root volume. The level of information that the filer records in the /etc/messages file is configurable. $ERXW WKH V\VORJG 'DHPRQ DQG WKH HWF V\VORJ FRQI )LOH The message logging daemon, syslogd, uses the /etc/syslog.conf configuration file on the filer root volume to determine how to log system messages.
7DEOH IDFLOLW\ 3DUDPHWHU .H\ZRUGV FRQWLQXHG .H\ZRUG 'HVFULSWLRQ kern messages from the filer kernel * messages from all facilities 7KH OHYHO 3DUDPHWHU The level parameter describes the severity of the message. Table 2-15 describes the level parameter keywords arranged in order from highest to lowest severity. 7DEOH OHYHO 3DUDPHWHU .H\ZRUGV .
7DEOH DFWLRQ 3DUDPHWHUV FRQWLQXHG $FWLRQ ([DPSOH Send messages to the console. /dev/console or * ([DPSOH /LQH )URP HWF V\VORJ FRQI The following example causes all kernel messages of levels emerg, alert, crit, and err to be sent to the /etc/messages file: HUU NHUQ HWF PHVVDJHV 7KH HWF PHVVDJHV )LOH 5HVWDUW 6FKHGXOH Every Sunday at midnight, the /etc/messages file is copied to /etc/messages.0, the /etc/messages.0 file is copied to /etc/messages.1, and so on.
)RU 0RUH ,QIRUPDWLRQ For more information about the syslog.conf file, see the syslog.conf(5) man page. &RQILJXULQJ )LOHU 2SWLRQV &RPPDQGV WR 8VH WR 6HW 2SWLRQV The filer recognizes two commands, options and vol options, to set options. The options Command describes the syntax for the options command. The vol options Command describes the syntax for the vol options command.
7KH YRO RSWLRQV &RPPDQG YRO RSWLRQV &RPPDQG &RQILJXUHV 9ROXPH /HYHO %HKDYLRU You use the vol options command to configure volume-level behavior. You can use this command only with volume options, which are listed in the section, Volume Options, in Chapter 19. Changes made with the vol options command are persistent between reboots you do not need to add them to the /etc/rc file.
+RZ WKH DXWRVXSSRUW 'DHPRQ :RUNV The autosupport daemon is enabled by default on the filer. The daemon triggers automatic email messages to customer-defined administrator accounts, alerting them to potential filer problems. 0DLO +RVW 5HTXLUHPHQW IRU DXWRVXSSRUW Because the filer doesnt function as a mail host, it relies on another host at your site that listens on the SMTP port (25) to send mail.
&RQWHQWV RI $XWRPDWLF (PDLO 0HVVDJHV Each email message generated by autosupport contains the following types of information: date and time stamp of the message Data ONTAP 5.
Specifying mail hosts: The command to specify hosts that send autosupport email messages is as follows: RSWLRQV DXWRVXSSRUW PDLOKRVW KRVWQDPH You can specify up to five mail host names. Separate names by commas and do not include spaces in the list. The default is the administration host.
6HQGLQJ D 6KRUW 0HVVDJH The options autosupport.noteto command specifies the recipients of short email messages sent by autosupport. The short email messages are for urgent events, such as disk failures or filer reboots.
NOTE: There is currently no Windows 9x or Windows NT counterpart to the rdate command. If you want to use the rdate command, you must have a UNIX workstation that supports rdate on your filers network. :KHQ WR 8VH WKH UGDWH &RPPDQG You use the rdate command when you need time accuracy only to the second, or when you want to keep your current method of synchronizing time.
:KHQ WR 8VH 6173 You use SNTP when you need a high degree of accuracy. /LVW RI WLPHG 2SWLRQV Before using SNTP, you set the timed options as described in Synchronizing Filer System Time or accept the default settings. The timed options are listed in Table 2-20. For details about the timed options, see Timed Options. 7DEOH /LVW RI WLPHG 2SWLRQV 7LPHG RSWLRQ )XQFWLRQ 'HIDXOW timed.enable Determines whether the timed daemon runs. Off timed.
6WHSV To set the timed options so that you can synchronize filer time, perform the following steps: 1. Turn on the timed daemon by entering the following command: options timed.enable on 2. If desired, turn on console logging of time changes initiated by the timed daemon by entering the following command: options timed.log on 3. Specify the maximum discrepancy allowed before time is not synchronized by entering the following command: options timed.max_skew nu n is the number of units (specified by u).
6. Specify up to five time servers by entering the following command: options timed.servers servers servers is a list of the host names or IP addresses of up to five time servers, separated by commas. 8VLQJ RSWLRQV &RPPDQG 2SWLRQV WR 0DLQ WDLQ )LOHU 6HFXULW\ :KDW WKH 2SWLRQV WR WKH RSWLRQV &RPPDQG 'R The following options to the options command help maintain filer security: The telnet.hosts option restricts telnet access to a limited number of hosts.
6RIWZDUH /LFHQVHV $ERXW 6RIWZDUH /LFHQVHV The filer requires software licenses to enable these services and features: NFS CIFS HTTP SnapMirror SnapRestore Licenses are installed on the filer at the factory per your order, so the initial setup of your filer does not involve entering license codes. You need to enter license codes only if any of the following conditions applies: You purchased a filer with a release earlier than Release 4.0, and you are upgrading it to Release 4.0 or later.
7DEOH OLFHQVH &RPPDQG 6HUYLFH RU )HDWXUH 6HUYLFH RU IHDWXUH NFS 0HVVDJHV QIV OLFHQVH HQDEOHG QIV HQDEOHG The filer also automatically runs the nfs on command to start NFS service. However, the filer does not add the nfs on command to /etc/rc as a result of the license command. If you want the filer to run NFS service after each reboot, add nfs on to /etc/rc.
'LVDEOLQJ D /LFHQVH To disable a license, enter DISABLE as the code for the protocol. For example, to disable your filers license for NFS, enter OLFHQVH QIV ',6$%/( After you disable a license, your filer stops service for the corresponding protocol. You can restart the service by reentering the license code. 5HSODFLQJ /LFHQVH &RGHV If you misplace a license code, contact Dell technical support to obtain a copy.
&+$37(5 'LVN DQG )LOH 6\VWHP 0DQDJHPHQW 'LVN &RQFHSWV &KDSWHU &RQWHQWV This chapter covers the following topics: Understanding RAID groups About disk addresses Use disk scrubbing to protect data from media errors Understanding hot spare disks Understanding hot swap Using disks of various sizes Understanding usable space on each disk Handling disk failures Effects of disk failure on filer operation 8QGHUVWDQGLQJ 5$,' *URXSV The filer uses RAID Level 4 to ensure data integrity even wh
automatically assigns disks to RAID groups and creates new RAID groups as each RAID group is filled with its maximum number of disks. RAID group size: The following characteristics apply to RAID group size: The default number of disks in a RAID group (including the parity disk) is 14. A RAID group must contain at least two disks. The largest RAID group size you can create manually is 28 disks. The maximum RAID group size is 52 disks.
8VH 'LVN 6FUXEELQJ WR 3URWHFW 'DWD )URP 0HGLD (UURUV The filer uses the RAID disk scrubbing procedure to increase data availability. The filer scans each disk in the RAID group for media errors. If the filer finds media errors, it fixes them by reconstructing the data from parity and rewriting the data. Disk scrubbing reduces the chance of a multiple disk failure, caused by a disk media error encountered while the system was running in degraded mode.
If the filer finds a media error on a data disk, it prints the following message: 5HZULWLQJ EDG EORFN IURP SDULW\ RQ GLVN Q EORFN Q If the filer finds more than one bad block, it prints the following message: 0XOWLSOH EDG EORFNV IRXQG RQ YROXPH YROXPHBQDPH 5$,' JURXS Q VWULSH Q The following sample messages appear after disk scrubbing is complete: 6FUXE IRXQG Q SDULW\ LQFRQVLVWHQFLHV 6FUXE IRXQG Q PHGLD HUURUV 'LVN VFUXEELQJ ILQLVKHG 8QGHUVWDQGLQJ +RW 6SDUH 'LVNV In addition to data disks
encourage you to replace the failed disk. You can change the amount of time from 24 hours to another value using the raid.timeout option to the options command. (IIHFWV RI 'LVN )DLOXUH RQ )LOHU 2SHUDWLRQ The effects of a disk failure on filer operation depend on whether the filer has a hot spare disk. Without a hot spare disk: If the filer is not equipped with a hot spare disk, after a disk fails the filer enters a state called degraded mode.
The sysconfig -r command displays which disk is reserved as the hot spare disk. In addition to disk failure and hot spare disk replacement activity, the /etc/messages file logs any failure in a periodic check of the hot spare disk. Command to control RAID data reconstruction speed: You can control the speed of RAID data reconstruction by entering the following command: RSWLRQV UDLG UHFRQVWUXFWBVSHHG VSHHG where speed is a number ranging from 1 (slowest) to 10 (fastest).
The filer uses two naming conventions to indicate the root volume: /vol/vol0 / In the /vol/vol0 convention /vol Indicates that the next part of the path, such as vol0 in this example, is a volume name. /vol0 Indicates the default name of the root volume for a filer. You can change this name using the vol rename command. Mounting volumes: On filers configured with multiple volumes, mounting / is equivalent to mounting /vol/vol0/, (where vol0 is the root directory of the root volume).
Take individual volumes off-line, for example, to perform administrative tasks on their file systems or associated RAID groups, while the other volumes remain online, without interrupting the availability of the data on them. Limitations of configuring with multiple volumes include The filers storage space is partitioned. You can expand but not concatenate, shrink, or split volumes. Additional administrative overhead is introduced, for example, defining export points.
3URFHGXUHV IRU 0DQDJLQJ 'LVNV DQG 9ROXPHV 6HFWLRQ &RQWHQWV This section provides step-by-step procedures for performing many filer management tasks from the command line on a filer administration host or client. It is organized into two main sections: Disk management tasks Volume management tasks Alternatively, you can perform these procedures using the FilerView program, which has a graphical interface.
,QVWDOOLQJ 1HZ 'LVNV New disks are ones that have never been used. Perform the following steps to install new disks. 1. Install one or more disks according to the refer to the Installation and Troubleshooting Guide for your PowerVault 700N storage system. The system displays a message confirming that one or more disks were installed, then waits 15 seconds as the disk(s) is turned on. The system recognizes the disks as a hot spare disks.
2. Type the following command to spin down the disk, replacing disk_name with the name of the disk from the output in Step 1: GLVN UHPRYH GLVNBQDPH After the disk stops spinning, the disk is ready to be removed. 3. Remove the disk from the filer following the instructions in the hardware guide for your filer model. File service resumes 15 seconds after you remove the disk.
where newvol is the name for the new volume and n is the number of disks to use. You must have at least n spare disks available. $IWHU &UHDWLQJ D 1HZ 9ROXPH After you create a new volume on a CIFS filer, you must create shares that refer to the new volume to enable clients to access it. After you create a new volume on an NFS filer, you must 1. Update the system /etc/exports file. 2. Run exportfs. 3.
Although you can convert a mirror into a regular volume, you cannot set the snapmirrored option to on to convert a regular volume into a mirror. To start using a volume as a mirror, follow the instructions in Chapter 16, Data Replication Using SnapMirror, to mirror data to the volume.
4. If the filer renamed the foreign volume because of a name conflict, type the following command to rename the volume: YRO UHQDPH ROGQDPH QHZQDPH Example: The following command renames the volume vol0(1) to vol1: YRO UHQDPH YRO YRO 5. Type the following command to bring the volume on-line in the new filer, replacing volume_name with the name of the volume: YRO RQOLQH YROXPHBQDPH 6.
If the failed volume was the filers root volume, you must designate another volume as the new root volume. )LOH 6WDWLVWLFV IRU 9ROXPHV +RZ 'DWD 217$3 3URYLGHV )LOH 6WDWLVWLFV The filestats command provides you with a quick way to display a summary of file statistics within a volume on a filer, by reading file information from a snapshot that you specify.
),/( 6,=( . . . 0 0 0 * 0$; &808/$7,9( &2817 &808/$7,9( 727$/ .% $*( $7,0( ' ' ' ' 0$; &808/$7,9( &2817 8,' &2817 727$/ .% *,' &2817 727$/ .% &808/$7,9( 727$/ .
you can have before exceeding your space limit. In this example, 13 daily snapshots is your limit. ([DPSOH WR 'HWHUPLQH 9ROXPH &DSDFLW\ You can also use the filestats command to determine when most activity occurs on a volume during a given day so that you can effectively schedule hourly snapshots.
6WHS To use the filestats command, enter the following command: filestats volume volume_name snapshot snapshot_name (where YROXPHBQDPH LV WKH QDPH RI WKH YROXPH DQG VQDSVKRWBQDPH LV WKH QDPH RI WKH VQDSVKRW ILOHVWDWV &RPPDQG 2SWLRQV 2SWLRQV WR 8VH :LWK WKH ILOHVWDWV &RPPDQG You can use the following options with the filestats command: ages timetype sizes style expr $ERXW WKH $JHV 2SWLRQ The ages option of the filestats command enables you to see when files have been accessed.
$ERXW WKH WLPHW\SH 2SWLRQ The timetype option enables you to specify the time types that you want to list in the age comparison. Table 3-1 describes the valid timetype values you can use with the timetype option. 7DEOH 9DOLG 9DOXHV IRU WLPHW\SH 2SWLRQ 9DOXH 'HILQLWLRQ a Access time m Modification time c File change time (last size/status change) cr File creation time $ERXW WKH VL]HV 2SWLRQ The sizes option enables you to specify the breakdown of sizes, using a comma to separate each value.
$ERXW WKH 6W\OH 2SWLRQ The style option controls the output style. The three style option arguments are as follows: readable. This is the default and is what you see when you use the filestats command with no style option. table. Use the table argument when the filestats output will be used by processing programs. html. Use the html argument for output that will be read by a Web browser. $ERXW WKH H[SU 2SWLRQ The expr option is an advanced option of the filestats command.
7DEOH 9DOLG )LOH $WWULEXWHV IRU H[SU 2SWLRQ FRQWLQXHG $WWULEXWH 'HILQLWLRQ ctimeage Size/status time age crtimeage File creation age %RROHDQ ([SUHVVLRQV WR 8VH :LWK WKH H[SU 2SWLRQ You can use the following standard Boolean expressions as arguments to the expr option as shown in Table 3-3. 7DEOH H[SU 2SWLRQ %RROHDQ ([SUHVVLRQV $UJXPHQW $UJXPHQW && > || < == >= != >= ! NOTE: Enclose the entire Boolean string following the expr option in quotation marks.
Using either of these methods takes a longer time than reverting the volume. This is because with SnapRestore, no data needs to be copied; the file system is just put back in its earlier state. SnapRestore is a licensed feature. You must purchase and install the license code before you can use it. +RZ 6QDS5HVWRUH :RUNV After you select a snapshot for reversion, the filer reboots with the volume containing the same data and timestamps as it did when the snapshot was taken.
Example: A messaging application or a database application stores user data in one or two files that can grow to several hundred GB in a volume. If, for some reason, this application corrupts the files, you can revert the volume to a snapshot taken before the data corruption. Example: You can revert a volume used as a test environment to its original state after each test.
For example, vol1 is the source volume for data replication and it contains two snapshots: hourly.0 and filerA_vol1.2. If hourly.0 was taken earlier than filerA_vol1.2 and you revert vol1 to hourly.0, you cannot find filerA_vol1.2 after the reversion. As a result, the filer cannot start an incremental update of the mirror. It must re-create the baseline version of the mirror.
5HYHUWLQJ D 9ROXPH WR D 6HOHFWHG 6QDS6KRW 'HVFULSWLRQ Use SnapRestore to revert a volume to a snapshot. You can use this feature at any time. After you enter the command for reverting a volume, the filer reboots with the volume containing the same data as it did when the snapshot was taken. 3UHUHTXLVLWHV You must meet these prerequisites before using SnapRestore: SnapRestore is a licensed feature. You must enter the snaprestore license code before you can revert a volume to a snapshot.
they do not unmount the files and directories, they might see the Stale file handle error message after the volume reversion. 2. If you know the name of the snapshot for reverting the volume, go to Step 5. If you want to review the list of snapshots available for volume reversion, enter the following command: YRO VQDSUHVWRUH YROXPH volume is the name of the volume to be reverted. Enter the name only, not the complete path. You can enter multiple volume names in the command, separated by spaces.
6. Enter y to confirm that you want to revert the volume. Result: The filer displays the name of the volume and the name of the snapshot for the reversion. Then it asks whether you want to reboot the filer to proceed with the reversion. 7. Enter y to confirm that you want to continue with the reversion. Result: The filer reboots.
3-28 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
&+$37(5 1HWZRUN $GPLQLVWUDWLRQ :RUNLQJ :LWK /DUJH )LOHV $ERXW /DUJH )LOHV You can have large files on your filer. The maximum size of a large file is determined by the smaller of the following two values: Maximum file size supported by your server Maximum file size supported by your clients However, if the maximum file size on your client is larger than the maximum file size on your server and you enter a command to display the volume size on your server, the file size is displayed incorrectly.
8VLQJ 6103 $ERXW 6103 You use SNMP (Simple Network Management Protocol) to direct a process, called an agent, on the filer to perform network management tasks such as gathering status and diagnostic information. The information is sent to network management stations, which are client workstations on a network. The network management stations use third-party applications to process the information.
6103 &RPPDQGV 6XSSRUWHG E\ 'HOO SNMP commands that Dell supports are described in detail in the snmp(1) man page. The following paragraphs provide brief explanations of these commands: snmp contact ’jdoe@abc.com 555-555-1212’ Sets the email address and telephone number of the person responsible for the filer. You can include the persons full name, but an email address and a telephone number enable the administrator to contact the right person after receiving an automatic email message.
$ERXW 0,% *URXS &RQWHQWV The top-level groups in the custom MIB and the information they contain are described in Table 4-1. 7DEOH 0,% *URXS &RQWHQWV *URXS QDPH &RQWHQWV FLIV Statistics like those displayed by the cifs stat command. filesys Information related to the file system, including the equivalent of the maxfiles and df commands, and some of the information from the snap list command.
+RZ WR 'HILQH 7UDSV You define or change a user-specified trap using the following snmp traps command: WUDSV WUDSQDPH SDUDPHWHU YDOXH trapname is the name of the trap. value is the value that you assign to the definition. parameter must be a parameter listed in the Table 4-2. 7DEOH 3DUDPHWHU 'HVFULSWLRQV 3DUDPHWHU 'HVFULSWLRQ var A traps variable is the MIB variable that is queried to determine the traps value. All MIB variables must be specified in the form snmp.
7DEOH 3DUDPHWHU 'HVFULSWLRQV FRQWLQXHG 3DUDPHWHU 'HVFULSWLRQ interval-offset The interval offset is the amount of time in seconds until the first trap evaluation, and is zero by default. You can set it to a non-zero value to prevent too many traps from being evaluated at once (at system startup, for example). backoffcalculator After a trap sends data, you might not want it to be evaluated so often anymore.
1DPH 5HVROXWLRQ 6HDUFK By default, first the filer tries to resolve host names locally by searching the /etc/hosts file in the root volume and in the /etc/nsswitch.conf file in the root volume. If it cannot resolve the host name, the filer tries NIS, if NIS is enabled. If the filer still cannot resolve the host name, the filer requests services from a DNS server, if DNS is enabled. You can specify any or all of the resolution methods.
([DPSOH 6HDUFK 2UGHU You can list services in the order in which you want the filer to contact the services. For example, the following file instructs the filer to contact first NIS for hosts, then DNS, and finally local files in /etc in the root volume. For passwords, the contact order is NIS, then local files in /etc in the root volume. KRVWV QLV GQV ILOHV SDVVZG QLV ILOHV When the filer resolves a host, the search stops.
PRXQW ILOHU HWF PQWGLU ? PY PQWGLU KRVWV PQWGLU KRVWV EDN ? FS HWF KRVWV PQWGLU KRVWV ? XPRXQW PQWGLU ? GRQH ? UPGLU PQWGLU Substitute the name of each filer in the for filer in... list in place of filer1, filer2, and so on. 8VLQJ '16 The filer includes DNS client capabilities to query DNS servers for host-name-to-IPaddress and IP-address-to-host-name translation services.
2. Edit the /etc/rc file in the root volume to make sure that the option specifying the DNS domain name is set and that the option to enable DNS is set to On. For example: RSWLRQV GQV GRPDLQQDPH RSWLRQV GQV HQDEOH RQ 3. FRP Reboot the filer or enter the commands at the filer prompt. Result: DNS is now enabled. You no longer have to update the filers /etc/hosts file in the root volume every time you add a new host to the network, unless you specify files first in the /etc/nsswitch.
Enabling NIS during setup: During setup, the following prompt appears: 'R \RX ZDQW WR UXQ 1,6 &OLHQW >Q@ If you enter y, setup prompts you for an NIS domain name, as follows: 3OHDVH HQWHU 1,6 GRPDLQ QDPH >@ Enter an NIS domain name. Enabling NIS without using setup: If you didnt start NIS during setup, you can start NIS by performing the following steps: 1. Edit the /etc/rc file in the root volume to make sure that the option specifying the NIS domain name is set and the option to enable NIS is On.
5RXWLQJ 7DEOH RQ WKH )LOHU For routing its own packets, the filer relies on the default route and explicit routes. Typically, the filer learns explicit routes through icmp redirect messages received from the default router; you do not need to enter explicit routes in the filers routing table. To display the filers current routing table, use the netstat -r command.
You turn the routed daemon Off and On with the routed command. To turn the routed daemon Off, enter routed off To turn the routed daemon back On, enter routed on NOTE: If you turn the routed daemon Off by editing /etc/rc in the root volume, manually designate a default router in /etc/rc. 'LVSOD\LQJ 5RXWLQJ 6WDWXV To display the status of the default gateway list, use the routed status command. The -n option forces the command to display numeric values for gateway names.
The file consists of lines with the following format: JDWHZD\ PHWULF where gateway is the name or the IP address of a default router and metric is a preference indicator, which ranges from 1 (highest) to 15 (lowest) as shown below. *DWHZD\ 0HWULF 192.9.200.10 1 eng_gateway 2 NOTE: Each entry for such a default router must have an IP address that belongs to the IP subnet of one of the interfaces configured for the filer.
8VLQJ LIFRQILJ WR &RQILJXUH DQ ,QWHUIDFH $ERXW WKH LIFRQILJ &RPPDQG The /etc/rc file in the root volume contains ifconfig commands to configure network interfaces, including virtual interfaces, at system boot. You can also manually use the ifconfig command when the system is operating.
The media types you can use depend on the type of Ethernet card. The possible types you can enter in the ifconfig command are the same as those you can select when running setup. They are described in Table 4-5.
(GLW HWF UF )LOH WR 0DNH &KDQJHV 3HUVLVWHQW $IWHU 5HERRW If you want changes made with ifconfig to remain in effect after a reboot, include the ifconfig commands in the /etc/rc file. 9LHZLQJ ,QWHUIDFH &RQILJXUDWLRQ ,QIRUPDWLRQ Table 4-7 illustrates examples of how to use the ifconfig command to view interface configuration information. 7DEOH 8VLQJ WKH LIFRQILJ &RPPDQG 'HVFULSWLRQ 6\QWD[ Show the current configurations of all network interfaces.
Subnetwork A 1 2 3 4 Switch e3a e3b e3c e3d Filer )LJXUH ,QWHUIDFHV %HIRUH 7UXQNLQJ ,QWHUIDFHV $IWHU 7UXQNLQJ Figure 4-2 shows the four interfaces after trunking into a multiple-mode trunk called Trunk1. Subnetwork A Logical 1 1 2 3 4 Switch e3a e3b e3c e3d Trunk 1 Filer )LJXUH ,QWHUIDFHV $IWHU 7UXQNLQJ .LQGV RI 7UXQNV 7ZR .LQGV RI 7UXQNV There are two kinds of trunks: Single-mode trunks enable one link to fail over to another link.
6LQJOH 0RGH 7UXQNV In a single-mode trunk, only one of the interfaces is active. The other interfaces are on standby, ready to take over if the active interface fails. In Figure 4-3, e0 and e1 are part of the SingleTrunk1 single-mode trunk. The active interface, e0, fails. Failure means that the link status of the interface is down, which signals that the interface has lost connection with the switch. The e1 interface takes over and maintains the connection.
Switch e0 e1 e2 e3 MultiTrunk1 )LJXUH 0XOWLSOH 0RGH 7UXQNV +DUGZDUH 5HTXLUHPHQWV IRU 7UXQNV To use a multiple-mode trunk, you need a switch that supports manually configurable trunking over multiple port connections. The switch determines how to forward incoming packets to the filer, so you configure the switch so that all the port connections are part of a single logical port. For information about configuring the switch, see the switch documentation.
7UXQNLQJ 9LUWXDO ,QWHUIDFHV
Switch 1 Switch 2 Switch 1 Switch 2 Switch 1 fails e0 e1 Firstlev1 e2 e3 Firstlev2 e0 e1 Firstlev1 Secondlev e2 e3 Firstlev2 Secondlev )LJXUH 6HFRQG /HYHO 9LUWXDO ,QWHUIDFH RQ D 6LQJOH )LOHU In Figure 4-5, Secondlev is the second-level virtual interface and is composed of the two virtual interfaces Firstlev1 and Firstlev2. Firstlev1 is initially the active interface; if Switch 1 drops both links, Switch2 and Firstlev2 take over and maintain the connection to the network.
&UHDWLQJ D 6LQJOH 0RGH 7UXQN 'HVFULSWLRQ Use this procedure to create a trunk in which only one interface is active at a time, thereby ensuring access to a network. After you complete this procedure, the interfaces you specify are combined into a trunk in which one interface is active and the others are ready to take over in case of failure of the active interface.
After you complete this procedure, the link you specify is the active link and the other links are not active. NOTE: If no links are preferred, the active link is selected randomly. 6WHS To specify an interface you prefer to be the active link in a single-mode trunk, enter the following command or put it in the in the /etc/rc file: YLI IDYRU LQWHUIDFH (where LQWHUIDFH is the name of an interface).
3UHUHTXLVLWHV You need the following items to complete the procedure: A switch that supports manually configurable trunking configured according to the manufacturers instructions for a multiple-mode trunk. A name for the trunk that meets the following criteria: It must begin with a letter. It must not contain a space. It must not already be in use for a virtual interface. Trunk names are case-sensitive. A list of the interfaces you want the trunk to consist of.
6WHSV To create a second-level virtual interface on a single filer, complete the following steps: 1. Enter the following commands to create two multiple-mode interfaces: YLI FUHDWH PXOWL WUXQN LI LI YLI FUHDWH PXOWL WUXQN LI LI WUXQN and WUXQN are the names of the trunks. if1, if2, if3, and if4 are interfaces. 2.
6WHS To add one or more physical interfaces to a trunk, enter the following command or put it in the in the /etc/rc file: YLI DGG WUXQN LQWHUIDFHV (where WUXQN is the name of a previously configured virtual interface and LQWHUIDFHV is a list of the physical interfaces you want to add to the trunk). 'LVSOD\LQJ WKH 6WDWXV RI D 7UXQN 'HVFULSWLRQ Use this procedure to display the status of a specified trunk.
XS LQGLFDWLRQV EURNHQ LQGLFDWLRQV LQGLFDWLRQ XS DW -DQ FRQVHFXWLYH WUDQVLWLRQV 'LVSOD\LQJ 7UXQN 6WDWLVWLFV 'HVFULSWLRQ Use this procedure to display statistics for a specified trunk over a specified period of time. After you complete this procedure, you get information that, for example, is useful in troubleshooting trunk problems. You can use this procedure any time.
'HVWUR\LQJ D 7UXQN 'HVFULSWLRQ Use this procedure to destroy or delete a trunk. You destroy a trunk when you cease needing it or want to use the interfaces for other purposes than a trunk. After you complete this procedure, the interfaces in the trunk act individually rather than as links in a trunk. 3UHUHTXLVLWHV Before you destroy a trunk, you must configure it down using the ifconfig down command.
7DEOH (QDEOLQJ WKH QYIDLO 2SWLRQ ,I 7KHQ The filer detects no NVRAM errors File service starts normally. The filer detects NVRAM errors and you use the optional nvfail_rename file a) The filer returns a stale filehandles (ESTALE) error to NFS clients trying to access the database, causing the application to hang, crash, or shut down, and sends an error message to the filer console and log file. b) The filer renames database files specified in the nvfail_rename file by appending .
(QDEOLQJ DQG 'LVDEOLQJ 'DWDEDVH )LOH 3URWHFWLRQ :LWK QYIDLO 'HVFULSWLRQ Use the nvfail option with the vol options command to provide database file protection by turning NVRAM error processing On or Off. The default setting is Off. 6WHS WR (QDEOH QYIDLO To enable the nvfail option, enter the following command: YRO RSWLRQV YROXPHBQDPH QYIDLO RQ volume_name is the name of the volume.
2. List the path name and file name, one file per line, within the nvfail_rename file; for example: /vol/vol1/home/dbs/oracle-WG73.dbf 3. Save the file.
&+$37(5 )LOH 6KDULQJ %HWZHHQ 1)6 DQG &,)6 8VHUV $ERXW 7KLV &KDSWHU $ERXW )LOH 6KDULQJ This chapter describes how the filer works with NFS and CIFS clients simultaneously. Because these clients interact with a file server differently, you need to understand how the read and write operations performed by one client affect the operations performed by the other client.
Byte-range locks work on portions of a file. Byte-range operations other than reads by a UNIX-based NFS client fail if the attempted operation is forbidden by the lock. As is appropriate for NFS, a UNIX-based NFS application might be forbidden to access a byte-range that is locked by CIFS. NOTE: There is one exception to the enforcement of locks set by CIFS clients on the filer.
CIFS client applications often perform operations such as writing to a temporary file, renaming the original file to a backup name, then renaming the temporary file to the original name. Therefore, take care in using symbolic links whose ultimate target is a file, as opposed to a directory.
+RZ WR 3UHYHQW 6\PEROLF /LQN &\FOLQJ You can create directory structures that are cyclic by creating a symbolic link that refers to a directory higher in the same tree, through use of a symbolic link having a dot or dot-dot component. Therefore, a simple recursive descent of the tree goes deeper and deeper until the maximum path length is reached. At that point an error is returned.
described in the preceding paragraph, a file with the read-only bit turned on appears to an NFS client not to have any write permission bits turned on. If a file has no write permission bits turned on and an NFS client turns on any write permission bit, the filer turns off the read-only bit for that file.
that has access from a CIFS client, the filer creates and maintains two names: the original long name and an additional short name in 8.3 format. +RZ WKH )LOHU *HQHUDWHV 6KRUW )LOH 1DPHV The filer generates an 8.3 file name as follows: 1. It truncates the file name to six characters. 2. It appends a tilde (~) and a number or letter to the name.
&DVH 6HQVLWLYLW\ LQ )LOH 1DPHV Uppercase and lowercase characters are significant to NFS clients but not to CIFS clients. For example, if a file named specifications already exists, an NFS user can still save another file under the name Specifications, but a CIFS user is instructed by the application to choose another file name. This section describes how both NFS and CIFS users can use file names that differ only by case. When a client creates a file name, the filer preserves the case.
NOTE: If a filer is licensed for CIFS, you must set a language for every volume on the filer. :KDW D /DQJXDJH $SSOLHV WR The filer uses a character set appropriate to a given language. The language you select determines which character set the filer uses for the following names: User names Share names System and domain names NOTE: The following must be in ASCII: Qtree names Snapshot names Volume names .
7DEOH &KDUDFWHU 6HWV 6XSSRUWHG FRQWLQXHG &KDUDFWHU VHW W\SH OEM 'HVFULSWLRQ 8VHG E\ Single or multiple encodings for older clients DOS NT system and domain name Windows 9x (except for file names) /DQJXDJHV 6XSSRUWHG The filer supports the languages shown in Table 5-2. The language code for each language appears next to the language. To override the normal UNIX character set so that a UNIX system uses UTF-8 code, add .UTF-8 to the language code.
7DEOH 6XSSRUWHG /DQJXDJHV FRQWLQXHG /DQJXDJH /DQJXDJH &RGH Spanish es Swedish sv +RZ WR &KRRVH D /DQJXDJH The flow chart in Figure 5-1 shows how to choose a language. Start Filer used for NFS only? Yes Language does not matter. No Filer used for CIFS only? Yes Set the language of the volume to the language of its clients. Use sjis for Japanese. No Set the language of each volume to the language used by NFS.
/DQJXDJH 3URFHGXUHV You can perform the following operations to query and specify the language that a volume uses. Show what languages the filer supports. Create a volume that uses a specified language other than the default. Specify a language for the console. Change the language, and therefore the character set, that a volume uses for file names. Show each volume with the language that it uses.
sgmlSGML character format. You can use both NFS extended (greater than 0x7F) and SGML characters for input. utf8UTF-8 character sets. For input, any character greater than 0x7F is treated as the beginning of a UTF-8 encoding. 6HWWLQJ WKH /DQJXDJH RI D 9ROXPH 'HVFULSWLRQ This procedure sets the language that a volume uses to store file names. You complete this procedure when you want the files names stored in a volume to use a different language than the default language.
language of the root volume, which is the default language. You use this procedure any time you want to create a volume. After you complete the procedure, the filer stores file names in the volume you created using a character set that best fits the language you selected. 3UHUHTXLVLWHV To complete this procedure, you need the language code of the language you want to use. You can get the language code from Table 5-2 in Languages Supported.
6DPSOH 2XWSXW Each row of the list displays the name of the volume, the language code, then the language. Volume Language vol0 ja (Japanese euc-j) &,)6 )LOH 1DPH &DVH &DVH 3UHVHUYDWLRQ By default, the filer preserves the case of CIFS file names. &DVH &RQYHUVLRQ 3URFHGXUHV You can force all PC-created file names to be stored on the filer in lowercase or return to having the filer preserve case.
6WHS To force all CIFS file names created by CIFS to be lowercase, enter the following command: options cifs.save_case off 3UHVHUYLQJ WKH &DVH RI &,)6 )LOH 1DPHV 'HVFULSWLRQ This procedure enables you to return from forcing all file names to be stored in lowercase to the default behavior of preserving the case of CIFS file names. You perform this procedure when you want to return to the default behavior. &DXWLRQ File names that were converted to lowercase are not changed.
+RZ WR 6SHHG 8S 'LUHFWRU\ &RQYHUVLRQ If you have a directory that contains more than 50,000 files, before triggering a conversion, you can use an NFS client to distribute files among a greater number of subdirectories. This speeds up the conversion process and avoids a possible crash. 6SHHGLQJ 8S &RQYHUVLRQ 7LPH E\ 5HQDPLQJ 1)6 'LUHFWRULHV 'HVFULSWLRQ Use this procedure to convert a directory to Unicode format if you have access to a Windows NT client connected to the filer.
:$)/ &UHGHQWLDO &DFKLQJ Windows verifies each request for access to files. Each access usually takes between 10 and 500 milliseconds, and can take longer because contacting a domain controller to create a WAFL credential is time-consuming. To reduce the time spent in contacting a domain controller, the filer can cache the WAFL credential in a credential cache. This cache is called the WAFL credential cache.
Troubleshoot file access and other problems by displaying what name mappings would be, as described in Displaying a Mapping Result for a UNIX Name on and Displaying a Mapping Result for a Windows Name. 7KH ZFF &RPPDQG 6\QWD[ The wcc command has five basic types, each with its own function. The type is determined by the first option, as follows: wcc -a adds a name to the WAFL credential cache. wcc -d displays statistics about the WAFL credential cache.
7DEOH ZFF &RPPDQG 2SWLRQV FRQWLQXHG 7\SH 2WKHU RSWLRQV )XQFWLRQ wcc -x [-f] [-v] Removes all entries from the WAFL credential cache. The -v option displays how many entries have been removed. -i ip-addr [-v] Removes all entries from the WAFL credential cache with the same IP address. The -v option displays how many entries have been removed. -s ntname [-i ip-addr] [-v] Removes the entries with the given Windows NT name and optional qualifying IP address.
6WHS To change how long each WAFL credential cache entry is valid, enter the following command: options wafl.wcc_minutes_valid n n is the number of minutes you want each entry to be valid. It can range from 1 through 20160. The default value is 20. $GGLQJ $Q (QWU\ WR WKH :$)/ &UHGHQWLDO &DFKH 'HVFULSWLRQ This procedure adds an entry to the WAFL credential cache.
'HOHWLQJ (QWULHV )URP WKH :$)/ &UHGHQWLDO &DFKH 'HVFULSWLRQ This procedure deletes entries from the WAFL credential cache. You do this to force the lookup of UIDs the next time they are used, but you dont want to wait until the entries time out automatically. 3UHUHTXLVLWHV You must have the name and optionally the IP address of the person or group you want to remove from the WAFL credential cache.
6DPSOH 2XWSXW The following sample output shows the output of statistics with the -d option. wcc -d mday (UID 10050) from 10.100.4.41 => NT-DOMAIN\mday* Total WCC entries: 3; oldest is 127 sec. Total Administrator-privileged entries: 1 * indicates members of "BUILTIN\Administrators" group The following sample output shows the output of statistics with the -v option used twice. cc -dvv mmm (UID 1321) from 10.100.4.
NT membership NT-DOMAIN\mday NT-DOMAIN\Domain Users NT-DOMAIN\Domain Admins NT-DOMAIN\SU Users NT-DOMAIN\Installers BUILTIN\Users BUILTIN\Administrators User is also a member of Everyone, Network Users, Authenticated Users *************** hawleyr (UID 1129) from 10.100.4.
'LVSOD\LQJ D 0DSSLQJ 5HVXOW IRU D 81,; 1DPH 'HVFULSWLRQ This procedure displays what the current mapping of the specified UNIX name of a UNIX user would result in, but does not change the WAFL credential cache itself. You use this procedure if a UNIX user cannot access a file that the user should be able to access, and you suspect that mapping problems might be part of the problem.
'LVSOD\LQJ D 0DSSLQJ 5HVXOW IRU D :LQGRZV 1DPH 'HVFULSWLRQ This procedure displays what the current mapping of the specified UNIX name of a Windows NT account would result in, but does not change the WAFL credential cache itself. You use this procedure if a Windows NT user cannot access a file that the user should be able to access, and you suspect that mapping problems might be part of the problem.
7RJJOLQJ &,)6 /RJLQ 7UDFLQJ 'HVFULSWLRQ You can enable login information to be displayed after every CIFS login. You can do this any time you need to troubleshoot mapping problems. Login problems are often the cause of users being denied access to files they should have access to. CIFS login tracing is especially useful in producing verbose messages when a login attempt fails. &DXWLRQ Turning on CIFS login tracing should be used carefully because every CIFS login is traced and results in console messages.
&+$37(5 1)6 $GPLQLVWUDWLRQ This chapter has the following three sections: Managing NFS Exports Configuring a Filer for WebNFS Displaying NFS Statistics 0DQDJLQJ 1)6 ([SRUWV ,QWURGXFLQJ WKH HWF H[SRUWV )LOH HWF H[SRUWV &RQWUROV &OLHQW $FFHVV WR 'LUHFWRULHV The /etc/exports file controls how NFS clients access filer directories. You add entries to the /etc/exports file for all the directories you want to export.
([SRUW 6SHFLILFDWLRQ 'HWHUPLQHV $FFHVV 3ULYLOHJHV The export specification specifies the privileges that clients have to mount and access the filer directory path. The format is as follows: -root=list,-access=list,-ro=list,-rw=list 2QH NH\ZRUG LV UHTXLUHG The keywords -root, -access, -ro, and -rw are all optional; however, you must include at least one keyword in an export entry.
5XOHV )RU ([SRUWLQJ 9ROXPHV $QG 'LUHFWRULHV ([SRUW (DFK 9ROXPH 6HSDUDWHO\ If the filer has multiple volumes, you must export each volume separately; you cannot export all volumes by specifying /vol as the exported directory.
([DPSOH The following lines show exports that the filer allows: /vol/vol0 -access=adminhost,-root=adminhost /vol/vol0/home -access=blender:mixer 1RQH[DPSOH The following lines show exports that are not allowed on some UNIX systems: /home -root=adminhost,-access=blender:mixer /home/local -root=adminhost,-access=blender:mixer )LOHU 'HWHUPLQHV 3HUPLVVLRQV E\ 0DWFKLQJ /RQJHVW 3UHIL[ The filer uses the longest matching prefix in determining permissions.
&$87,21 7R HQVXUH WKDW WKH HQWULHV LQ WKH HWF H[SRUWV ILOH UHPDLQ YDOLG DOZD\V HGLW WKH HQWULHV LQ WKH ILOH WR UHIOHFW YROXPH QDPH FKDQJHV LPPHGL DWHO\ DIWHU UHQDPLQJ YROXPHV 'HIDXOW HWF H[SRUWV (QWULHV YRO YRO DQG YRO YRO KRPH $UH ([SRUWHG E\ 'HIDXOW By default, the root volume (/vol/vol0) and the /vol/vol0/home directory are exported to the administration host when you run setup.
5HVWULFWLQJ $FFHVV WR KRPH You can restrict access to the /home directory to particular groups by using the chmod command to change access modes for the directory using the -rw or -access options in the /etc/exports file to limit write privilege to specific hosts 7KH DFFHVV 2SWLRQ The -access option lists the hosts that can mount exported directories. When you use the -access option, only the hosts listed can mount the associated directory.
7KH UZ 2SWLRQ The -rw option lists the hosts that can modify the exported directories; hosts not listed by the -rw option have read privilege only. 6\QWD[ The syntax for the -rw option is as follows: -rw=hostname[:...:hostname] /LPLWV You can specify 1 to 256 host names with the -rw option. 5HVWULFWLRQV You cannot use netgroup names with the -rw option. 7KH UR 2SWLRQ The -ro option lists the clients that cannot modify the exported directories.
7DEOH H[SRUWIV &RPPDQG 2SWLRQV 6\QWD[ 2SWLRQ 'HVFULSWLRQ -a Exports all the entries listed in the /etc/exports file. -u Unexports all the entries listed in the /etc/exports file. NOTE: When you use the -u option with the -a option, all exports are unexported regardless of whether they were created from the /etc/exports file or with the -o option. -i Exports all the export entries listed in the /etc/exports file, but ignores the options specified for the entries.
Or Reboot the filer. 7KH HWF QHWJURXS )LOH 7KH HWF QHWJURXS )LOH 'HILQHV *URXSV RI &OLHQWV The filer /etc/netgroup file defines groups of clients that the filer uses for checking access permission while processing a mount request. 6\QWD[ The following line shows the syntax for each line in the /etc/netgroup file: groupname member-list /LPLWV Each line in the /etc/netgroup file is limited to 4,096 characters.
([DPSOH RI HWF QHWJURXSV The following lines show an example of a /etc/netgroups file: trusted-hosts (adminhost,,) untrusted-hosts (red,,) (blue,,) (green,,) all-hosts trusted-hosts untrusted-hosts ([DPSOH RI HWF H[SRUWV 8VLQJ 1HWJURXSV The following lines show an example of an /etc/exports file that uses netgroup group names: /vol/vol0 -access=trusted-hosts,root=adminhost /vol/vol0/home -access=all-hosts,root=adminhost &RS\ HWF QHWJURXS :KHQ )LOHU 'RHVQ·W 8VH 1,6 If your filer is not configured as an
([SRUWLQJ WR 6XEQHWV $ERXW ([SRUWLQJ WR 6XEQHWV You can export a directory to clients on a subnet rather than to individual clients. 9DOLG ([SRUW 2SWLRQV IRU 6XEQHWV The valid export options in the /etc/exports file for exporting to subnets are as follows: -ro=subnet_address[:subnet_address]... -rw=subnet_address[:subnet_address]... -root=subnet_address[:subnet_address]...
([DPSOH UHDG ZULWH DFFHVV To export /vol/vol0/home for read and write access to all addresses of the form 123.45.x.y with a 16-bit netmask (255.255.0.0), place the following entry in the /etc/ exports file: /vol/vol0/home -rw=123.45.0.0/16 ([DPSOH HTXLYDOHQW PHWKRGV IRU H[SRUWLQJ The following entries in the /etc/exports file are equivalent. They export /vol/vol0/ home to a client named host1, the specified subnet, and a client named host2. /vol/vol0/home -rw=host1:123.45.67.
Requests are restricted as follows: Requests are honored only for files in subtrees that have been exported. If a subtree has been exported with the -o access option, files in that subtree are not available through WebNFS. 6HWWLQJ 8S :HE1)6 3URFHGXUH IRU 6HWWLQJ 8S :HE1)6 To set up WebNFS, perform the following steps: 1. Enter the following command to turn on WebNFS: options nfs.webnfs.enable on 2. If you... Want to specify a public directory, known as the root directory, for WebNFS access Then...
0DQDJLQJ :HE1)6 7DVNV
'LVSOD\LQJ 1)6 6WDWLVWLFV $ERXW 'LVSOD\LQJ 1)6 6WDWLVWLFV 7KH QIVVWDW &RPPDQG 'LVSOD\V 1)6 DQG 53& 6WDWLVWLFV The nfsstat command displays statistics about NFS and Remote Procedure Calls (RPCs) for the filer. You can use the output of this command to find performance bottlenecks or inefficiencies in your NFS setup. NOTE: A full description of the meaning of NFS statistics is outside the scope of this guide.
7DEOH QIVVWDW &RPPDQG 2SWLRQV FRQWLQXHG 2SWLRQ 'HVFULSWLRQ -h Displays statistics for a single client. You must provide the clients host name or IP address as an argument to the -h option. To use the -h option, you must enable the nfs.per_client_stats.enable option by entering the following command: options nfs.per_client_stats.enable on Enable the per-client statistics collection mode as soon as possible after you start the filer or reset the counters with nfsstat -z.
0 0% 5 21% 0 0% 0 0% 16 67% wrcache write create remove rename 0 0% 0 0% mkdir rmdir 0 0% readdir 0 0% statfs 0 0% 0 0% 3 13% 0 0% 0 0% 0 0% link 0 0% 0 0% symlink 0 0% Server nfs V3: (0 calls) null getattr setattr 0 0% 0 0% 0 0% write create mkdir 0 0% 0 0% 0 0% root lookup readlink 0 0% 0 0% symlink 0 0% 0 0% mknod 0 0% remove 0 0% rename link readdir readdir+ fsstat 0 0% 0 0% 0 0% 0 0% 0 0% fsinfo 0 0% read 0 0% rmdir 0 0% pathconf 0 0% commit 0 0%
Server nfs: calls badcalls 33345 0 Server nfs V2: null getattr 0 0% 8410 25% 19 0% wrcache write setattr create root lookup readlink read 0 0% 13687 41% 42 0% 489 22% remove rename link symlink 0 0% 3225 10% 12 0% 7 0% 9 0% 0 0% 0 0% mkdir rmdir readdir statfs 0 0% 0 0% 416 1% 29 0% Server nfs V3: null getattr setattr lookup access readlink read 0 0% 0 0% 0 0% 0 0% 0 0% 0 0% 0 0% write create mkdir symlink mknod remove rmdir 0 0% 0 0% 0 0% 0 0% 0
&+$37(5 &,)6 $GPLQLVWUDWLRQ :KDW ,V &,)6" CIFS (Common Internet File System) is a file-sharing protocol based on the Server Message Block (SMB) protocol widely in use by personal computers and workstations running a wide variety of operating systems. CIFS provides an open, cross-platform mechanism for client systems, including Windows systems, to request file and print services from server systems over a network. This chapter describes how to manage the CIFS file protocol and users.
&,)6 OLPLWDWLRQV ,QWURGXFWLRQ This section describes CIFS limitations when operating on files on the filer. 8VHU 0DQDJHU /LPLWDWLRQV The Policy menu items and the New Users menu item are permanently disabled.
other. You might want to view the description of a filer to find out, for example, what a particular filer does or who is in charge of it. &KDQJLQJ D )LOHU·V 'HVFULSWLRQ )URP 6HUYHU 0DQDJHU To change the description of a filer from Server Manager, perform the following steps: 1. Open Server Manager by choosing it from the Start menu. 2. From the Server Manager Computer menu, choose Select Domain. Result: The Select Domain window opens. 3.
the rare case that you must add a user explicitly, you can do so with the methods described in this section. You can add CIFS users to the filer at any time. The method you use for adding users to the filer depends on whether you are authenticating with a domain controller or the UNIX password database. :KHQ $XWKHQWLFDWLQJ :LWK D 'RPDLQ &RQWUROOHU To add a user, create an account for the CIFS user within your Windows NT domain environment.
7DEOH /etc/usermap.cfg )RUPDW 9DULDEOHV 9DULDEOH 'HVFULSWLRQ IP-qual An IP qualifier that the filer uses in matching a user. You use an IP qualifier to narrow a match. IP-qual can be an IP address in any of the following formats: A regular IP address specified as numbers separated by periods (dot notation) with an optional subnet address. For example, 192.4.1.0/24 narrows possible matches to the 192.4.1.0 class C subnet. A host name. A network name.
1DPH UHTXLUHPHQWV Windows NT and UNIX names have different requirements, as follows: Windows NT names are case-insensitive and can contain non-ASCII characters within the character set in the current code page. Windows NT user names can contain spaces, in which case you must enclose the name in quotation marks. UNIX user names are case-sensitive and must be in ASCII. 'HIDXOW ILOH FRQWHQWV If the filer is domain authenticated, by default the /etc/usermap.
7. To add a member, type a user or group name in the Members list box or use the Add Users and Groups window, as described in Step 8. $GGLQJ D QDPH ZLWK WKH $GG 8VHUV DQG *URXSV ZLQGRZ 8. Click Add. Result: The Add Users and Groups window appears. 9. Click the arrow next to the List Names From text box to choose a domain that contains names that you want to add. Result: A list of names in the selected domain appears in the Names list box. 10.
81,; ([DPSOH For example, using rsh on the administration host, you can set access rights for a specific user as follows: UVK O URRW Q ILOHU FLIV DFFHVV KRPH MVPLWK U [ In this example, the filer name is filer, the user is jsmith, and the share is home. The user has read, execute, and browsing rights to the directory on the filer that has been defined as the home share.
6HWWLQJ 8S D *XHVW $FFRXQW To set up a guest account, use the following options command: RSWLRQV FLIV JXHVWBDFFRXQW DFFRXQWBQDPH where account_name is the name of the guest account, usually guest or nobody, which is a preconfigured account in the /etc/passwd file. If you are using UNIX-style authentication, set the guest account to the name of an account in the UNIX password database, typically guest, which is mapped to the UNIX account nobody with the same access rights as the user everyone.
6HWWLQJ 8S D *HQHULF 8VHU $FFRXQW To set up a generic user account, use one of the following options commands with an account name to use as an argument as shown in Table 7-3: 7DEOH *HQHULF 8VHU $FFRXQW RSWLRQV &RPPDQGV 8VHU W\SH 2SWLRQ 'HVFULSWLRQ NT ZDIO GHIDXOWBXQL[BXVHU Specifies the UNIX user account to use when an NT user attempts to log in and that NT user would not otherwise be mapped.
3. In the Select Domain window, select the filer you want by typing its UNC name, for example, \\FILERNAME, in the Domain field, then clicking OK. Result: A Server Manager window for the filer appears. 4. Choose Computer > Shared Directories. Result: The Shared Directories window appears. 5. To get additional details about a share, double-click a share name. Result: The Share Properties window appears.
&UHDWLQJ DQG &KDQJLQJ D 6KDUH :D\V WR 6KDUH )ROGHUV If you want to create a folder to be shared by CIFS clients, do one of the following: From Windows NT, use Server Manager as described in Creating a Share From Server Manager. From the filer command line, use the cifs shares command to define a new share, as described in Creating a Share with the cifs Shares Command. NOTE: By default, three shares are created during CIFS setup: C$, IPC$, and HOME.
12. Click OK. Result: The New Share window disappears and the share is created. &KDQJLQJ WKH 6KDUH 'HVFULSWLRQ DQG 8VHU /LPLW :LWK 6HUYHU 0DQDJHU To change the description and user limit with Server Manager, perform the following steps: 1. Open Server Manager by choosing it from the Start menu. 2. From the Server Manager Computer menu, choose Select Domain. Result: The Select Domain window opens. 3.
7DEOH &UHDWLQJ D 6KDUH :LWK FLIV VKDUHV &RPPDQG 9DULDEOH 'HVFULSWLRQ GHVFULSWLRQ A string describing the purpose of the share. It must contain only characters in the current code page. It is required by the CIFS protocol and is displayed in the share list in Network Neighborhood on the client. If the description contains spaces, you must enclose it in single quotation marks. JURXSQDPH The name of the group you want all files in the share to get the group membership of.
8VLQJ WKH FLIV VKDUHV &RPPDQG WR &KDQJH WKH 6KDUH To change the description, forced file ownership, and user limits of a share, use the following command: FLIV VKDUHV FKDQJH VKDUHQDPH > FRPPHQW GHVFULSWLRQ _ QRFRP PHQW @ > IRUFHJURXS JURXSQDPH _ QRIRUFHJURXS @ > PD[XVHUV Q _ QRPD[XVHUV @ Table 7-5 describes the parameters. 7DEOH &KDQJLQJ D 6KDUH :LWK FLIV VKDUHV &RPPDQG 3DUDPHWHU RU YDULDEOH 'HVFULSWLRQ GHVFULSWLRQ A string describing the purpose of the share.
To display information about shares, do either of the following: From the Windows NT desktop, use Server Manager as described in Using Server Manager to View Information about Shares. From the filer, use the cifs shares command as described in Using the cifs Shares Command to View Information about Shares. 8VLQJ 6HUYHU 0DQDJHU WR 9LHZ ,QIRUPDWLRQ $ERXW 6KDUHV To display information about shares from Server Manager, perform the following steps: 1.
The sample output is from cifs shares: 1DPH 0RXQW 3RLQW 'HVFULSWLRQ +20( YRO PXIILQ KRPH 'HIDXOW 6KDUH HYHU\RQH )XOO &RQWURO WHFKSXEV^J` )XOO &RQWURO & YRO PXIILQ 5HPRWH $GPLQLVWUDWLRQ HYHU\RQH )XOO &RQWURO %8,/7,1?$GPLQLVWUDWRUV )XOO &RQWURO RSHQKRPH Y
4. In the Server Manager window for the filer, choose Computer > Shared Directories, then click the Properties button. Result: The Share Properties window appears. 5. Click Stop Sharing, then click OK. Result: The folder is no longer shared. 8VLQJ WKH FLIV VKDUHV &RPPDQG WR 'HOHWH 6KDUHV To delete a share, use the cifs shares -delete command.
6KDUH 1DPH /HQJWK /LPLWDWLRQV Because share names are truncated to 12 characters, the home directory name might show a truncated version of the users account name. For example, consider the 13-letter name administrator. From the filer point of view, the home directory for administrator has a name that exactly matches the account name administrator, but use of that directory is offered under the truncated share name administrator.
([DPSOH )URP WKH )LOHU The following example shows how to create an additional share, assign user access rights to the share, and display the share information from the filer command line. If authentication is through the /etc/passwd file, UNIX permissions are shown; otherwise, Windows NT permissions appear.
From the filer command line, do one of the following: a. Add access with the cifs access command, as described in Giving Access With the Cifs Access Command. b. Remove a user or group with the cifs access -delete command, as described in Removing a User or Group With the cifs Access -delete Command. $VVLJQLQJ RU &KDQJLQJ $FFHVV 5LJKWV :LWK 6HUYHU 0DQDJHU To assign or change access rights with Server Manager, use the Access Through Share Permissions window by following these steps: 1.
10. If you want, add or modify the access type by selecting one or more names and choosing an access type from the Type of Access list. 6WHSV LQ WKH $FFHVV 7KURXJK 6KDUH 3HUPLVVLRQV ZLQGRZ 11. To assign or change an access type, select a name or names in the Names list, then click the arrow next to Type of Access and select an access type. 12. To remove one or more names from the list, select a name or names in the Names list, then click Remove. 13. Click OK. )LQDO VWHS LQ WKH 3URSHUWLHV ZLQGRZ 14.
5HPRYLQJ D 8VHU RU *URXS :LWK WKH FLIV DFFHVV GHOHWH &RPPDQG If a user or group no longer exists, you can remove the corresponding entry from an ACL. Use the following command syntax to remove an entry in an ACL: FLIV DFFHVV GHOHWH VKDUH XVHU _ JURXS Following are some examples of removing entries from the library share. The following command removes the engineering group from the library share. FLIV DFFHVV GHOHWH OLEUDU\ HQJLQHHULQJ The following command removes the user joed from the library share.
To use the SecureShare Access tool from a client, you must install the tool on the client. For instructions about downloading the SecureShare Access tool, see the Software and Firmware Upgrade Guide or Start Here. NOTE: To change UNIX permissions, you must understand them. Explaining UNIX permissions is outside the scope of this guide. Consult literature about UNIX for an explanation of UNIX permissions. 'LVSOD\LQJ 6HFXUH6KDUH $FFHVV To display SecureShare Access, follow these steps. 1.
5HFXUVLYH $SSOLFDWLRQ RI &KDQJHV If one or more of the files is a directory, the Descend Into Subdirectories check box is enabled. Select this check box to apply the changes you make recursively to the contents of any directory you selected. Links are not changed, but their targets are. &KDQJLQJ WKH 3HUPLVVLRQV RI 0XOWLSOH ,WHPV You can change the permissions of several items at once by selecting them, then displaying SecureShare Access by following Steps 2 through 4 in Displaying SecureShare Access.
4. In the Server Manager window, from the Computer menu, choose Send Message. Result: The Send Message window appears. 5. Enter a message in the text box of the Send Message window. 6. Click OK to send the message. (YHQW $XGLWLQJ
(YHQW /RJ 'HWDLO 'LVSOD\V +RZ WR ([DPLQH DQ (YHQW LQ 'HWDLO You examine an event in detail by double-clicking it and looking at the resulting event details display.
7DEOH :LQGRZV )LOH $FFHVV 'HWDLO 'LVSOD\V FRQWLQXHG )LHOG 'HVFULSWLRQ Object User Name Your login. Client Domain The name of your computer or the domain containing the client users account. Client Logon ID A unique identifier assigned when the client user logged on. Accesses The types of accesses to the object that were attempted. Privileges Your privileges.
(YHQW $XGLWLQJ 2YHUYLHZ 'HVFULSWLRQ This overview of how to audit events contains steps that are described in detail in later sections. 6WHSV To audit events, complete the following steps: 1. Enable CIFS access logging, as described in Enabling CIFS Access Logging. 2. Set a system ACL on the files you want to audit, as described in Setting a System ACL on a File. This involves specifying the users or groups whose access to the file you want to audit. 3.
6WHS To disable CIFS access logging, enter the following command: RSWLRQV FLIV DFFHVVBORJJLQJ HQDEOH RII 6SHFLI\LQJ WKH $FWLYH (YHQW /RJ 'HVFULSWLRQ Use this procedure to specify the active event log. You follow this procedure when you want to specify the name of a file to which the system writes access logging information. You can do this at any time. After you complete this procedure, if access logging is enabled, the system writes access logging information to the file you specified.
6WHSV To set a SACL on a file, complete these steps; 1. Right-click the file you want to monitor. Result: The Properties tab for that file appears. 2. Click the Security tab. Result: The Security properties window appears. 3. Click the Auditing button. Result: A blank File Auditing window appears for the file you specified. 4. Click the Add button. Result: The Add Users and Groups window appears. 5.
9LHZLQJ (YHQWV LQ D 6HFXULW\ /RJ 'HVFULSWLRQ Use this procedure to view events in a security log and check the events on the file and users you specified in the procedure Setting a System ACL on a File. After you complete this procedure, access information is displayed. 3UHUHTXLVLWHV You should have the name of the security log that you want to view. 6WHSV To view events in a security log, perform the following steps: 1.
8VLQJ 2SORFNV :KDW 2SORFNV 'R Oplocks (opportunistic locks) enable the redirector on a CIFS client in certain filesharing scenarios to perform client-side caching of read-ahead, write-behind, and lock information. A client can then work with a file (read or write it) without regularly reminding the server that it needs access to the file in question. This improves performance by reducing network traffic.
7XUQLQJ 2SORFNV 2Q DQG 2II *OREDOO\ You can turn CIFS oplocks On or Off globally for the entire filer or for individual qtrees, which are special directories that are described in detail in Chapter 10, Qtree Administration.
([DPSOH 2I FLIV VWDW 2XWSXW The following command displays statistics every second: FLIV VWDW *HW$WWU 5HDG :ULWH /RFN 2SHQ &O 'LUHFW 2WKHU Table 7-7 describes the fields.
Sample output is Server Registers as ’SILVER‘ in group WNT-DOMAIN WINS Server: 272.320.0.
17 PHPEHUVKLS :17 '20$,1?URRW :17 '20$,1?'RPDLQ 8VHUV :17 '20$,1?'RPDLQ $GPLQV :17 '20$,1?68 8VHUV :17 '20$,1?,QVWDOOHUV %8,/7,1?8VHUV %8,/7,1?$GPLQLVWUDWRUV 8VHU LV DOVR D PHPEHU RI (YHU\RQH 1HWZRUN 8VHUV $XWKHQWLFDWHG 8VHUV 6WRSSLQJ DQG 5HVWDUWLQJ &,)6 6HVVLRQV :D\V WR 6WRS &,)6 6HVVLRQV If you want to stop CIFS sessions for all clients or for a single client,
6. To disconnect one or more users, do one of the following: To disconnect a single user or selected users, select them, then click Disconnect. To disconnect all users, click Disconnect All. Result: The selected users are disconnected. NOTE: If at least one of the selected users has open resources, an alert box appears for you to confirm or cancel your command.
&KDQJLQJ WKH 7LPH 'HOD\ When you use the -t option, the command counts down from the time specified. &DQFHOLQJ WKH FLIV WHUPLQDWH &RPPDQG If you want to cancel the cifs terminate command, press Ctrl-C before the end of the countdown. NOTE: The halt command automatically invokes the cifs terminate command.
7HUPLQDWLQJ D &,)6 6HVVLRQ IRU D 6SHFLILF &OLHQW To terminate a CIFS session for a particular client, specify the name of the computer in the command. For example, the following command terminates a CIFS session for a computer named PETERSPC after 10 minutes: FLIV WHUPLQDWH 3(7(563& W 8VLQJ WKH FLIV UHVWDUW &RPPDQG WR 5HVWDUW &,)6 6HUYLFH To restart CIFS service, use the cifs restart command, as follows: FLIV UHVWDUW CIFS server is registering...
&+$37(5 +773 $GPLQLVWUDWLRQ NOTES: You can use the filer as an HTTP server only if you purchased the license for HTTP. Without the license, you can use an HTTP client (Web browser) only to display the filers man pages and to use FilerView. As with UNIX-based systems, the URL is case sensitive. 6WDUWLQJ +773 6HUYLFH 3URFHGXUH IRU 6WDUWLQJ +773 6HUYLFH To start HTTP service on your filer, follow these steps: 1. Enable the httpd daemon by entering the following command: RSWLRQV KWWSG HQDEOH RQ 2.
NOTE: If you want these options to remain active after rebooting, you must add them to the /etc/rc file. The procedure for starting HTTP service is now complete, and clients can display text files under the root directory by using a Web browser.
7KH HWF KWWSG DFFHVV )LOH The /etc/httpd.access file contains directives that govern authentication for each directory. The filer supports the following directives: directory AuthName require user require group These directives are compatible with the Apache Web server directives, but the filer ignores all other directives. 7KH 'LUHFWRU\ 'LUHFWLYH Specifies a directory tree to be protected and encloses all other directives.
The pairs are copied in from a machine on which the user has a password. 7KH HWF KWWSG JURXS )LOH The /etc/httpd.group file contains a group_id and a list of user_ids in that group in the following format: JURXSBLG XVHUBLG >XVHUBLG @ The lists are copied in from a machine that has a similar list. :HE 3DJH 3URWHFWLRQ ([DPSOHV The following /etc/httpd.
8VLQJ WKH +773 9LUWXDO )LUHZDOO $ERXW WKH +773 9LUWXDO )LUHZDOO The HTTP virtual firewall feature enables you to maintain security on your filer. You can restrict HTTP requests by marking the subnetwork interface over which they arrive as untrusted. An untrusted interface provides only HTTP access to your filer on a read-only basis. Mark an interface untrusted if it meets all the following conditions: You know you are going to service HTTP requests over that interface.
map virtual host addresses to the virtual host interface with the ifconfig command 'LUHFWLQJ +773 5HTXHVWV To direct HTTP requests, use the following format in the /etc/httpd.hostprefixes file as shown in Table 8-1: SUHIL[ >KRVW QDPH RU DGGUHVV @ 7DEOH +773 5HTXHVW 9DULDEOHV 9DULDEOH 'HVFULSWLRQ prefix Specifies a subdirectory in the HTTP root directory, which is defined by the options httpd.rootdir command. host-name-or-address Specifies an HTTP host name or an IP address.
NOTE: If you need to create a virtual subnet with many contiguous addresses, the IP address can be a subnet address. 6SHFLI\LQJ 0,0( &RQWHQW 7\SH 9DOXHV $ERXW 0,0( &RQWHQW 7\SH 9DOXHV You can configure the filer to send the appropriate MIME (Multipurpose Internet Mail Extensions) Content-Type header in each response to a get request. The header shows the MIME Content-Type value of the file, which tells the browser on the client how to interpret the file.
on the client is configured to start a graphics program as a helper application, the user can view a file named file.pict as a graphics file on the client. 7UDQVODWLQJ 85/V +RZ WKH )LOHU 5HVSRQGV WR 85/V You can specify that the filers response to an HTTP request be dependent on the URL. For example, you can configure the filer to redirect a particular request to a specific directory, or to prevent access to a particular directory that is specified in the URL.
7KH 5HGLUHFW 5XOH The redirect rule specifies that if a component of a URL matches the template, the request is redirected to the URL defined in the result field. The result field for the redirect rule must be specified as a complete URL beginning with http:// and the host name. For example, if /etc/httpd.translations contains the following entry UHGLUHFW FJL ELQ KWWS FJL KRVW the filer redirects CGI requests to another HTTP server named cgi-host.
In the result field, the wildcard character represents the text expanded from the match in the template field. Include the wildcard character in the result field only if you used a wildcard character in the template field. If you use multiple wildcard characters, the first one in the result field corresponds to the first one in the template field, the second one in the result field corresponds to the second one in the template field, and so on.
192.7.15.6 - - [26/Aug/1996:16:45:51] "GET /logo.gif" 200 1763 198.9.200.2 - - [26/Aug/1996:16:45:57] "GET /task/top.html" 200 334 192.9.20.5 authuser [26/Aug/1996:16:45:57] "GET /task/head.html" 200 519 'LVSOD\LQJ +773 6WDWLVWLFV KWWSVWDW 6WDWLVWLF 7\SHV The httpstat command displays four types of statistics about HTTP operations on the filer as shown in Table 8-3: 7DEOH KWWSVWDW 6WDWLVWLF 7\SHV &ROXPQ 'HVFULSWLRQ gets Successful requests for files. badcalls Requests for nonexistent files.
8-12 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
&+$37(5 6QDSVKRWV 8QGHUVWDQGLQJ 6QDSVKRWV :KDW ,V D 6QDSVKRW" A snapshot is a read-only copy of the entire file systemit reflects the state of the file system at the time the snapshot was created. $FFHVVLQJ 6QDSVKRWV Any client of a filer can access snapshots to recover old versions of files; for example, files that were accidentally changed or deleted.
6QDSVKRWV 0DLQWDLQ 2ULJLQDO )LOH 3HUPLVVLRQV Snapshot files carry the same permissions and inode numbers as the original files, keeping the integrity of the security system intact. Inodes are data structures that hold information about files on the filer. There is an inode for each file and a file is uniquely identified by the file system on which it resides and its inode number on that system.
Before any snapshot is taken, disk space is consumed by the active file system only. After a snapshot is taken, the active file system and snapshot point to the same disk blocks. The snapshot doesn´t use extra disk space. After the foo file is deleted, the space previously used by foo is referenced by the snapshot. That´s why deleting active file system data doesn´t free disk space.
6QDSVKRW &RPPDQGV DQG 2SWLRQV 6QDSVKRW &RPPDQGV The commands related to snapshots are listed in Table 9-1. If the volume name is omitted in any of these commands, the command applies to the root volume. 7DEOH 6QDSVKRW &RPPDQGV &RPPDQG 0HDQLQJ snap lista volume_name Lists all available snapshots. snap create volume_name snapshot_name Creates a snapshot with a specified name. snap delete volume_name snapshot_name Deletes a specified snapshot. snap rename volume_name from to Renames a snapshot.
$XWRPDWLF 6QDSVKRW &UHDWLRQ The filer uses the snap sched command to create snapshots automatically and to keep them on-line for a predetermined amount of time. 7\SHV RI $XWRPDWLF 6QDSVKRWV Table 9-3 describes the three types of automatic snapshots. 7DEOH $XWRPDWLF 6QDSVKRW 7\SHV 7\SH 'HVFULSWLRQ Weekly The filer creates these every Sunday at midnight. Weekly snapshots are called weekly.n, where n is an integer. weekly.0 is the most recent weekly snapshot, and weekly.
([DPSOH RI VQDS VFKHG &RPPDQG Figure 9- 2 shows a sample snap sched command: snap sched vol1 2 6 8@8,12,16,20 Volume name Create a snapshot every week and keep a maximum of two. Create a snapshot every day and keep a maximum of six. Create a snapshot every hour, or at the times listed in the optional time list and keep a maximum of eight. Optional list of times, in 24-hour format at which an hourly snapshot is created.
The following list shows the snapshots that are created by this snapshot schedule in 1998 (when January 11 is a Sunday): % ls -lu .
([DPSOH For example, if you want to create two snapshots for the volume named vol1 each week, you can set up a cron job on the administration host to run twice each week at an appropriate time to execute the following snap create command: rsh filer snap create vol1 filename NOTE: The snap create command does not accept a snapshot name containing a slash (/).
NOTE: The numbers in this example were rounded off to make the example easier to understand. Also, to make the output easier to read, the Mounted on column is not included in the sample df output in the following sections. In this example, the vol0 volume contains 4 GB of disk space. It has 1 GB (or 25%) reserved for snapshots (the idea of reserving space for snapshots is described in more detail later). That leaves 3 GB for the active file system, and 2 GB of the file system is in use.
$GPLQLVWHULQJ 6QDSVKRW 'LVN 6SDFH Even with the snapshot reserve, the job of administering snapshot disk space consumption is important. There is no way to prevent snapshots from consuming disk space greater than the amount reserved for them. Consider what would happen in the example if all files in the active file system were deleted. Before the deletion, the df output was as follows: Filesystem /vol/vol0/ /vol/vol0/.
(IIHFWV RI 6QDSVKRWV RQ 4XRWDV Quotas do not count disk space consumed by snapshots. If snapshots were included in the quota calculations, users could end up in a state where they could not create any new files until all snapshots containing their old files expired.
If the data changes very quickly, reduce the number of snapshots scheduled. For example, if a volume is filled and emptied each day, for example, a volume storing large temporary files for a CAD application, it might not make sense to use daily or weekly snapshots at all. On a very active volume, schedule snapshots every hour and keep them for just a few hours, or turn off snapshots.
The first number is equal to cumulative snapshot space x 100% cumulative snapshot space + file system space The second number is equal to this snapshot x 100% this snapshot + file system space 7KH 7RWDO &ROXPQ The %/total column shows space consumed as a percentage of total disk space in the volume.
If you do not want the total amount of disk space consumed by all snapshots to exceed a certain percentage of the used disk space, use the cumulative values in the snap list output to determine which snapshots to delete. In the preceding example, if you dont want more than 5% of used disk space to be spent by snapshots, delete all snapshots listed below nightly.1 in the snap list output; that is, nightly.2, nightly.3, and nightly.4. After deleting the snapshots, nightly.
system before the filer took the hourly.0 snapshot, the snap list command would have displayed the following output: %/used -------0% (0%) 20% (20%) 20% (20%) %/total --------0% (0%) 1% (1%) 1% (1%) date -----------May 05 16:00 May 05 12:00 May 05 08:00 name --------hourly.0 hourly.1 hourly.2 In the %/used column, the cumulative values for hourly.1 and hourly.2 are both 20%, but the cumulative value for hourly.2 is not 40%.
$FFHVVLQJ 6QDSVKRWV )URP &OLHQWV $ERXW &OLHQW $FFHVV WR 6QDSVKRWV Snapshots can be accessed by any user with the appropriate permissions. Every directory in the filers active file system contains a directory named .snapshot, through which users can access old versions of files in that directory. How users gain access to snapshots depends on the file-sharing protocol used: NFS or CIFS.
For example, at the mount point of a filer file system, a directory listing looks like this: ls -a . .. .snapshot dir1 dir2 The same command entered in a directory below the mount point does not show the .snapshot directory; for example: cd dir1 ls -a . .. file1 file2 If you enter the ls command with the directory name .snapshot, you can see a listing of the snapshots for the dir1 directory: ls .snapshot hourly.0 hourly.1 hourly.2 hourly.3 hourly.4 hourly.5 hourly.6 hourly.7 nightly.0 nightly.
'HWHUPLQLQJ 6QDSVKRW 9HUVLRQV )URP DQ 1)6 FOLHQW The best way to find all versions of a particular file preserved in snapshots is to use the ls command. The following example shows how to find all versions of foo: ls -l foo .snapshot/*/foo -rw-r--r-- 1 smith 0 Jan 14 09:40 -rw-r--r-- 1 smith 0 Jan 13 18:39 -rw-r--r-- 1 smith 0 Jan 12 19:17 foo .snapshot/nightly.0/foo .snapshot/nightly.
&+$37(5 TWUHH $GPLQLVWUDWLRQ $ERXW TWUHHV A qtree is a special subdirectory of the root directory of a volume. TWUHH 3DUDPHWHUV You can set the following parameters on a qtree: security style: NTFS (Windows NT file system), UNIX, or mixed oplocks setting: On or Off disk space and file limits, as described in Chapter 11, Quotas and Maximum Number of Files. 9ROXPHV DQG TWUHHV A volume has all the properties of a qtree except It can have qtrees under it.
8VLQJ TWUHHV :KDW
7DEOH TWUHH DQG 9ROXPH 'HIDXOWV 3DUDPHWHU TWUHH GHIDXOW 9ROXPH GHIDXOW oplocks On On security The style of the volumes root directory UNIX 0RYLQJ )LOHV %HWZHHQ TWUHHV In UNIX, you cannot move a file into or out of a qtree with a rename operation. As a result, the mv command on some UNIX systems fails if you try to move a file into or out of a qtree. You can always move the file by copying it, then deleting the original. In Windows, you can move a file into or out of a qtree.
. 7DEOH TWUHH 6HFXULW\ 6W\OHV LQ 'HWDLO 6HFXULW\ VW\OH 'HVFULSWLRQ (IIHFW RI FKDQJLQJ WR WKH VW\OH NTFS User access is determined as follows: Windows NT permissions determine file access for a file that had them if the change is from a mixed qtree. Otherwise, UNIX-style permission bits determine file access for files created before the change. CIFS requests: Windows NT permissions determine user access if Windows NT permissions have been set on a file.
TWUHH )LOH $FFHVV 0RGHOV .LQGV RI )LOH $FFHVV 0RGHOV You can use the following four file access models in working with qtrees: CIFS user accessing a file with Windows NT security CIFS user accessing a file with UNIX security NFS user accessing a file with Windows NT security NFS user accessing a file with UNIX security &,)6 $FFHVV WR :LQGRZV )LOHV CIFS accesses to Windows files obey Windows security rules.
Windows NT permissions for Everyone are mapped to UNIX Group and UNIX Other permissions. 1)6 $FFHVV WR 81,; )LOHV NFS accesses to UNIX files obey UNIX security rules.
0RGLI\LQJ WKH 6HFXULW\ 6W\OH RI D TWUHH :KHQ WR &KDQJH WKH 6HFXULW\ 6W\OH RI D TWUHH There are many circumstance under which you might want to change qtree style. Two examples are Because the default security style of a qtree is that of its root volume, you might want to change the security style of a qtree after creating it to the style you want.
&KDQJLQJ 2SORFNV 6HWWLQJV To change the oplocks setting of a qtree, follow these steps: 1. Make sure that the cifs.oplocks.enable option is set the way you want. 2. Use the qtree oplocks command, as follows: TWUHH RSORFNV >QDPH >HQDEOH _ GLVDEOH@@ The command takes effect immediately. NOTE: If you disable the oplocks feature on a qtree, existing oplocks in the qtree are not broken. ([DPSOH :LWK $ TWUHH To enable oplocks in the /vol/users/docs qtree if oplocks are disabled and the cifs.oplocks.
7KH TWUHH &RPPDQG 'LVSOD\ The qtree command lists for a filer the items described in Table 10-4. 7DEOH TWUHH &RPPDQG 'LVSOD\ )LHOG &RQWHQWV Volume The volumes on a filer. Keep in mind that a volume is itself a qtree. qtree qtrees that are not volumes; each is listed next to its volume. Style The security style of each qtree. Oplocks The oplocks setting of each qtree.
10-10 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
&+$37(5 4XRWDV DQG 0D[LPXP 1XPEHU RI )LOHV 5HVWULFWLQJ RU 7UDFNLQJ 'LVN 8VDJH E\ 8VLQJ 'LVN 4XRWDV $ERXW 'LVN 4XRWDV Filer disk quotas restrict disk space and the number of files used by a user, a group, or a qtree. For information about how to create a qtree, refer to Chapter 10, qtree Administration. This chapter discusses how to manage disk quotas by editing the /etc/quotas file. )RUPDW RI WKH 4XRWDV )LOH To set up disk quotas, create a quotas file in the /etc directory.
4XRWD 7DUJHW )LHOG Specifies the user, group, or qtree on which you want to impose restrictions. You can assign more than one quota to a user or group, but only one quota to a qtree. The entries can be in any order.
you have not specified a user quota in the quotas file can use up to 500 MB of disk space. To override a default for a specific user or group, specify a quota for that user or group. 7\SH )LHOG You can enter one of the following values in the Type field to define the quota type: user: If a user quota applies just to a tree and not to the entire volume, specify user@tree, where tree is the name of a qtree.
6DPSOH 4XRWDV )LOH Following is a sample quotas file that includes different kinds of quotas: #Quota Target /vol/home/user/jdoe 108 jsmith publications /vol/home/eng /vol/cad/proj1 writers * * * * mhoward mhoward mfisher type user user user@/vol/rls group group@/vol/cad tree group@/vol/cad/proj1 user user@/vol/cad/proj1 group group@/vol/cad/proj1 user user@/vol/cad/proj1 user disk 500M 500M 500M 750M 750M 750M 150M 50M 50M 750M 100M 150M 75M - files 10K 10K 10K 75K 75K 15K 10K 85K 75K 100K 75K - Any ope
There is no limit as to how much disk space or how many files the user mfisher can use. You can, however, use the quota report command to display the amount of disk space and the number of files used by this user. Both user and group quotas apply to the entire specified volume (or the root volume if no volume name is specified). This is true even if the quota target in the quotas file is specified in the form of a path name.
5HVL]LQJ 4XRWDV The quota resize command updates active quotas without recalculating disk usage, and is faster than quota off followed by quota on. An active quota is one that appears in the output of the quota report command, discussed in Displaying Information about Quotas. You use the quota resize command after changing limits for a group or user. For example, jdoe has a disk quota of 500 MB, as shown in the following example.
Because the quota target now has an active quota record, you can enter the quota resize command, including the volume name, to make the quota entry go into effect. This procedure takes less time than executing the quota off command followed by the quota on command because only the newly active quota is recalculated.
Alternatively, if jdoe is already under quota restriction, for example, if his files were restricted by a default user quota, enter the following command so that the user quota you just created can take effect: TXRWD UHVL]H KRPH &UHDWLQJ D *URXS 4XRWD Follow these steps to limit disk space used by a group named service: 1. Decide which group should be limited by a disk quota. In this example, the group is the owner of /vol/home/user/service.
:KHQ 4XRWDV $UH ([FHHGHG This section describes how the filer responds when quotas are exceeded and what users see on the client systems. 0HVVDJHV 'LVSOD\HG E\ WKH )LOHU :KHQ 4XRWDV $UH ([FHHGHG When it receives a write request, the filer first determines whether the file to be written is in a qtree.
0HVVDJHV 'LVSOD\HG RQ &,)6 &OLHQWV If a write from a CIFS client to a filer causes a quota to be exceeded, the user experience depends on the operating system and the application. Following are two examples: An application might display a message as follows: &DQQRW ZULWH ILOH ILOHQDPH When a user tries to copy a file to the filer using the Explorer in Windows 95, the error is as follows: &DQQRW FUHDWH RU UHSODFH ILOHQDPH &DQQRW UHDG IURP WKH VRXUFH ILOH RU GLVN.
Information generated by the maxfiles command is available through SNMP using the Dell custom MIB. For more information about the MIB, see About the Dell Custom MIB in Chapter 4. 7KH GI &RPPDQG $ERXW WKH GI &RPPDQG To verify the amount of free disk space on the filer, enter the df command on the filer. Information generated from the df command is also available through SNMP, using the Dell custom MIB, which is described in About the Dell Custom MIB in Chapter 4.
In this way, the filer takes the qtrees into consideration when responding to a df command from a client and returns the amount of free space in each qtree, as opposed to the space available in the entire file system.
&+$37(5 'DWD %DFNXS ,QWURGXFWLRQ WR 'DWD %DFNXS 0HDQLQJ RI 'DWD %DFNXS Data backup means copying data from disk to tape. While the filer dump command enables you to copy data to standard output, this chapter mainly discusses how to copy data to tape.
+RZ WKH GXPS &RPPDQG :RUNV 3XUSRVH RI WKH GXPS &RPPDQG The dump command writes file system data from disk to tape in a format that enables you to restore the data to a filer using the filers restore command or the Solaris ufsrestore command. :KDW WKH GXPS &RPPDQG &DQ %DFN 8S The dump command can back up a file, a directory, a qtree, or an entire volume. In the dump command, you specify the complete path name to be backed up. In this chapter, this path name is referred to as the dump path.
File type, including UNIX symbolic links and hard links File size DOS name, attributes, and create time Windows NT ACLs NOTE: The CIFS attributes (DOS name, attributes, and create time, and Windows NT ACLs) can be restored only with the filers restore command. You cannot use the Solaris ufsrestore command to restore these attributes, although the ufsrestore command can restore the data in CIFS-created files.
filer. If you want to back up the filer to a tape drive attached to a SunOS or Solaris computer, include the filer in the /.rhosts file on the computer. The filer can resolve the name of the computer to which the tape drive is attached using the information about the computer in the filers /etc/hosts file or in the DNS database. Standard output, provided that you enter the dump command through rsh.
)RUPDW RI WKH %DFNXS 'DWD $ERXW 7KLV 6HFWLRQ When the filer executes the dump command, it displays messages showing the different passes of the dump command. This section discusses the format of the backup data and what data is written to tape in each pass of the dump command. %DFNXS 'DWD )RUPDW The backup data format is organized based on inodes. An inode for a file or a directory contains information for tracking the files or the directorys type, time stamps, bad blocks, and so on.
+RZ WKH GXPS &RPPDQG :ULWHV DQG 6WRUHV 'DWD RQ 7DSH $ERXW 7KLV 6HFWLRQ The dump command transfers a number of blocks of data at a time to an output file on tape. This section provides information about how the command writes and stores these blocks of data, which helps you decide the dump command format appropriate for your backup. 0HDQLQJ RI 7DSH %ORFN A tape block is 1 kilobyte of data. In the dump command, you can specify the number of tape blocks that are transferred in each write operation.
A tape can contain multiple tape files, but any tape must contain at least one complete tape file. 'LIIHUHQW 7\SHV RI 7DSH )LOHV The dump command can use these types of tape files: Local or remote. (Refer to Devices Used by the Dump Command for more information about where the tape devices can be located.) Rewind or norewind. If the tape file is a rewind file, the filer rewinds the tape after it finishes writing the tape file.
6WHSV IRU (VWLPDWLQJ WKH $PRXQW RI 'DWD LI
you to load additional tapes. If you start the dump command through rsh, you do not see the prompts from the filer and the dump command cannot be completed because of the lack of tapes. 3UHUHTXLVLWHV You must meet these prerequisites before you can determine the number of tape files required: The filer must be able to display tape drive information. To learn how to display tape drive information, refer to Displaying Tape Device Information in Chapter 14.
*HQHUDO 3UHUHTXLVLWHV You must meet these prerequisites for the dump command to run successfully: You must have enough tape space for the backup. Refer to Determining the Number of Tapes for the Backup to determine the number of tapes required for the backup. The tape drive is available. That is, it is not currently used for data backup or recovery. 3UHUHTXLVLWHV IRU %DFNLQJ 8S WR D 1RQTXDOLILHG 7DSH 'ULYH The tape drive must be included in the /etc/cloned_tapes file.
5HFRPPHQGDWLRQV IRU 3HUIRUPLQJ D %DFNXS $ERXW 7KLV 6HFWLRQ Some recommendations in this section are applicable to all kinds of backups; some recommendations depend on your priorities, such as your need to minimize backup time or to minimize tape handling. *HQHUDO 5HFRPPHQGDWLRQV Follow the recommendations in this section when you back up data from the filer. $YRLG %DFNLQJ 8S 7RR 0XFK 'DWD LQ D 6LQJOH 'XPS &RPPDQG The reasons are listed below: The dump command cannot be restarted.
8VH 0XOWLSOH /RFDO 7DSH 'ULYHV Attach the maximum number of tape drives to the filer. The filer can write faster to a local tape drive than to a tape drive attached to another system. 2UJDQL]H 'DWD WR EH %DFNHG 8S The first two passes of the dump command run faster if the dump path is one of these: A volume A qtree Data not belonging to any qtrees /LPLW WKH $PRXQW RI 'DWD LQ (DFK %DFNXS Limit the amount of data in a volume or qtree to be backed up to 200 GB.
7KH GXPS &RPPDQG 6\QWD[ &RPPDQG 6\QWD[ The dump command syntax is as follows: dump [ option argument ] path 5XOHV IRU (QWHULQJ WKH GXPS &RPPDQG The following list describes the rules for entering the dump command: option can be a list. You must list all options together; do not separate the options by commas or spaces. argument can be a list of arguments, each of which is associated with an option. The arguments are separated by spaces.
The argument for the f option is rst0a (the tape file name), and the argument for the b option is 63 (blocking factor). The rst0a and 63 arguments must be listed in the same order as the f and b options. 3DWK The path name is /vol/vol0/, which means that all files and directories in the vol0 volume are backed up to tape. NOTE: The dump command consists of more options than those described in this section. All options are described in greater detail in the next section.
7DEOH GXPS &RPPDQG 'HVFULSWLRQV FRQWLQXHG 2SWLRQ 0HDQLQJ Q It takes a volume name as argument. The dump command backs up all data in the specified volume that does not reside in a qtree. You cannot perform incremental backups on data that is backed up with the Q option. However, you can use both the Q option and u option to record the backup in the /etc/dumpdates file. The entry in the /etc/dumpdates file enables you to keep a history of the backups.
3UHUHTXLVLWHV You must meet all the prerequisites described in Prerequisites for the Dump Command. 5HVWULFWLRQV You can run up to four dump commands in parallel. 6WHSV Follow these steps to execute a dump command: 1. Prepare the number of tapes required, following the steps described in Determining the Number of Tapes for the Backup. 2. Determine and note the blocking factor used in the backup. For more information about blocking factors, refer to Meaning of Tape Block. 3.
([DPSOH RI DQ ,QFUHPHQWDO %DFNXS WR D /RFDO 7DSH 'ULYH dump 1uf nrst0a /vol/vol1 The command performs a level-1 backup of the /vol/vol1 volume to nrst0a. This means that only files that have changed since the most recent level-0 backup are written to tape. After the command is finished, it does not rewind the tape. ([DPSOHV RI %DFNXSV WR 0XOWLSOH 7DSH )LOHV dump 0f rst0a,rst1a /vol/vol1 The command backs up the /vol/vol1 volume to the tape on rst0a.
command fails. The l option specifies that you interactively enter the names of individual files and directories to be backed up from the /vol/vol1/home directory. The filer displays some messages and a prompt for the names of the files and directories you want to back up. Enter each name as a path name relative to the dump path in the dump command. Do not specify .. or specify a directory that contains symbolic links. To end the list of names, use a blank line or press Ctrl-D.
([DPSOH RI ([FOXGLQJ )LOHV )URP D %DFNXS dump 0ufX rst0a tmp,*.o,core*,*backup*,usr\, /vol/vol1 The command performs a level-0 backup of the /vol/vol1 volume, which excludes the files that meet one of these requirements: The name is tmp. The name ends in .o (for example, program.o). The name begins with core (for example, core.small). The name contains backup (for example, spec.backup.1). The name is usr,.
7DEOH 6DPSOH RI %DFNLQJ 8S WR 7DSH 6WDFNHU 6KDUHG E\ 0XOWLSOH )LOHUV 'D\ RI ZHHN GXPS FRPPDQGV RQ HDFK ILOHU Sunday filer1: dump 0uf urst0a,urst0a,urst0a /vol/vol1 filer3: dump 1uf filer1:nrst1a /vol/vol6 filer2: dump 2uf filer1:urst1a /vol/vol4 Monday filer1: dump 0uf urst0a,urst0a,urst0a /vol/vol2 filer3: dump 1uf filer1:nrst1a /vol/vol7 filer2: dump 2uf filer1:urst1a /vol/vol5 Tuesday filer1: dump 0uf urst0a,urst0a,urst0a /vol/vol3 filer1: dump 1uf nrst1a /vol/vol1 filer3: dump 2uf f
7DEOH 6DPSOH RI %DFNLQJ 8S WR 7DSH 6WDFNHU 6KDUHG E\ 0XOWLSOH )LOHUV FRQWLQXHG 'D\ RI ZHHN GXPS FRPPDQGV RQ HDFK ILOHU Thursday filer2: dump 0uf filer1:urst0a,urst0a,urst0a /vol/vol5 filer1: dump 1uf nrst1a /vol/vol3 filer1: dump 2uf urst1a /vol/vol1 Friday filer3: dump 0uf filer1:urst0a,urst0a,urst0a /vol/vol6 filer2: dump 1uf filer1:nrst1a /vol/vol4 filer1: dump 2uf urst1a /vol/vol2 Saturday filer3: dump 0uf filer1:urst0a,urst0a,urst0a /vol/vol7 filer2: dump 1uf filer1:nrst1a /vol/vol
Table 12-3 shows the sample backup schedule: 7DEOH 6DPSOH RI %DFNLQJ 8S WKH (QWLUH )LOHU 'D\ RI ZHHN GXPS FRPPDQGV Sunday dump 0uf urst0a,urst0a,urst0a /vol/vol1 dump 1uf nrst1a /vol/vol6 dump 2uf urst1a /vol/vol4 Monday dump 0uf urst0a,urst0a,urst0a /vol/vol2 dump 1uf nrst1a /vol/vol7 dump 2uf urst1a /vol/vol5 Tuesday dump 0uf urst0a,urst0a,urst0a /vol/vol3 dump 1uf nrst1a /vol/vol1 dump 2uf urst1a /vol/vol6 Wednesday dump 0uf urst0a,urst0a,urst0a /vol/vol4 dump 1uf nrst1a /vol/vol2 dump 2
&+$37(5 'DWD 5HFRYHU\ ,QWURGXFWLRQ WR 'DWD 5HFRYHU\ :K\
:KHQ
5XOHV IRU 8VLQJ WKH UHVWRUH &RPPDQG Follow these rules when you enter the restore command: Specify no more than one function key. Place the subtree parameter after the last argument. Specify multiple options without intervening spaces. Enter the arguments for each option in the order that you specify the options. Separate each argument from the next with a space. 7KH UHVWRUH &RPPDQG )XQFWLRQ .H\V Table 13-1 describes the function keys for the restore command.
7DEOH UHVWRUH &RPPDQG 2SWLRQV FRQWLQXHG 2SWLRQ $UJXPHQW 0HDQLQJ D pathname Specifies the absolute path name of a directory into which the files are restored. Without the path name, the files are restored to the directory from which they were backed up. If you created a backup before you installed multiple volumes on the filer, specify the path name into which the backup is restored.
7KH L )XQFWLRQ .H\ RI WKH 6RODULV 8IVUHVWRUH &RPPDQG The restore command is similar to the Solaris ufsrestore command, except that the restore command doesnt support the i function key of ufsrestore. This function key enables you to specify interactively individual files and directories to be restored from a tape. However, you can restore individual files and directories using the x argument of the filer restore command.
It is less likely that someone inadvertently terminates the restore command. If you enter a restore command on the console, it could be terminated by a Ctrl-C entered on a host connected to the filer using telnet. However, if you enter the restore command on the console, you can read and respond to screen messages displayed by the command. For example, the command might prompt you for another tape to complete the recovery. 6WHSV Follow these steps to restore files to the filer: 1.
5. Enter the restore command to recover the entire volume. Example: UHVWRUH UI' UVW D YRO YRO 6. Enter the restore command to restore each qtree in the volume. Examples: UHVWRUH [I' UVW D YRO YRO 17XVHUV 17XVHUV UHVWRUH [I' UVW D YRO YRO 81,;XVHUV 81,;XVHUV ([DPSOHV RI WKH UHVWRUH &RPPDQG ([DPSOH RI 5HVWRULQJ D 6XEWUHH Perform the following steps to restore a subtree named /vol/vol0/home from a local tape drive. The subtree was backed up as a subtree, not as a directory within a subtree. 1.
([DPSOH RI 5HVWRULQJ WKH (QWLUH )LOHU To restore the entire filer, repeat the procedure described in this section for each volume. This section assumes that you already initialized the disks on your filer. ,I 7KHUH ,V 2QH %DFNXS IRU (DFK 9ROXPH If you used one dump command to back up each volume, follow the procedure in Example of Restoring a Subtree to restore each volume. The only difference is that you use /vol/volume_name as the directory to which the backup is restored.
7. After the restore is finished, remove the tape from the drive. Install another tape that contains the next lowest level of incremental dump. Example: If you have dump tapes containing level 1, level 2, and level 3 dumps of /vol/vol0/etc, load the tape with the level 1 dump in the drive and repeat the restore command. Repeat this step until the backup of the highest dump level, level 3 in this example, is restored. 8.
([DPSOH The subtree containing the directory to be restored was backed up to two tapes: restore xf rst0a /test In this command, you must specify the tape device for the first tape; it is rst0a in this example. This is necessary because restore needs to read information about the directory structure of the subtree from the first tape before restoring the data. The filer then displays the following messages to let you specify the tape devices containing the multiple tape volumes.
last tape file that was successfully used for restoring data. You do not have to start the command from the beginning of the backup. 5HVWULFWLRQV The restore command has the following restrictions: You can restart a restore command only if the backup consists of multiple tape files. If the backup contains only one tape file, simply reenter the restore command to start the recovery from the beginning of the backup. You can restart a restore command only if the command is for a full restore.
+RZ WR 8VH D )LOHU 7DSH 'ULYH WR 5HVWRUH )LOHV WR $QRWKHU 6\VWHP $ERXW 7KLV 6HFWLRQ This section describes the requirements for using commands such as ufsrestore on another system to restore data from a tape drive attached to the filer. It also describes how to specify the tape drive in the command for restoring data. This section does not discuss the exact commands that you need to enter on the other system. Refer to the documentation for the other system to learn about its commands for restoring data.
&+$37(5 7DSH 'HYLFH 0DQDJHPHQW ,QWURGXFWLRQ WR 7DSH 'HYLFH 0DQDJHPHQW :K\
'LVSOD\LQJ 7DSH 'HYLFH ,QIRUPDWLRQ 'HVFULSWLRQ Before you use the dump command to back up to a tape device attached to the filer, verify that the filer detects the device. Also, verify the device name to be included in the dump command.
'LVSOD\LQJ 7DSH 'HYLFH ,QIRUPDWLRQ $ORQJ :LWK 2WKHU )LOHU ,QIRUPDWLRQ You can use the sysconfig -v command to display the filer hardware information. Look for the information about the SCSI adapter to which the tape devices are attached. ([DPSOH RI WKH V\VFRQILJ W &RPPDQG IRU D 4XDOLILHG 7DSH 'ULYH The following example of the sysconfig -t command displays information about a qualified tape drive: sysconfig -t Tape drive (6.
In this example, a tape library with SCSI ID 6 is attached to slot 6 of the filer. ([DPSOH RI WKH V\VFRQILJ Y &RPPDQG The following example shows a tape stacker with SCSI ID 6 and a tape drive with SCSI ID 4 attached to slot 6 of the filer: slot 6: SCSI Host Adapter 6 (QLogic ISP 1040B) Firmware Version 2.26 Clock Rate 60MHz. 6: BHTi Quad 7 1.
$SSHQGLQJ D 'XPS To skip over a previously created dump file and append a dump on a tape device, use the fsf command, as in the following example: mt -f nrst0a fsf 1 5HZLQGLQJ D 7DSH To rewind a tape, use the rewind command, as in the following example: mt -f nrst0a rewind 7DNLQJ D 7DSH 'ULYH 2II /LQH To rewind the tape and, if appropriate, take the tape drive off-line by unloading the tape, use the offline command, as in the following example: mt -f nrst0a offline 'LVSOD\LQJ 6WDWXV ,QIRUPDWLRQ To displa
14-6 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
&+$37(5 9ROXPH &RS\ 8VLQJ WKH YRO FRS\ &RPPDQG 6HW $ERXW 7KLV &KDSWHU 2YHUYLHZ RI 9ROXPH &RS\ The filer can copy data from one volume to another volume at a given time. The result of copying a volume is an off-line volume containing the same data as the source filer at the time you initiated the copy operation. ,QWURGXFWLRQ WR WKH )LOHU·V &RPPDQGV IRU &RS\LQJ 9ROXPHV 3XUSRVHV RI WKH YRO FRS\ &RPPDQG 6HW The vol copy command set enables you to copy one volume to another.
7DEOH YRO FRS\ &RPPDQG 6LWXDWLRQV 6LWXDWLRQ 5HDVRQV IRU FRS\LQJ RQH YROXPH WR DQRWKHU You want to copy data from one filer to another regularly to ensure high data availability. After you copy the data, clients can switch to the destination filer in the following scenarios: When you shut down the source filer for software or hardware upgrades.
5HTXLUHPHQWV DQG 5HFRPPHQGDWLRQ )RU &RS\LQJ D 9ROXPH 5HTXLUHPHQWV IRU &RS\LQJ D 9ROXPH The filers involved in a volume copy operation must meet several requirements for data to be copied successfully. The following list is a brief description of these requirements. The rest of this section provides more detailed information about verifying whether the source and destination volumes meet these requirements. The source volume must be on-line and the destination volume must exist and be off-line.
NOTE: The vol offline command takes effect only after you reboot the filer. 9HULI\LQJ WKH 6L]H RI (DFK 9ROXPH The capacity of the destination volume must be greater than or equal to the capacity of the source volume, regardless of how many snapshots you try to copy. To verify the capacity of a volume, follow these steps: 1. Enter the following command syntax: df /vol/volume_name The command displays information about disk space in the active file system and in the snapshot for the specified volume. 2.
packets. Users of the filers involved in a volume copy operation might notice a degradation in response time during the copy. 'HWDLOV $ERXW &RS\LQJ 2QH 9ROXPH WR $QRWKHU &RPPDQG 6\QWD[ IRU &RS\LQJ 2QH 9ROXPH WR $QRWKHU To copy one volume to another, use the following command syntax: vol copy start [ -S | -s snapshot ] source destination 6SHFLI\LQJ WKH 6QDSVKRWV WR &RS\ The -S and -s arguments specify the snapshots to copy.
:KHUH WR (QWHU WKH YRO FRS\ VWDUW &RPPDQG If the copying takes place between two filers, you can enter the command on either the source or destination filer. You cannot, however, enter the command on a third filer that does not contain the source or destination volume. ([DPSOHV RI WKH YRO FRS\ VWDUW &RPPDQG Table 15-3 shows several examples of the vol copy start command.
:KHQ WR 8VH WKH 9ROXPH &RS\ 2SHUDWLRQ 1XPEHU You need the volume copy operation number if you want to stop a volume copy operation or change the volume copy operation speed. For more information about obtaining the volume copy operation number, see Checking the Status of a Volume Copy Operation. 6FUHHQ 0HVVDJHV )URP WKH YRO FRS\ &RPPDQG When the filer is copying a volume, the filer displays messages indicating the percentage of the volume copy operation completed and the number of minutes remaining.
that performs the local copying. The filer cannot support these two additional volume copy operations because three operations are already in progress. 3RVVLEOH (UURUV If your filer does not meet a requirement described in Requirements and Recommendation for Copying a Volume, the vol copy start command generates one or more error messages. Table 15-4 explains the meanings of the possible error messages. 7DEOH YRO FRS\ VWDUW &RPPDQG (UURU 0HVVDJHV (UURU PHVVDJH 0HDQLQJ Permission denied.
This command displays the status for a specified volume copy operation. If you do not specify the operation number, the command displays the status of all volume copy operations in progress. In the command output, the operations are differentiated from one another with unique volume copy operation numbers, ranging from 0 to 3. For more information about volume copy operation numbers, see Results of the vol copy start Command.
$ERUWLQJ D 9ROXPH &RS\ 2SHUDWLRQ To stop a volume copy operation, use the following command syntax: vol copy abort [ operation_number ] The operation_number parameter specifies the volume copy operation to be aborted. You can obtain the operation number from the vol copy status output.
'LVSOD\LQJ WKH 'HIDXOW 6SHHG IRU &RS\LQJ D 9ROXPH Before starting the vol copy start command, you can verify the default speed for all volume copy operations using the following command: options vol.copy.throttle It displays the value (1 through 10) to be used by all volume copy operations. The value of the vol.copy.throttle option was set at 10 at the factory.
15-12 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
&+$37(5 'DWD 5HSOLFDWLRQ 8VLQJ 6QDS0LUURU $ERXW 7KLV &KDSWHU 2YHUYLHZ RI 6QDS0LUURU The SnapMirror feature replicates data from one volume (the source) to another volume (the mirror) and periodically updates the mirror to reflect incremental changes on the source. The result of this process is an on-line, read-only volume that contains the same data as the source volume at the time of the most recent update. SnapMirror requires a license code.
7DEOH 5HSOLFDWLQJ D 9ROXPH 6LWXDWLRQ FRQWLQXHG 6LWXDWLRQ +RZ GDWD UHSOLFDWLRQ KHOSV Backup: You need to reserve all processing and networking resources on a filer for serving NFS and CIFS requests. After replicating data on the source filer, you can back up the data in the mirror to tape. This means the source filer does not have to allocate resources for performing backups. Data migration: You want to migrate data from one filer to another without interrupting network service.
To replicate data for the first time, the filer transfers all data in all snapshots in the source volume to the mirror. After the filer finishes transferring the data, it brings the mirror on-line. This version of the mirror is the base line for future incremental changes. +RZ WKH )LOHU 8SGDWHV WKH 0LUURU To make incremental changes on the mirror, the filer takes regular snapshots on the source volume according to the schedule specified in the /etc/snapmirror.conf file.
6QDSVKRWV &UHDWHG 'XULQJ 'DWD 5HSOLFDWLRQ 1DPLQJ &RQYHQWLRQV IRU 6QDSVKRWV 8VHG E\ 6QDS0LUURU SnapMirror creates snapshots on the source volume, which are copied to the mirror. The snapshot name is in the following format: filer_volume.number filer is the host name of the destination filer. volume is the name of the destination volume (the mirror). number is the number for the snapshot starting at 1. SnapMirror automatically deletes old snapshots that are no longer necessary for data replication.
When it is time to update the mirror, another snapshot is created on filerA. The snap list command on filerA generates the following display after /vol/vol1/filerB_vol2.2 is created on filerA: Volume vol1 working.... %/used %/total -------- ---------0% ( 0%) 0% ( 0%) 0% ( 0%) 0% ( 0%) 1% ( 0%) 0% ( 0%) 1% ( 0%) 0% ( 0%) 1% ( 0%) 0% ( 0%) 1% ( 0%) 1% ( 0%) date -----------Nov 17 10:52 Nov 17 10:51 Nov 17 10:00 Nov 17 00:00 Nov 15 16:00 Nov 15 15:00 name -------filerB_vol2.2 (busy) filerB_vol2.1 hourly.
+RZ 6QDS0LUURU :RUNV :LWK 4XRWDV 4XRWDV RQ WKH 0LUURU Quotas are always disabled on a mirror, regardless of whether quotas are enabled on the source volume. If you try to enable quotas on a mirror, the filer generates an error message. +RZ WR $SSO\ WKH 6DPH 4XRWD 5HVWULFWLRQV RQ WKH )RUPHU 0LUURU After you convert a mirror to a regular volume, you can enable quotas on it.
If you start the dump command when the filer is replicating data to the mirror, the filer stops the replication and does not update the mirror. It restarts replication after the dump command is finished. Delaying the mirror update is necessary because when the dump command backs up data from a snapshot, the snapshot must exist until the command is completed. During a mirror update, the filer deletes existing snapshots on the mirror and copies new ones from the source.
7KH HWF VQDSPLUURU FRQI )LOH 3XUSRVH RI WKH VQDSPLUURU FRQI )LOH The /etc/snapmirror.conf file resides on the destination filer. It controls where data is copied and how often a mirror is updated. The filer is not shipped with a default /etc/snapmirror.conf file. You must use a text editor to create the file if you want to use SnapMirror. :KHQ
5XOHV IRU 6SHFLI\LQJ WKH 8SGDWH 6FKHGXOH The schedule in each /etc/snapmirror.conf entry contains four fields: minute hour day of month day of week The fields are separated from each other by a space. If a field contains more than one value, the values are separated from each other by a comma. A field containing an asterisk (*) means that the field is irrelevant. If you specify an asterisk in each field of the schedule, the filer updates the mirror every minute. The update schedule is mandatory.
3UHUHTXLVLWHV The following prerequisites must be met before you can replicate a volume: You must purchase the SnapMirror license. If the source volume and the mirror are on different filers, you must purchase a license and enter the SnapMirror license code for each filer. Refer to Enabling Services in Chapter 2 for information about how to enter a license code. You must create an off-line volume to be used as the mirror. SnapMirror does not automatically create a volume.
time. If the filer does not have enough resources to perform all scheduled mirror updates, it postpones some updates until it has enough resources to do so. As a result, the filer might need to perform subsequent updates at times that are different from those you specify in the /etc/snapmirror.conf file. During data replication, the filer copies data from all snapshots from the source volume.
NOTE: The vol snapmirror on command does not persist across filer reboots. Put the command in the /etc/rc file if you want the command to remain in effect after the filer is rebooted. If the /etc/rc file does not contain a vol snapmirror command, data replication is disabled. 4. If the source volume and the mirror reside on different filers, and if the source volume has quotas enabled, copy the /etc/quotas file from the source filer to a file on the destination filer.
5HVXPLQJ 'DWD 5HSOLFDWLRQ IRU WKH (QWLUH )LOHU 'HVFULSWLRQ After you disable data replication, you can resume it at any time. When data replication resumes, the filer copies the data from the source volume to the mirror that has changed since the last update. 3UHUHTXLVLWHV In addition to the requirements described in Prerequisites on page 10, you must meet these requirements before you can resume data replication: The mirror must have snapmirrored status.
6WHSV WR 'LVDEOH 'DWD 5HSOLFDWLRQ IRU 2QH 9ROXPH Follow these steps to disable data replication for one volume. These steps disable volume replication until you reenable it. 1. Comment out the entry in the /etc/snapmirror.conf file by preceding the entry with a pound sign (#). 2. Enter the vol snapmirror on command to make the filer reread the /etc/ snapmirror.conf file. Result: If the filer is currently transferring data from that volume, the transfer stops immediately.
6WHS To check the status of data replication, enter the vol snapmirror status command. Result: The filer displays a message showing whether a transfer is in progress or how much data replication has been completed. ([DPSOHV The following examples describe how the vol snapmirror status command displays the status of data replicating.
3UHUHTXLVLWH You must meet this prerequisite if the source volume and the mirror reside on different filers and you want the same quota restrictions to be applied after converting the mirror to a regular volume: The destination filer must have a /etc/quotas file that includes all entries from the /etc/ quotas file used by the source filer.
7DEOH 'LIIHUHQFHV LQ YRO FRS\ &RPPDQG DQG 6QDS0LUURU 7KH YRO FRS\ FRPPDQG 6QDS0LUURU It is a standard Data ONTAP 5.3 feature that requires no license codes. It requires a license code. The result of copying a volume is an off-line volume. The result of replicating a volume is a mirror, which is an on-line, read-only volume. It does not copy incremental changes from the source volume. It periodically copies incremental changes from the source volume.
16-18 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
&+$37(5 6\VWHP ,QIRUPDWLRQ DQG 3HUIRUPDQFH 'LVSOD\LQJ WKH 'DWD 217$3 9HUVLRQ +RZ WR 'LVSOD\ WKH 'DWD 217$3 9HUVLRQ To display the version of Data ONTAP currently running on a filer, use the version command. The display shows the version number and the date of the version, as follows: version NetApp Release 5.3: Fri May 12 03:06:00 PDT 1998 'LVSOD\LQJ )LOHU &RQILJXUDWLRQ ,QIRUPDWLRQ 8VH WKH V\VFRQILJ &RPPDQG The sysconfig command displays information about the filers hardware configuration.
Determining how much space on each disk is available to the filer. Refer to Understanding Usable Space on Each Disk in Chapter 3 for more information about disk capacity. Determining the status of the disk operations, such as RAID scrubbing, reconstruction, parity verification, adding a hot spare, and disk failure. You can obtain the information displayed by sysconfig -r from SNMP, using the Dell custom MIB. For information about SNMP, see Using SNMP in Chapter 4.
'LVSOD\LQJ 5$,' ,QIRUPDWLRQ 8VLQJ 9RO VWDWXV U The vol status -r command displays a list of the RAID information. The display is the same as the sysconfig -r display. 'LVSOD\LQJ 5$,' ,QIRUPDWLRQ IRU (DFK *URXS 8VLQJ 9RO VWDWXV Y The vol status -v command displays information about each RAID group. 'LVSOD\LQJ )LOHU 6WDWLVWLFV 8VH WKH V\VVWDW DQG XSWLPH &RPPDQGV You use the sysstat and uptime commands to display filer statistics.
$ERXW WKH XSWLPH &RPPDQG The uptime command prints the current time, the length of time the system has been up, and the total number of NFS operations the system has performed since it was last booted. ([DPSOH An example of the display is uptime 8:54am up 2 days 22:23, 3122520 NFS ops 'LVSOD\LQJ 1HWZRUN 6WDWLVWLFV 8VH WKH QHWVWDW &RPPDQG You use the netstat command to display network statistics. $ERXW WKH QHWVWDW &RPPDQG The netstat command displays network-related data in various output formats.
ifstat [-z] -a | interface The -z option zeros (or clears) the statistics. The -a option lists statistics for all the filers interfaces. The interface option indicates the type of interface for which you want statistics. ([SODQDWLRQ RI ,QWHUIDFH 6WDWLVWLFV (WKHUQHW Table 17-1 describes the statistics in the RECEIVE section of the ifstat command output when you use the command on an Ethernet interface.
7DEOH LIVWDW &RPPDQG RQ (WKHUQHW ,QWHUIDFH ³ 75$160,7 6WDWLVWLF 0HDQLQJ Packets Number of packets attempted to be transmitted. Bytes Number of bytes attempted to be transmitted. Errors Number of hardware errors encountered while attempting to transmit. Collisions Number of collisions that occurred while transmitting frames. Late collisions Number of collisions terminated due to a late collision. Excess coll Number of times transmission was terminated due to excessive collisions.
7DEOH LIVWDW &RPPDQG RQ (WKHUQHW ,QWHUIDFH ³ '(9,&( 6WDWLVWLF 0HDQLQJ Interrupts Number of times the Ethernet device interrupted the host. Resets Number of times the Ethernet device was reset. Table 17-4 describes the statistics in the LINK INFO section of the ifstat command output when you use the command on an Ethernet interface. 7DEOH LIVWDW &RPPDQG RQ (WKHUQHW ,QWHUIDFH ³ /,1. ,1)2 6WDWLVWLF 0HDQLQJ Auto Auto-Negotiation state. Mediatype Media type, such as twisted pair.
7DEOH LIVWDW &RPPDQG RQ *% (WKHUQHW ,QWHUIDFH ³ 75$160,7 6WDWLVWLF 0HDQLQJ Packets Number of packets attempted to be transmitted. Bytes Number of bytes attempted to be transmitted. Errors Number of hardware errors encountered while attempting to transmit. Collisions Number of collisions that occurred while transmitting frames. Unicast packets Number of unicast packets transmitted.
is rounded up to the next highest 4K boundary. If a user tries to create a file that would cause the directory to grow larger than the specified size limit, the users command fails. %DODQFLQJ 1)6 7UDIILF RQ 1HWZRUN ,QWHUIDFHV To balance network traffic among different interfaces, attach multiple interfaces on the filer to the same physical network.
17-10 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
&+$37(5 7URXEOHVKRRWLQJ *HWWLQJ 7HFKQLFDO $VVLVWDQFH ,QIRUPDWLRQ WR 1RWH %HIRUH &DOOLQJ IRU 6XSSRUW If you encounter problems with the filer that you cannot solve, you might need to contact your service provider or Dell technical support for assistance.
3URFHGXUH IRU %RRWLQJ )URP 'LVNHWWH To display the boot menu from a diskette, perform the following steps: 1. Insert the diskette labeled System Boot Disk 1 into the filers diskette drive. NOTE: The Data ONTAP 5.3 system boot diskettes are specific to the model of filer that you are updating. You received diskettes appropriate to the model you are updating. If you have different models, be sure to check the diskette labels to make sure youre using the correct diskettes for the filer. 2.
Maintenance mode boot (5) Use Maintenance mode boot to go into Maintenance mode and perform some volume and disk operations and get detailed volume and disk information. Maintenance mode is special for the following reasons: Most normal functions, including file-system operations, are disabled. A limited set of commands is available for diagnosing and repairing disk and volume problems. You exit Maintenance mode with the halt command.
,QFRQVLVWHQF\ 'XH WR /RJ 8SGDWHV IRU 2II OLQH 9ROXPH If the inconsistency is due to the log having updates for an off-line volume, the filer asks whether to discard them. ,QFRQVLVWHQF\ 'XH WR 2WKHU 5HDVRQV If there are many inconsistencies that cannot be repaired, the filer discards the inconsistent contents and creates a core dump file. The file requests received during the last few seconds before the filer shuts down are lost.
9ROXPH 1DPH 3UREOHPV 9ROXPH 1DPLQJ 5XOHV A valid volume name has the following characteristics: The prefix is followed by either a letter or an underscore (_). It contains only letters, digits, and underscores. It is not longer than 255 characters.
'LVN )DLOXUH :LWKRXW D +RW 6SDUH 'LVN $ERXW 7KLV 6HFWLRQ This section describes how the filer reacts to a disk failure when a hot spare disk is available. )LOHU 5XQV LQ 'HJUDGHG 0RGH If a disk fails, the filer continues to run without losing any data but has a somewhat degraded performance.
)LOHU 5HSODFHV 'LVN :LWK 6SDUH DQG 5HFRQVWUXFWV 'DWD If a disk fails, the filer replaces the failed disk with a hot spare disk logs the activity in the /etc/messages file on the root volume reconstructs the missing data on the hot spare disk in the background, so that the interruption to file service is minimized The filer does not shut down automatically.
The disk is specified correctly. The specified disk is a spare. (UURU 0HVVDJH 6\VWHP &DQQRW %RRW %HFDXVH 'LVNV $UH 0LVVLQJ You might get a message similar to the following: The system cannot boot with more than one disk missing from a RAID group. This message indicates that a volume might be missing some disks because either not all the disks in a volume were transferred to a new filer or disks were damaged. Make sure that all the disks in a volume were transferred.
'LVN 2SHUDWLRQV LQ 0DLQWHQDQFH 0RGH 0DLQWHQDQFH 0RGH 2SHUDWLRQV Maintenance mode enables you to perform the following operations to troubleshoot disk problems: Obtain detailed device information for each disk with the disk_list command. Check access to a particular disk with the disk_check command. Erase a disk label with the disk_erase_label command. NOTE: For information about Maintenance mode, see Booting From System Boot Diskette.
&RQILJXUDWLRQ 3UREOHPV 7KH HWF UF HWF H[SRUWV DQG HWF KRVWV )LOHV &DQ &RQWDLQ (UURUV Configuration problems usually occur in one of the three configuration files on the root volume: /etc/rc /etc/exports /etc/hosts This section describes common configuration problems.
+RZ WR 5HFRYHU )URP &RQILJXUDWLRQ (UURUV LI 1)6 ,V WKH 2QO\ /LFHQVHG 3URWRFRO If you are running NFS only, complete the following steps to recover from configuration errors in the /etc/rc file. 1. Display the boot menu from diskette as described in Booting From System Boot Diskette. 2. Enter 2 to choose Boot without /etc/rc. NOTE: Booting the filer without the /etc/rc file on the root volume automatically disables CIFS service. You cannot do this procedure using CIFS. 3.
3. When the filer prompts you for a new password, enter it at the prompt. Results: The system prints the following message: 3DVVZRUG &KDQJHG +LW 5HWXUQ WR UHERRW 4. Remove the diskette from the filers diskette drive and reboot the filer by pressing the Enter key.
:KDW WKH SLQJ &RPPDQG 'RHV The ping command checks whether the filer can communicate with other hosts on the network and that other hosts can communicate with the filer. +RZ WR 7URXEOHVKRRW 1HWZRUN 3UREOHPV If the filer should be able to connect with a host but ping does not respond with a message indicating that the host is alive, complete the following steps to troubleshoot the problem: 1. Check that the network cable is tightly connected to the proper interface connector. 2.
1)6 3UREOHPV &OLHQW·V ,QDELOLW\ 7R 0RXQW 'LUHFWRULHV ,QGLFDWHV 1)6 3UREOHPV NFS problems are indicated when the filer and the client can communicate with each other using the ping command and the client can connect to the filer using telnet, but the client cannot mount volumes or directories from the filer. +RZ WR 7URXEOHVKRRW 1)6 3UREOHPV Complete the following steps to troubleshoot NFS problems: 1. Make sure that the filer is licensed for NFS by entering the license command at the filer prompt.
:LQGRZV $FFHVV 3UREOHPV .LQGV RI $FFHVV 3UREOHPV This section describes preliminary troubleshooting steps, then describes how to troubleshoot the following problems: Filer cant register with the Windows NT domain. Incorrect password or unknown username. Users cant map a drive. 3UHOLPLQDU\ 7URXEOHVKRRWLQJ 6WHSV Complete the following steps to begin to troubleshoot Windows problems: 1. Make sure that the filer is licensed for CIFS by entering the license command at the filer prompt.
7DEOH 8VLQJ :,16 ,V WKH :,16 VHUYHU ZRUNLQJ"
,QFRUUHFW 3DVVZRUG RU 8QNQRZQ 8VHUQDPH Use Table 18-3 to troubleshoot the problem.
definition number. Large file systems require a 32-bit inode definition number. The problem generally occurs only on file systems with a large number of hard links. :K\ WKH 3UREOHP 2FFXUV Some versions of cpio work by copying each file with hard links once and then recreating the hard links. Trouble occurs because the inode number is assumed to be 16 bits. If another file has a matching low-order 16 bits, an internal number collision occurs, which cpio does not recognize.
TWUHHV $IIHFW 'LVN 6SDFH 'LVSOD\HG E\ GI If a directory in a qtree is mounted and a client issues a df command on something under that mount point, the command shows the smaller of the clients file system limit or the filer disk space. This makes the qtree look fuller according to the client df command than it actually is. )LOHU 4XRWD 5HSRUW &RPPDQG $OZD\V 'LVSOD\V &RUUHFW 8VDJH The filer quota report command shows the correct usage within that qtree.
18-20 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
&+$37(5 'HWDLOHG 2SWLRQV ,QIRUPDWLRQ $ERXW RSWLRQV $ERXW 6HWWLQJ 'HWDLOHG ,QIRUPDWLRQ Options are also described in other sections of this guide and in the man pages. The vol(1) man page contains information about the vol options command options. 2SWLRQ 9DOXHV The default value of an option is listed below the option name. The following conventions apply to default values listed: None means that there is no default value. If the default is On, the other possible value is Off.
7KH DXWRVXSSRUW GRLW 2SWLRQ 'HIDXOW None 'HVFULSWLRQ Immediately sends an email message describing the status of the filer. A word entered as the value for the option is sent in the notification subject line and should describe the reason for the notification. 7KH DXWRVXSSRUW HQDEOH 2SWLRQ 'HIDXOW On 'HVFULSWLRQ Enables the autosupport daemon, which sends automatic email messages to report the status of the filer.
7KH DXWRVXSSRUW QRWHWR 2SWLRQ 'HIDXOW None 'HVFULSWLRQ Specifies up to five recipients of an automatic short email message. Use a commaseparated list with no spaces. &,)6 2SWLRQV :KDW WKH &,)6 2SWLRQV 'R The CIFS options control CIFS features on the filer. 7KH FLIV DFFHVVBORJJLQJBHQDEOH 2SWLRQ 'HIDXOW Off 'HVFULSWLRQ When On, enables the filer to process access logging, or auditing, information. The default is Off.
'HVFULSWLRQ When On, directories in the path to a file are not required to have the 'X' (traverse) permission. NOTE: This option does not apply in UNIX qtrees or volumes. 7KH FLIV JXHVWBDFFRXQW 2SWLRQ 'HIDXOW None 'HVFULSWLRQ When you leave cifs.guest_account blank, a CIFS user can log in to the filer without an account in the password database, provided that a domain controller authenticates the user. When you set cifs.
7KH FLIV QHWELRVBDOLDVHV 2SWLRQ 'HIDXOW None 'HVFULSWLRQ Specifies a list of alternative names for the filer. Use a comma-separated list of names. 7KH FLIV RSORFNV HQDEOH 2SWLRQ 'HIDXOW On 'HVFULSWLRQ When this option is On, the filer enables clients to use oplocks (opportunistic locks) on files. Oplocks provide a significant performance enhancement, but have the potential to cause lost cached data on some networks with impaired reliability or latency, particularly wide-area networks.
'HVFULSWLRQ Specifies a second element for a single-element NetBIOS computer name. This element is case-sensitive. You use this option to isolate a group of computers on a network that communicate only with other computers with the identical NetBIOS Scope ID. This option is not recommended if you are using DNS for name resolution because NetBIOS Scope IDs and DNS are incompatible.
7KH FLIV V\POLQNV HQDEOH 2SWLRQ 'HIDXOW On 'HVFULSWLRQ When you set cifs.symlinks.enable to On (the default setting), if the object being accessed by a CIFS client is a symbolic link, the filer follows the link with the condition that the ultimate target turns out to reside within the originating share. This ensures that the client has access permission to the target.
+773 2SWLRQV :KDW WKH +773 2SWLRQV 'R The HTTP options enable and control HTTP services. For more information about HTTP on the filer, see Chapter 8, HTTP Administration. 7KH KWWSG DGPLQ HQDEOH 2SWLRQ 'HIDXOW On 'HVFULSWLRQ Enables HTTP access to the filers on-line Help files and other files used by FilerView. 7KH KWWSG HQDEOH 2SWLRQ 'HIDXOW Off 'HVFULSWLRQ Enables the HTTP server.
'HVFULSWLRQ Specifies the root directory containing files and directories that HTTP transfers to clients. 7KH KWWSG WLPHRXW 2SWLRQ 'HIDXOW 900 seconds (15 minutes) 'HVFULSWLRQ Specifies the minimum amount of time, in seconds, before an idle HTTP connection times out. 7KH KWWSG WLPHZDLW HQDEOH 2SWLRQ 'HIDXOW On 'HVFULSWLRQ When you set this option to On, the filer drops an HTTP connection one minute after the client closes it.
7KH QIV SHUBFOLHQWBVWDWV HQDEOH 2SWLRQ 'HIDXOW Off 'HVFULSWLRQ Specifies whether the filer collects and displays NFS statistics from individual clients. 7KH QIV WFS HQDEOH 2SWLRQ 'HIDXOW Off 'HVFULSWLRQ Specifies whether the filer supports NFS over TCP. Enable this option if a client has problems using NFS over UDP. 7KH QIV Y GI JE OLP 2SWLRQ 'HIDXOW Off 'HVFULSWLRQ Limits to 2 GB the response the filer gives to requests from NFS v2 clients regarding total space, free space, or available space.
7KH QIV ZHEQIV HQDEOH 2SWLRQ 'HIDXOW Off 'HVFULSWLRQ Turns WebNFS On and Off. 7KH QIV ZHEQIV URRWGLU 2SWLRQ 'HIDXOW None 'HVFULSWLRQ The specified directory becomes the root or public directory for WebNFS. When a request specifies a relative path, lookups for files are done with respect to this directory. 7KH QIV ZHEQIV URRWGLU VHW 2SWLRQ 'HIDXOW FALSE 'HVFULSWLRQ When set to TRUE, sets the directory specified in the nfs.webnfs.rootdir option to be the WebNFS root or public directory.
'HVFULSWLRQ Sets the NIS domain to the specified domain name. 7KH QLV HQDEOH 2SWLRQ 'HIDXOW Off 'HVFULSWLRQ Enables the NIS client on the filer. You must set the NIS domain before you enable NIS. 5$,' 2SWLRQV :KDW WKH 5$,' 2SWLRQV 'R The RAID options control how the filer uses RAID. For more information about RAID on the filer, see Chapter 3, Disk and File System Management. 7KH UDLG UHFRQVWUXFWBVSHHG 2SWLRQ 'HIDXOW 4 'HVFULSWLRQ Specifies the speed of RAID reconstruction.
7KH UDLG WLPHRXW 2SWLRQ 'HIDXOW 24 'HVFULSWLRQ Sets the time, in hours (from 1 through 24), that the system runs in degraded mode before an automatic shutdown. WLPHG 2SWLRQV :KDW WKH WLPHG 2SWLRQV 'R The timed options control whether and how the filer uses the timed daemon to synchronize time with a time server. For additional information about time synchronization and using the timed options, see Filer System Time Synchronization and Synchronizing Filer System Time in Chapter 2.
'HVFULSWLRQ Sets the maximum allowable discrepancy between filer time and server time. If there is a large discrepancy, it probably means that enough is wrong somewhere that the filer time should not be synchronized with the server time, no time synchronization takes place, and a message to that effect is sent to the console. The value is an integer followed by one of the following letters: s for seconds m for minutes h for hours The default is 30 minutes.
7KH WLPHG VHUYHUV 2SWLRQ 'HIDXOW None 'HVFULSWLRQ Specifies up to five servers in order of contact priority. The value can be a list of the host names or IP addresses of up to five time servers, separated by commas. The filer goes down the list until it finds a server that responds, then uses the time from that server. It starts with the first server in the list each time. An example list of three time servers is as follows: sundial, sundial.dell.com, 10.152.8.
'HVFULSWLRQ Prevents the update of the access time (atime) on an inode when a file is read. This option prevents inode updates from contending with reads from other files. Use it only on a filer with extremely high read traffic (for example, on a news server used by an Internet access provider or on a filer used mainly as an HTTP server). 7KH QRVQDS 2SWLRQ 'HIDXOW Off 'HVFULSWLRQ Temporarily disables automatic snapshots.
7KH UDLGVL]H 2SWLRQ 'HIDXOW None 'HVFULSWLRQ Sets the maximum size of a RAID group in volume. Must be an integer greater than one. 7KH URRW 2SWLRQ 'HIDXOW None 'HVFULSWLRQ Makes volume the root volume. 7KH VQDSPLUURUHG 2SWLRQ 'HIDXOW None 'HVFULSWLRQ The filer automatically sets this option to On if the volume is a mirror for data replication. Otherwise, the option is set to Off. Change the value to Off if you want to convert a mirror to a regular volume.
7KH FRQVROH HQFRGLQJ 2SWLRQ 'HIDXOW nfs 'HVFULSWLRQ Table 19-1 specifies how non-ASCII character information is presented. The value can be one of the following. 7DEOH FRQVROH HQFRGLQJ 9DOXHV 9DOXH 'HVFULSWLRQ nfs NFS character set. You can use both NFS extended (greater than 0x7F) and SGML characters for input. sgml SGML character format. You can use both NFS extended (greater than 0x7F) and SGML characters for input. utf8 UTF-8 character sets.
If you cannot establish a connection, set this option to Off. 7KH UVK HQDEOH 2SWLRQ 'HIDXOW On 'HVFULSWLRQ Enables the rsh server on the filer. 7KH VQPS HQDEOH 2SWLRQ 'HIDXOW On 'HVFULSWLRQ Enables the SNMP server on the filer. 7KH WHOQHW HQDEOH 2SWLRQ 'HIDXOW On 'HVFULSWLRQ Enables the Telnet server on the filer. 7KH WHOQHW KRVWV 2SWLRQ 'HIDXOW All hosts 'HVFULSWLRQ Specifies a list of hosts that can log in to the filer using telnet. You can limit telnet access to up to five specified hosts.
7KH YRO FRS\ WKURWWOH 2SWLRQ 'HIDXOW 10 'HVFULSWLRQ Specifies the default speed of vol copy operations. The speed ranges from 10 (fullspeed) to 1 (one-tenth of full-speed). 7KH ZDIO FRQYHUWBXFRGH 2SWLRQ 'HIDXOW Off 'HVFULSWLRQ Setting this option to On forces conversion of all directories to Unicode format when accessed from both NFS and CIFS. By default, conversion to Unicode format occurs as follows: Access from CIFS causes conversion of pre-4.0 and 4.0 format directories.
7KH ZDIO GHIDXOWBXQL[BXVHU 2SWLRQ 'HIDXOW None 'HVFULSWLRQ Specifies the UNIX user account to use when a Windows NT user attempts to log in and that Windows NT user would not otherwise be mapped. If this option is set blank, such accesses are denied. 7KH ZDIO PD[GLUVL]H 2SWLRQ 'HIDXOW 10240 'HVFULSWLRQ Sets the maximum size, in kilobytes, of a directory file. A directory file with a size of 10,240 kilobytes can hold about 300,000 files or subdirectories.
19-22 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
$33(1',; $ &RPPDQG 5HIHUHQFH This appendix provides the commands that you use to control a filer and are grouped in the following sections: User Commands File Formats Headers, Tasks, and Macros System Services and Daemons Command Reference A-1
A-2 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
8VHU &RPPDQGV This section contains user commands.
arp NAME arp - address resolution display and control SYNOPSIS arp hostname arp -a arp -d hostname arp -s hostname ether_address [ temp ] [ pub ] DESCRIPTION The arp command displays and modifies the tables that the address resolution protocol uses to translate between Internet and Ethernet addresses. With no flags, arp displays the current ARP entry for host_name. The host may be specified by name or by number, using Internet dot notation. OPTIONS -a Displays all of the current ARP entries.
cifs NAME cifs - summary of cifs commands SYNOPSIS Command Summary This is a list of the subcommands of the cifs command. cifs access Modifies share-level Access Control List (ACL) entries. cifs comment Displays/modifies the CIFS server description. cifs lookup Translates user/group names into SIDs, and vice versa. cifs restart Restarts CIFS if it has been shut down with cifs terminate. cifs setup Configures CIFS service cifs sessions Displays current configuration and current connections.
cifs access NAME cifs access - modify share-level access control SYNOPSIS cifs access share [ -g ] user rights cifs access -delete share [ -g ] user DESCRIPTION The cifs access command sets or modifies the share-level Access Control List (ACL) of a share. The share argument specifies the share whose ACL is to be modified. The user argument specifies the user or group of the ACL entry.
cifs access The following example grants full access to the UNIX group wheel on the share sysadmins. filer> cifs access sysadmins -g wheel Full Control The following example deletes the ACL entry for ENGINEERING\mary on the share releases.
cifs comment NAME cifs comment - display or change CIFS server description SYNOPSIS cifs comment [ newcomment ] DESCRIPTION The cifs comment command displays or changes the CIFS server description. CIFS clients see the CIFS server description when browsing servers on the network. If no command-line arguments are given, cifs comment displays the current CIFS server description. If you enter a string for the newcomment parameter, the current CIFS server description is changed to newcomment.
cifs lookup NAME cifs lookup - translate name into SID or vice versa SYNOPSIS cifs lookup { name | textualsid } DESCRIPTION The cifs lookup command translates a Windows NT user or group name into its corresponding textual Windows NT SID (Security ID), or a textual NT SID into its corresponding Windows NT user or group name.
cifs restart NAME cifs restart - restart CIFS service SYNOPSIS cifs restart DESCRIPTION cifs restart restarts CIFS service if it has been terminated by cifs terminate.
cifs sessions NAME cifs sessions - information on current CIFS activity SYNOPSIS cifs sessions [ -s ] [ user ] DESCRIPTION The cifs sessions command displays information about CIFS users who are connected to the filer. If you omit the user argument, the command displays a summary of information about the filer and lists the users who are connected to the filer. EXAMPLES cifs sessions Server Registers as HAWLEYR-TOKYO in group NT-DOMAIN Filer is using ja for DOS users WINS Server: 10.10.10.
cifs sessions WIN-95 (AGuest - nobody[guest]) *************** UNIX uid = 1208 user is a member of group nobody(65535) NT membership NT-DOMAIN\Domain Guests BUILTIN\Guests User is also a member of Everyone, Network Users *************** A-12 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
cifs setup NAME cifs setup - configure CIFS service SYNOPSIS cifs setup DESCRIPTION The cifs setup command performs the initial configuration of the filer for CIFS. You must have installed the CIFS license before you enter this command. You must run the cifs setup command from the console or from a telnet connection; you cant enter the command through rsh. FILES /etc/cifsconfig.cfg general configuration information /etc/cifssec.cfg NT domain machine account information /etc/filersid.
cifs shares NAME cifs shares - configure and display CIFS shares information SYNOPSIS cifs shares cifs shares sharename cifs shares -add sharename path [ -comment description ] [ -maxusers userlimit ] [ -forcegroup groupname ] cifs shares -change sharename { -comment description | -nocomment } { -maxusers userlimit | -nomaxusers } { -forcegroup groupname | -noforcegroup } cifs shares -delete sharename DESCRIPTION cifs shares displays one or more shares, edits a specified share, creates a share, or deletes a
cifs shares filer> cifs shares news Name ---NEWS Mount Point Description ----------- ----------/vol/vol0/news News DOMAIN\Guests / No Access everyone / Read Creating new shares To create a new share, use the -add option: cifs shares -add sharename path [ -comment description ] [ -maxusers userlimit ] [ -forcegroup groupname ] sharename name of the new share; clients use this name to access the share. path full path name of the directory on the filer that corresponds to the root of the new share.
cifs shares Changing the settings of existing shares To change the settings of an existing share, use the -change option: cifs shares -change sharename { -comment description | -nocomment } { -maxusers userlimit | -nomaxusers } { -forcegroup groupname | -noforcegroup } The settings of a share can be changed at any time, even if the share is in use. sharename is the name of the existing share that is to be changed. -comment description changes the description of the share.
cifs stat NAME cifs stat - print CIFS operating statistics SYNOPSIS cifs stat [ interval ] DESCRIPTION The cifs stat command has two forms. If you specify the interval, the command continues displaying a summary of CIFS activity until interrupted. The information is for the preceding interval seconds. (The header line is repeated in the display every 10 lines.) If you do not specify the interval, the command displays counts and percentages of all CIFS operations.
cifs terminate NAME cifs terminate - terminate CIFS service SYNOPSIS cifs terminate [ -t minutes ] [ workstation ] DESCRIPTION The cifs terminate command is used to terminate CIFS service. If the workstation operand is specified, then all CIFS sessions open by that workstation will be terminated. If no workstation operand is specified, then all CIFS sessions will be terminated and CIFS service will be shut down completely.
cifs testdc NAME cifs testdc - test the filers connection to Windows NT domain controllers SYNOPSIS cifs testdc DESCRIPTION The cifs testdc command tests the filers ability to connect with Windows NT domain controllers. The output of the cifs testdc command is useful in the diagnosis of CIFS-related network problems. EXAMPLE purple> cifs testdc Using Established configuration Current Mode of NBT is H Mode NetBIOS scope Registered names...
cifs testdc NT-DOMAIN NT-DOMAIN NT-DOMAIN <0> WINS <3> WINS <20> WINS Testing Primary Domain Controller found 2 addresses trying 192.168.2.14...192.168.2.14 is alive trying 192.168.2.85...192.168.2.85 is alive found PDC NT-DOMAIN-BDC Testing all Domain Controllers found 4 addresses trying 192.168.2.14...192.168.2.14 is alive trying 192.168.2.85...192.168.2.85 is alive trying 198.95.227.75...198.95.227.75 is alive trying 192.168.2.14...192.168.2.
date NAME date - display or set date and time SYNOPSIS date [ -u ] [ [[[[cc]yy]mm]dd]hhmm[.ss] ] DESCRIPTION date displays the current date and time when invoked without arguments. When invoked with an argument, date sets the current date and time; the argument for setting the date and time is interpreted as follows: cc First 2 digits of the year (e.g., 19 for 1999). yy Next 2 digits of year (e.g., 99 for 1999). mm Numeric month. A number from 01 to 12. dd Day, a number from 01 to 31.
date To set the current time to 21:00, and the current day to December 6th, 1999: date 9912062100 To set the current time to 21:00, and the current day to December 6th, 2002: date 200212062100 SEE ALSO rdate, timezone A-22 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
df NAME df - display free disk space SYNOPSIS df [ -i ] [ pathname ] DESCRIPTION df displays statistics about the amount of free disk space in one or all volumes on the filer. All sizes are reported in 1024-byte blocks. The pathname parameter is the path name to a volume. If it is specified, df reports only on the corresponding volume; otherwise, it reports on every on-line volume. For each volume, df displays statistics about snapshots on a separate line from statistics about the active file system.
df SEE ALSO maxfiles, rc, snap A-24 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
disk NAME disk - RAID disk configuration control commands SYNOPSIS disk fail disk_name disk remove disk_name disk scrub start disk scrub stop disk swap disk unswap DESCRIPTION The disk fail command forces a file system disk to fail; the disk remove command unloads a spare disk so that you can physically remove the disk from the filer. The disk scrub command causes the filer to scan disks for media errors.
disk disk being removed is available, the contents of the disk being removed will be reconstructed onto that spare disk. The disk being removed is marked as broken, so that if it remains in the disk shelf, it will not be used by the filer as a spare disk, and if it is moved to another filer, it will not be used by that filer as a spare disk. disk remove disk_name removes the specified spare disk from the RAID configuration, spinning the disk down when removal is complete.
disk_fw_update NAME disk_fw_update - update disk firmware SYNOPSIS disk_fw_update [ disk_name ] DESCRIPTION Use the disk_fw_update command to update out-of-date firmware on all disks or a specified disk on a filer. Each filer is shipped with a /etc/disk_fw directory that contains the latest firmware revisions. This command makes disks inaccessible for up to 2 minutes, so network sessions using the filer should be closed down before running it.
download NAME download - install new version of Data ONTAP 5.3 SYNOPSIS download DESCRIPTION download copies Data ONTAP 5.3 executable files from the /etc/boot directory to the filers boot block on the disks from which the filer boots. To install a new version of Data ONTAP 5.3, extract the files for the new release onto the filer from either a CIFS or an NFS client that has write access to the filers root directory.
dump NAME dump - file system backup SYNOPSIS dump [ options [ arguments ] ] subtree DESCRIPTION The dump command examines files in a subtree and writes to tape the files that need to be backed up. The Data ONTAP 5.3 dump command differs slightly from the standard UNIX dump, but the output format is compatible with SunOS 4.x/ Solaris 1.x and SunOS 5.x/Solaris 2.x dump. Data ONTAP 5.
dump Another advantage of running the dump command through rsh is that you can control backups from UNIX shell scripts or crontab entries. OPTIONS 0-9 Dump levels. A level 0, full backup, guarantees the entire file system is copied. A level number above 0, incremental backup, tells dump to copy all files new or modified since the last dump of a lower level. The default level is 0. f files Write the backup to the specified files.
dump /etc/dumpdates may be edited to change any of the fields, if necessary. See dumpdates for details. b factor Set the tape blocking factor in k-bytes. The default is 63 KB. If the density is set to greater than 6250 BPI, then the default blocking factor is 32 KB. NOTE: Some systems support blocking factors greater than 63 KB by breaking requests into 63-KB chunks or smaller using variable sized records; other systems do not support blocking factors greater than 63 KB at all.
dump To make a level 0 dump of /home on a 2 GB tape to a remote tape device, use: filer> dump 0ufbB adminhost:/dev/rst0 63 2097151 /home To make a level 0 dump of /home on a 2 GB tape to a local tape drive (no rewind device, unit zero, highest density) use: filer> dump 0ufbB nrst0a 63 2097151 /home To make a level 0 dump of the entire file system to a local tape drive (no rewind device, unit zero, highest density), with each tape file in the dump being less than 2 GB in size, without operator intervention,
dump performed on the filer. It can also be performed via a restore done on an NFS client machine; if such a restore is being done, the client system should be checked to ensure it supports SunOS-compatible dump/restore format. Client Dump and Restore Capability If a client is to be used for performing filer dump and/or restore, it is important to check what the maximum dump and restore capabilities of your client system are before setting up a dump schedule.
dump load another tape and use the norewind tape device to dump etc, finance, home and users subtrees to that tape volume. CIFS Data The Data ONTAP 5.3 dump command dumps the CIFS attributes and 8.3 name data for each file that is backed up. This data will not be backed up by a dump run on an NFS client machine. This data will not be restored by a restore run on an NFS client machine. This data will only be restored if a local restore is done of a backup created by the Data ONTAP 5.3 dump command.
exportfs NAME exportfs - export and unexport files or directories SYNOPSIS exportfs [ -aiuv ] [ -o options ] [ pathname ] DESCRIPTION If no pathname is specified, exportfs lists all currently exported directories and files. If pathname is specified, exportfs makes the specified file or directory available or unavailable for mounting by NFS clients. OPTIONS -a Takes the list of path names to be exported or unexported from the /etc/ exports file.
exportfs root=hostname[:hostname]... Give root access only to the specified hosts. By default, no hosts are granted root access. Netgroup names are not allowed in the list. When you export a file or directory using the ro, rw, or root option, you can specify that the file or directory be exported to a subnet instead of individual hosts. You cannot export to a subnet when using the access option.
fctest NAME fctest - test Fibre Channel environment SYNOPSIS fctest [ adapter ] DESCRIPTION Use the fctest command to test Fibre Channel adapters and disks on an appliance. This command provides a report of the integrity of your Fibre Channel environment. It is only available in maintenance mode, and takes about 5 minutes to complete. If the adapter argument is missing, all Fibre Channel adapters and disks in the system are tested, otherwise only the specified adapter, and disks attached to it, are tested.
fctest Crc = number of CRC errors observed in the Fibre Channel frames. Sync = number of Fibre Channel synchronization errors. F = the total number of inbound and outbound frames seen by the adapter.
filestats NAME filestats - collect file usage statistics SYNOPSIS filestats [ ages ages] [ timetype {a,m,c,cr}] [ sizes sizes] [ snapshot snapshot_name] [ style style] [ volume volume_name] DESCRIPTION The filestats utility provides a summary of file usage within a volume. It must be used on a snapshot, and the only required argument is the snapshot name. The volume name defaults to vol0 if not specified. If the volume you are examining is named otherwise, specify the name explicitly.
filestats atime Time of last read or write (in seconds). mtime Time of last write (in seconds). ctime Time of last size/status change (in seconds). crtime Time file was created (in seconds). atimeage Age of last read or write (Now - atime). mtimeage Age of last write (Now - mtime). ctimeage Age of last size/status change (Now ctime). crtimeage Age of file creation (Now - crtime). timetype timetype This lets you specify the type of time that will be used in the age comparison.
filestats 3. Produce file usage breakdowns for inodes whose size is less than 100000 bytes and whose access time is less than a day old: filestats volume vol0 snapshot hourly.1 expr {size}<100000&&{atimeage}<86400) 4. Produce a breakdown of the total number of files and their total size. You can control the set of ages and sizes that get used for this breakdown, with the ages and sizes arguments. The output also contains a breakdown of file usage by user-id and group-id. filestats snapshot hourly.
halt NAME halt - stop the filer SYNOPSIS halt [ -d ] [ -t mins ] DESCRIPTION halt flushes all cached data to disk and drops into the monitor. NFS clients can maintain use of a file over a halt or reboot (although experiencing a failure to respond during that time), but CIFS clients cannot do so safely. Therefore, if the filer is running CIFS, the halt command invokes cifs terminate, which requires the -t option.
help NAME help - print summary of commands and help strings SYNOPSIS help [ command ... ] ? [ command ... ] DESCRIPTION help prints a summary for each command in its argument list. With no arguments, help prints a list of all available Data ONTAP 5.3 commands. Full UNIX-style man pages for all filer commands and files are available in the /etc/man directory.
hostname NAME hostname - set or display Dell filer name SYNOPSIS hostname [ name ] DESCRIPTION hostname prints the name of the current host. The hostname can be set by supplying an argument. This is usually done in the initialization script, /etc/rc, which is run at boot time. name must exist in the /etc/hosts data base.
httpstat NAME httpstat - display HTTP statistics SYNOPSIS httpstat [ -tz ] [ interval ] DESCRIPTION httpstat displays statistical information about HTTP (HyperText Transfer Protocol) for the filer. It can also be used to reinitialize this information. If no arguments are given, httpstat displays statistical information since last reboot, or last zeroed with the -z option. If the -t option is specified, statistical information since the last reboot is given.
ifconfig NAME ifconfig - configure network interface parameters SYNOPSIS ifconfig interface [ [ alias | -alias ] address ] [ netmask mask ] [ broadcast address ] [ mediatype type ] [ mtusize size ] [ up | down ] [ trusted | untrusted ] [ wins | -wins ] ifconfig -a DESCRIPTION ifconfig assigns an address to a network interface and configures network interface parameters.
ifconfig duplex 10Base-T RJ-45 twistedpair), or 100tx (100Base-T RJ-45 twistedpair), or 100tx-fd (Full duplex 100Base-T RJ-45 twisted-pair), or auto (Auto RJ-45 twisted-pair). The default media type is set to tp or to auto where applicable. On a 10/100 Mbps auto-negotiable interface, the system will auto-negotiate a 10 Mbps half or full duplex or 100 Mbps half or full duplex link and set the network interface accordingly when it is configured up.
ifconfig untrusted Specifies that the network to which the network interface is attached is not trusted relative to firewall-style security. wins Specifies that the network interface is to be registered with Windows Internet Name Services (default). Such registration is only performed when CIFS is running and at least one WINS server has been configured. -wins Specifies that the network interface is not to be registered with Windows Internet Name Services.
ifstat NAME ifstat - display device-level statistics for network interfaces SYNOPSIS ifstat [ -z ] -a | interface_name DESCRIPTION The ifstat command displays statistics about packets received and sent on a specified network interface or on all network interfaces. The statistics are cumulative since the filer was booted. The -z argument clears the statistics. The -a argument displays statistics for all network interfaces including the virtual host and the loopback address.
license NAME license - license Data ONTAP 5.3 services SYNOPSIS license [ service=code ] ... DESCRIPTION The license command enables you to enter license codes for specific Data ONTAP 5.3 services. The license codes are provided by Dell. With no arguments, the license command prints the current list of licensed services and their codes. It also shows the services that are not licensed for your filer.
logout NAME logout - use control-D to logout DESCRIPTION The filer doesnt have a logout command. (Since the telnet connection and the console are multiplexed into the same session, there would be no way for a logout command to tell which connection to drop.) To log out, type control-D. Over telnet, typing control-D disconnects the session. On the console, typing control-D returns the console to the password prompt. If no password is set, control-D has no effect.
maxfiles NAME maxfiles - increase the number of files the volume can hold SYNOPSIS maxfiles [ vol_name [ max ] ] DESCRIPTION maxfiles increases the number of files that a volume can hold to max. Once increased, the value of max can never be lowered, so the new value must be larger than the current value. If no argument is specified, maxfiles displays the current value of max for all volumes in the system. If just the vol_name argument is given, the current value of max for the specified volume is displayed.
mt NAME mt - magnetic tape positioning and control SYNOPSIS mt [ -f | -t tapedevice ] command [ count ] [ command [ count ] ... ] DESCRIPTION mt is used to position or control the specified magnetic tape drive supporting the commands listed below. Commands that support a count field allow multiple operations to be performed (the rewind, status and offline commands do not support a count field). mt will output failure messages if the specified tape drive cannot be opened or if the operation fails.
mt EXAMPLES The following example uses mt to display status information for the no-rewind tape device, unit zero, highest format (density): filer> mt -f nrst0a status Tape drive: Exabyte 8505 8mm Status: ready, write enabled Format: EXB-8500C (w/compression) fileno = 0 blockno = 0 resid = 0 To skip over a previously created dump file to append a dump onto a no-rewind tape device, use the fsf (forward space file) command: filer> mt -f nrst0a fsf 1 SEE ALSO sysconfig, tape A-54 Dell PowerVault 720N, 740N, an
netstat NAME netstat - show network status SYNOPSIS netstat [ -an ] netstat -mnrs netstat -i | -I interface [ -dn ] netstat -w interval [ -i | -I interface ] [ -dn ] netstat [ -p protocol ] DESCRIPTION The netstat command symbolically displays the contents of various networkrelated data structures. There are a number of output formats, depending on the options for the information presented. The first form of the command displays a list of active sockets for each protocol.
netstat -n Show network addresses as numbers. netstat normally interprets addresses and attempts to display them symbolically. This option may be used with any of the display formats that display network addresses. -p protocol Show statistics about protocol , which is one of tcp, udp, ip, or icmp. A null response typically means that there are no interesting numbers to report. The program will complain if protocol is unknown or if there is no statistics routine for it. -s Show per-protocol statistics.
netstat H The route is to a host (otherwise, its to a net). L The route includes valid protocol to link address translation. M The route was modified dynamically by a redirect. R The route has timed out. S The route was manually added with a route command (see route). U The route is usable (up). Direct routes are created for each interface attached to the local host; the gateway field for such entries shows the address of the outgoing interface.
nfs NAME nfs - turn NFS service off and on SYNOPSIS nfs [ on | off ] DESCRIPTION nfs turns NFS service off or on. With no arguments, nfs shows the current state of NFS service. nfs is normally used in the initialization command script, /etc/rc.
nfsstat NAME nfsstat - display NFS statistics SYNOPSIS nfsstat [ interval ] nfsstat [ -c ] [ -t ] -h [ ip_address | host_name ] nfsstat -l [ -t ] nfsstat -z DESCRIPTION nfsstat displays statistical information about NFS (Network File System) and RPC (Remote Procedure Call) for the filer. It can also be used to reinitialize this information. If no arguments are given, nfsstat displays statistical information since last zeroed with the -z option (or since reboot if statistics have not been zeroed).
nfsstat DISPLAYS The server RPC display includes the following fields, with separate values for TCP and UDP: calls The total number of RPC calls received. badcalls The total number of calls rejected by the RPC layer (the sum of badlen and xdrcall as defined below). nullrecv The number of times an RPC call was not available when it was thought to be received. badlen The number of RPC calls with a length shorter than a minimumsized RPC call.
options NAME options - display or set filer options SYNOPSIS options [ option value ] ... DESCRIPTION options is used to change configurable filer software options. If no options are specified, then options prints the current value of all available options. The default value for most options is off, which means that the option is not set.
options the users lower-cased Windows login name, they will see a share of that name (truncated to 12 characters) that is their home directory. Only the user can access the home directory using this share. All other users cannot see the share name since they are logged in under a different user. cifs.idle_timeout Specifies the amount of idle time in seconds before the filer disconnects a session. An idle session is a session in which a user does not have any files opened on the filer.
options If you do not plan to use share-level ACLs to control access to UNIX security style files (e.g. in a UNIX qtree), you might wish to change this setting to on. cifs.save_case By default, the filer preserves the case of CIFS names, even though a case insensitive hash and search is done.
options symbolic links and will repeatedly loop on them. Users should use caution when changing this option. cifs.symlinks.enable When cifs.symlinks.enable is on (the default), if the object being accessed by a CIFS client is a symbolic link (whether absolute or relative), the filer follows the link with the proviso that the ultimate target turns out to reside within the originating share (thus ensuring that the client has access permission to the target). cifs.trace_login When cifs.
options name /etc/http/man/name can be accessed with the URL http:// filer/na_admin/man/name. httpd.log.max_file_size Specifies the maximum size that the HTTP log file /etc/log/ httpd.log can grow to. The default is 2147483647, which is the largest file size that many clients support. httpd.rootdir Specifies the complete pathname of the root directory that contains files and subdirectories for HTTP access. httpd.
options nfs.v3.enable When enabled, the NFS server supports NFS version 3. By default, the feature is enabled; it can be disabled if there is a problem with some client when using NFS version 3, and that client cannot be configured to use NFS version 2. nfs.webnfs.enable When enabled, the NFS server supports WebNFS lookups. By default, WebNFS lookups are disabled. nfs.webnfs.rootdir Specifies the WebNFS rootdir.
options telnet.enable Enables the Telnet server on the filer. telnet.hosts Specifies up to 5 clients that will be allowed telnet access to the server. The host names should be entered as a commaseparated list with no spaces in between. Enter a * to allow access to all clients; this is the default. Enter a - to disable telnet access to the server. timed.enable Determines whether a time daemon (timed) runs on the filer. If timed.enable is on, the filer synchronizes its time with a time server. timed.
options wafl.convert_ucode Setting this option to ON forces conversion of all directories to Unicode format when accessed from both NFS and CIFS. By default (OFF), access from CIFS causes conversion of pre-4.0 and 4.0 format directories; access from NFS causes conversion of 4.0 format directories. vol.copy.throttle Specifies the default speed of all volume copy operations. The speed can be a number in the range from 1 to 10, 10 being the highest speed and the default. wafl.
options wafl.wcc_minutes_valid Specifies the number of minutes a WAFL credential cache entry is valid. The value can range from 1 through 20160. The default is 20. Multiple options can be set at once in an options command. For example: options nfs.tcp.enable on nfs.v2.df_2gb_lim on raid.timeout 48 sets nfs.tcp.enable to on, sets nfs.v2.df_2gb_lim to on, and sets raid.timeout to 48.
passwd NAME passwd - modify the system administrative users password SYNOPSIS passwd DESCRIPTION passwd changes the filers administrative users password. First it prompts you for the login name (if any non-root users are configured). Then it prompts you for the current password. If you type the current password correctly, the filer requests a new password. The passwd command imposes no minimum length or special character requirements for root .
ping NAME ping - send ICMP ECHO_REQUEST packets to network hosts SYNOPSIS ping [ -s ] [ -Rrv ] host [ packetsize [ count ] ] DESCRIPTION ping uses the ICMP protocols mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from the specified host or gateway. ECHO_REQUEST datagrams have an IP and ICMP header, followed by a struct timeval and then an arbitrary number of bytes used to fill out the packet. If host responds, ping prints host is alive.
qtree NAME qtree - create and manage qtrees SYNOPSIS qtree qtree create [ name ] qtree security [ name [ UNIX | ntfs | mixed ] ] qtree oplocks [ name [ enable | disable ] ] DESCRIPTION The qtree command creates qtrees and specifies attributes for qtrees. A qtree can be an entire volume or a subset of a volume. It is similar to a partition in that you cannot move files into or out of a qtree.
qtree To delete a qtree, remove it from a client as you would any directory. You can create up to 254 qtrees on a filer. The qtree security command changes the security style for files and directories. Security style means the method the filer uses to determine whether a user has access to a file. If name is the path name to a qtree, the security style applies to the files and directories in the specified qtree. The path name to a qtree does not need to end with a slash.
qtree If the cifs.oplocks.enable option is off, oplocks are not sent even if you enable the oplocks on a per-quota-tree basis with the qtree oplocks command. The cifs.oplocks.enable option is enabled by default. If you do not specify enable or disable in the qtree oplocks command, the oplock attribute for name is displayed. If you omit name, the oplock attributes for all quota trees on the filer are displayed.
quota NAME quota - control filer disk quotas SYNOPSIS quota [ on | off | resize ] [ volume ] quota report [ path ] quota qtree [ name ] DESCRIPTION A quota limits the amount of disk space and the number of files that a particular user or group can consume. A quota can also restrict the total space and files used in a qtree, or the usage of users and groups within a qtree. A request that would cause a user or group to exceed an applicable quota fails with a disk quota exceeded error.
quota an entry in /etc/quotas to increase a users quota, quota resize will cause the change to take effect. The volume name may be omitted if the system has only one volume. quota resize can be used only when quotas are already on. Because it does not rescan the file system to compute usage, quota resize is faster than turning quotas off and then on again. quota resize will apply all updated entries in /etc/quotas; however, it will generally ignore newly added entries.
rdate NAME rdate - set system date from a remote host SYNOPSIS rdate hostname DESCRIPTION rdate sends a request to the time server on hostname and sets the local date and time to the value returned by the server. rdate will time out if the server doesnt respond in 10 seconds. rdate can be added to /etc/rc to automatically synchronize the system time with the time server on each reboot.
reboot NAME reboot - stop and then restart the filer SYNOPSIS reboot [ -d ] [ -t minutes ] DESCRIPTION reboot halts the filer and then restarts it. reboot is commonly used to allow modified configuration files to take effect or to run a newly installed version of Data ONTAP 5.3. NFS clients can maintain use of a file over a halt or reboot (although experiencing a failure to respond during that time), but CIFS clients cannot do so safely.
restore NAME restore - restore files or file systems from backups made with the filers dump command SYNOPSIS restore key args... DESCRIPTION The restore restores files from backup tapes created with the dump (see dump) command. A full backup of a file system may be restored and subsequent incremental backups layered on top of it. The actions of restore are controlled by the given key, which is a string of characters containing at most one function letter and possibly one or more function modifiers.
restore b The next argument to restore is used as the block size of the media (in kilobytes). If the b option is not specified, restore tries to determine the media block size dynamically. f The next argument to restore is used as the name of the archive instead of the standard input. If the name of the file is -, restore reads from standard input. s The next argument to restore is a number which selects the file on a multifile dump tape. File numbering starts at 1.
restore Tape read error while restoring filename Tape read error while skipping over inode inumber Tape read error while trying to resynchronize A tape (or other media) read error has occurred. If a file name is specified, then its contents are probably partially wrong. If an inode is being skipped or the tape is trying to resynchronize, then no extracted files have been corrupted, though files may not be found on the tape.
route NAME route - manually manipulate the routing table SYNOPSIS route [ -fn ] add|delete [ host|net ] destination gateway [ metric ] DESCRIPTION route allows the system administrator to manually manipulate the network routing table for the specific host or network specified by destination. The gateway argument is the nexthop gateway to which packets should be addressed for the corresponding destination. The metric argument indicates the number of hops to the destination.
route DIAGNOSTICS add [ host|net] destination:gateway The specified route is being added to the table. delete [ host|net] destination:gateway The specified route is being deleted. destination gateway done When the -f flag is specified, each routing table entry deleted is indicated with a message of this form. network unreachable An attempt to add a route failed because the gateway listed was not on a directly-connected network. The next-hop gateway must be given.
routed NAME routed - network routing daemon SYNOPSIS routed on routed off routed [ -n ] status DESCRIPTION routed (pronounced route-D) uses a variant of the Xerox NS Routing Information Protocol (RIP) to manage selection of the default gateway used for IP network routing.
routed In addition, when routed is running, it deletes dynamic routes, created by ICMP redirects, every 3 minutes. USAGE routed on The route daemon may be turned on at any time with the routed on command. This causes routed to read the /etc/ dgateways file, and turn on RIP snooping, dynamic route timeouts, and default gateway selection. If routed is already running, this option causes it to reread the /etc/dgateways file, and reinitialize. By default, routed is invoked at boot time in /etc/rc.
routed FILES /etc/rc for default initialization /etc/dgateways for the list of default gateways. SEE ALSO netstat, route, setup, dgateways, rc DIAGNOSTICS routed: unable to allocate free entry - too many valid entries were found in the /etc/dgateways file. Only the first 128 are used. routed: duplicate gateway entry not allowed - a duplicate gateway name or address was found in the /etc/dgateways file. Only the first one found is used.
savecore NAME savecore - save a core dump SYNOPSIS savecore DESCRIPTION savecore is meant to be called near the end of the initialization file /etc/rc. Its function is to save the core dump of the system (assuming one was made) and to write the panic string to /etc/messages. savecore saves the core dump in two files /etc/crash/core.n, and /etc/crash/core.n-small, where n is determined by the /etc/crash/bounds file.
setup NAME setup - update filer configuration SYNOPSIS setup DESCRIPTION setup queries the user for the filer configuration parameters such as hostname, IP address, and timezone. It installs new versions of /etc/rc, /etc/hosts, /etc/ exports, /etc/resolv.conf, /etc/hosts.equiv, and /etc/dgateways to reflect the new configuration. When setup completes, the configuration files have been updated, but their new contents do not take effect until the filer is rebooted (see reboot).
setup SEE ALSO ifconfig, reboot, dgateways, exports, hosts, hosts.equiv, resolv.
shelfchk NAME shelfchk - verify the communication of environmental information between disk shelves and the filer SYNOPSIS shelfchk DESCRIPTION The shelfchk command verifies that the disk shelves and the filer can exchange environmental information. If the environmental information is being exchanged, you can hotswap disks in the disk shelves. The shelfchk command is interactive. It requires that you type in your responses after observing the LEDs on the disks.
shelfchk In the following example, the shelfchk command finds an error: filer> shelfchk Only shelves attached to ha 9a should have all LEDs ON. Are these LEDs all ON now? n *** Your system may not be configured properly. Check cable connections.
snap NAME snap - manage snapshots SYNOPSIS snap list [ vol_name ] snap create | delete vol_name name snap rename vol_name from to snap sched [ vol_name [ weeks [ days [ hours[@list] ] ] ] ] snap reserve [ vol_name [ percent ] ] DESCRIPTION The snap family of commands provides a means to create and manage snapshots in each volume. A snapshot is a read-only copy of the entire file system as of the time the snapshot was created.
snap using the sched command, then on the hour, hourly.7 would be deleted, hourly.0 would be renamed to hourly.1, and so on. USAGE snap list [ vol_name ] displays a single line of information for each snapshot. Along with the snapshots name, it shows when the snapshot was created and the size of the snapshot. If you include the vol_name argument, list displays snapshot information only for the specified volume. With no arguments, it displays snapshot information for all volumes in the system.
snmp NAME snmp - set and query SNMP agent variables SYNOPSIS snmp snmp authtrap [ 0 | 1 ] snmp community [ add | delete ro | rw ] snmp contact [ contact ] snmp init [ 1 ] snmp location [ location ] snmp traphost [ add | delete hostname | ipaddress ] snmp traps [ on | off | reset | delete ] snmp traps trapname[.parameter value | on | off | reset delete] DESCRIPTION The snmp command is used to set and query configuration variables for the SNMP agent daemon (see snmpd).
snmp community [ add|delete ro|rw community ] Add or delete communities with the specified access control type. Specify ro for a read-only community and rw for a read-write community. For example, to add the read-only community private use the following command: snmp community add ro private Currently the SNMP SetRequest PDU is not supported, so all readwrite communities will default to read-only. The default community for the filer SNMP agent is public and its access mode is ro.
snmp trapname[.parameter value | on | off | reset | delete] traps affects a specified trap. It assigns a parameter and value, or turns it on or off, or resets or deletes it. You can trap on any MIB variable, but to do so you need a trap data parser function at the traphost application or a management script to interpret the TRAP name, OID value fields, and so on. EXAMPLES A typical set of snmp commands in the /etc/rc file will look like the following: snmp contact Network Manager snmp location Bldg 2.
sysconfig NAME sysconfig - display filer configuration information SYNOPSIS sysconfig [ -d | -m | -r | -t | [ -v ] [ slot ] ] DESCRIPTION sysconfig displays the configuration information about the filer. Without any arguments, the output includes the Data ONTAP 5.3 version number and a separate line for each I/O device on the filer.
sysstat NAME sysstat - report filer performance statistics SYNOPSIS sysstat [ interval ] DESCRIPTION sysstat reports filer performance statistics such as the current CPU utilization, the amount of network I/O, the amount of disk I/O, and the amount of tape I/O. By default, sysstat prints a new line of statistics every 15 seconds. The interval argument overrides the default causing sysstat to report once every interval seconds. Use control-C to stop sysstat.
sysstat NFS the number of NFS operations per second during that time; CIFS the number of CIFS operations per second during that time; HTTP the number of HTTP operations per second during that time; Net kB/s the number of kilobytes per second of network traffic into and out of the server; Disk kB/s the kilobytes per second of disk traffic being read and written; Tape kB/s the number of kilobytes per second of tape traffic being read and written; Cache age the age in minutes of the oldest read-on
timezone NAME timezone - set the local timezone SYNOPSIS timezone [ name ] DESCRIPTION timezone sets the system timezone and saves the setting for use on subsequent boots. The argument name specifies the timezone to use. See the system documentation for a complete list of time zone names. If no argument is supplied, the current time zone name is printed. Each timezone is described by a file that is kept in the /etc/zoneinfo directory on the filer.
uptime NAME uptime - show how long system has been up SYNOPSIS uptime DESCRIPTION uptime prints the current time, the length of time the system has been up, and the total number of NFS operations the system has performed since it was last booted. The filer runs uptime automatically once an hour and automatically logs its output to /etc/messages.
useradmin NAME useradmin - add, delete or list administrative users SYNOPSIS useradmin useradd [-c comments] login_name useradmin userdel login_name useradmin userlist [user_name_list] DESCRIPTION The useradmin command can be used to add, delete, or list administrative users. The useradd option is used to add administrative users. The user name can be up to 32 characters long.
version NAME version - display Data ONTAP 5.3 version SYNOPSIS version DESCRIPTION version displays the version of Data ONTAP 5.3 running on the server, and the date when the version was created.
vif NAME vif - create and destroy virtual interfaces SYNOPSIS vif create [ vif_name ] interface_name ... vif destroy vif_name vif stat vif_name [ interval ] DESCRIPTION The vif command creates and eliminates virtual interfaces. It also displays statistics for a specified virtual interface. The vif create command creates a virtual interface. The name of the virtual interface to be created is specified as vifn, where n is a number. Make sure that the specified virtual interface name is not already in use.
vif The following example displays statistics about virtual interface 1: filer> vif stat vif1 Virtual interface (trunk) vif1 e5d In e5c Out In e5b Out In e5a Out In Out 8637076 47801540 158 159 7023083 38300325 8477195 47223431 1617 9588 0 0 634 3708 919 5400 1009 5928 0 0 925 5407 1246 7380 1269 7506 0 0 862 5040 1302 7710 1293 7632 0 0 761 4416 964 5676 920 5388 0 0 721 4188 981 5784 1098 6462 0 0 988 5772 1003 5898 2212 13176 0 0 769 4500
vol NAME vol - commands for managing volumes, displaying volume status, and copying volumes SYNOPSIS vol command argument ... DESCRIPTION The vol commands manage a volume, apply options to a volume, or display the status of one or more volumes. Also, some vol commands copy volumes on the same filer or between two filers. You can use the volume copy feature only if you have purchased the volcopy license and entered the license code for a filer that is involved in a vol copy command.
vol nl pt sv (Dutch) (Portugese) (Swedish) To use UTF-8 as the NFS character set append .UTF-8 vol add volname ndisks[@size] | -d diskname... adds disks to the volume with the name volname. Specify the disks in the same way as for the vol create command. When adding disks to a volume, the filer fills up one RAID group with disks before starting another RAID group. Suppose a volume currently has one RAID group of 12 disks and its RAID group size is 14.
vol the filer is rebooted. If you change your mind after entering this command, you can enter vol online volname before the reboot. vol options volname optname optval sets the option named optname of the volume named vol_name to the value optval. The command remains effective after the filer is rebooted, so there is no need to add vol options commands to the /etc/rc file. Some options have values that are numbers.
vol storing database files. If the filer finds any problems, database instances hang or shut down, and the filer sends error messages to the console to alert you to check the state of the database. snapmirrored off If SnapMirror is enabled, the filer automatically sets this option to on. Set this option to off if you no longer want to use SnapMirror to update the mirror. After you set this option to off, the mirror becomes a regular writable volume.
vol the filers /etc/hosts file. Otherwise, the filer cannot send packets to itself through the loopback address when trying to copy data. The usable disk space of the destination volume must be greater than or equal to the usable disk space of the source volume. Use the df pathname command to see the amount of usable disk space of a particular volume.
vol vol snapmirror status displays whether SnapMirror is enabled. If so, the command displays whether the filer is copying data between the source volume and the mirror, and the percentage of data that has been copied. EXAMPLES vol create vol1 -r 10 20 creates a volume named vol1 with 20 disks. The RAID groups in this volume can contain up to 10 disks, so this volume has two RAID groups. The filer adds the current spare disks to the new volume, starting with the smallest disk.
vol vol copy status displays the status of all the volume copy operations. vol copy abort 1 terminates volume copy operation 1. vol copy throttle 1 10 changes volume copy operation 1 to one-tenth of its full speed.
ypwhich NAME ypwhich - display the NIS server if NIS is enabled SYNOPSIS ypwhich DESCRIPTION ypwhich prints the name of the current NIS server if NIS is enabled. If there is no entry for the server itself in the hosts database, then it prints the IP address of the server. The NIS server is dynamically chosen by the filer.
)LOH )RUPDWV This section contains file formats.
tape NAME tape - information on filer tape interface DESCRIPTION The filer supports up to four local tape drives (tape drives connected directly to the system). The tape drive interface follows a UNIX-like device name allowing use of a rewind, norewind or unload/reload device. The format of a filer tape device name is crstud where: c use n to specify the norewind device, use u to specify the unload/reload device, or no flag to specify the rewind device.
tape nrst0m - no rewind device, format is: EXB-8200C (w/compression) urst0m - unload/reload device, format is: EXB-8200C (w/compression) rst0h - rewind device, format is: EXB-8500 5.0GB nrst0h - no rewind device, format is: EXB-8500 5.0GB urst0h - unload/reload device, format is: EXB-8500 5.
Command ReferenceA-117
+HDGHUV 7DVNV DQG 0DFURV This section contains headers, tasks, and macros.
boot NAME boot - directory of Data ONTAP 5.3 executables SYNOPSIS /etc/boot DESCRIPTION The boot directory contains copies of the executable files required to boot the filer. The download command (see download) copies these files from /etc/ boot into the filers boot block, from which the system boots. FILES /etc/boot directory of Data ONTAP 5.3 executables /etc/boot/netapp-alpha symbolic link to current version of Data ONTAP 5.
crash NAME crash - directory of system core files SYNOPSIS /etc/crash DESCRIPTION If a filer crashes, it creates a core file in the crash directory. The core files are very useful for finding and fixing bugs in Data ONTAP 5.3, so notify Dell technical support of any core files on your filer. See savecore for more details about how core files are saved. FILES /etc/crash/core.* saved core files /etc/crash/core.*-small compact core file.
dgateways NAME dgateways - default gateways list SYNOPSIS /etc/dgateways DESCRIPTION The /etc/dgateways file is used by the routed command to construct a set of potential default gateways. The file is comprised of a series of lines, each in the following format: gateway metric gateway is the name or address of a gateway to be used as a potential default gateway. metric is a metric indicating the preference weighting of the gateway. 1 is the value to use for highest preference, 15 for the least.
dumpdates NAME dumpdates - data base of file system dump times SYNOPSIS /etc/dumpdates DESCRIPTION The dump command (see dump) uses /etc/dumpdates to keep track of which subtrees have been dumped and when. Each line in dumpdates contains the subtree dumped, the dump level, and the creation date of the snapshot used by dump. There is only one entry per subtree at a given dump level. dumpdates may be edited to change any of the fields, if necessary.
exports NAME exports - directories and files exported to NFS clients SYNOPSIS /etc/exports DESCRIPTION The /etc/exports file contains a list of directories and files that are exported by the filer. Changes to this file do not take effect until the filer executes the exportfs command or the filer is rebooted. When the filer is rebooted, it executes the exportfs -a command from the /etc/rc script to export all files and directories listed in the /etc/exports file.
exports In an export entry, you can specify that a file or directory be exported to a subnet instead of individual hosts. The export entry for exporting to subnets can use the ro, rw, or root option; you cannot specify a subnet in the list for the access option. Instead of specifying a host name or netgroup name in the entry, specify the subnet in one of the following formats: dotted_IP/num_bits The dotted_IP field is either an IP address or a subnet number.
group NAME group - group file SYNOPSIS /etc/group DESCRIPTION The /etc/group database contains information for each group in the following form: groupname:password:gid:user-list The following list describes the required fields: groupname The name of the group. password The groups password, in an encrypted form. This field may be empty. gid An interger representing the group; each group is assigned a unique integer. user-list The user list is a comma-separated list of users allowed in the group.
hosts NAME hosts - host name data base SYNOPSIS /etc/hosts DESCRIPTION The hosts file contains information regarding the known hosts on the network. For each host a single line should be present with the following information: Internet-address official-host-name aliases Items are separated by any number of blanks and/or tab characters. A # indicates the beginning of a comment; characters up to the end of the line are not interpreted by routines which search the file.
hosts.equiv NAME hosts.equiv - list of hosts and users with rsh permission SYNOPSIS /etc/hosts.equiv DESCRIPTION The hosts.equiv file contains a list of hosts on which you can enter a filer command through the remote shell protocol (rsh). Hosts specified in this file are considered the trusted hosts of the filer. Each line in hosts.equiv has the following format: hostname [ username ] If the host on which you enter the filer command is a UNIX host, the user name is optional.
httpd.access NAME httpd.access - authentication controls for HTTP access SYNOPSIS /etc/httpd.access DESCRIPTION The HTTP daemon can apply authentication controls to individual users or groups on a per directory basis. The file /etc/httpd.
httpd.access The following example restricts access to the directory tree /home/htdocs/ private/storage to the group group1, which consists of the users whose IDs are user1, user2, user3, and user4. The authentication dialog is titled Dell. AuthName Dell require group group1 In this example, group1 is defined by the following entry in /etc/httpd.group: group1: user1 user2 user3 user4 SEE ALSO httpd.passwd, httpd.
httpd.group NAME httpd.group - names of HTTP access groups and their members SYNOPSIS /etc/httpd.group DESCRIPTION The file declares the names of groups, and the user IDs of the members of each group, for use by the HTTP daemon in executing the access controls declared in /etc/httpd.access. SYNTAX group_id1:user_id1 [ user_id2 ... ] SEE ALSO httpd.
httpd.hostprefixes NAME httpd.hostprefixes - configuration of HTTP root directories for virtual hosts SYNOPSIS /etc/httpd.hostprefixes DESCRIPTION The httpd.hostprefixes file maps virtual hosts used in HTTP to corresponding root directories. The same configuration file is used for both IP virtual hosts (discriminated by the IP address used for connecting to the server) and HTTP virtual hosts (discriminated by the Host: header used in HTTP requests).
httpd.log NAME httpd.log - Log of HTTP SYNOPSIS /etc/log/httpd.log DESCRIPTION The HTTP server logs an entry for every file retrieved via HTTP. This log, written to /etc/log/httpd.log, is stored in the Common Log Format, which is used by many World-Wide Web servers. Each entry in /etc/log/httpd.log consists of one line with seven fields. The fields are, in order: address The IP address of the HTTP client requesting the file. rfc931 This field is always -. authuser This field is always -.
httpd.mimetypes NAME httpd.mimetypes - map of file suffixes to MIME Content-Type SYNOPSIS /etc/httpd.mimetypes DESCRIPTION For HTTP/1.0 and higher protocols, a MIME header is returned in the reply of every GET request. This header includes a Content-Type field, whose contents is determined by examining the suffix of the file being transmitted. The /etc/httpd.mimetypes file contains the mapping of filename suffixes to MIME Content-Type. The format of each line is: suffix, Content-Type.
httpd.passwd NAME httpd.passwd - file of passwords required for HTTP access SYNOPSIS /etc/httpd.passwd DESCRIPTION The password file containing the encrypted form of the password that an HTTP client must supply to have access to a file in a controlled-access directory tree, as declared in /etc/httpd.access. The password is encrypted in the regular UNIX style. User of NCSA or Apache can use their htpasswd program to generate the user_id:passwd pair.
httpd.translations NAME httpd.translations - URL translations to be applied to incoming HTTP requests SYNOPSIS /etc/httpd.translations DESCRIPTION The HTTP daemon supports four URL translation rules to filter incoming HTTP requests. The HTTP daemon applies each rule in succession, stopping at the first successful Redirect, Pass, or Fail rule: Map template result Any request which matches template is replaced with the result string given.
messages NAME messages - record of recent console messages SYNOPSIS /etc/messages DESCRIPTION The default behavior of the filer syslogd daemon (see syslogd) is to print all logging messages of priority info or higher to the console, and to the messages file. Every Saturday at 24:00, /etc/messages is moved to /etc/messages.0, /etc/ messages.0 is moved to /etc/messages.1, and so on. Message files are saved for a total of six weeks. FILES /etc/messages messages file for current week /etc/messages.
netgroup NAME netgroup - network groups data base SYNOPSIS /etc/netgroup DESCRIPTION netgroup defines network wide groups used for access permission checking during remote mount request processing. Each line defines a group and has the format: groupname member-list Each element in member-list is either another group name or a triple of the form: (hostname, username, domainname) The hostname entry must be fully qualified if the specified host is not in the local domain.
networks NAME networks - network name data base SYNOPSIS /etc/networks DESCRIPTION The networks file contains information regarding the known networks which comprise the Internet. For each network a single line should be present with the following information: official-network-name network-number aliases Items are separated by any number of blanks and/or tab characters. A # indicates the beginning of a comment; characters up to the end of the line are not interpreted by routines which search the file.
networks NAME nsswitch.conf - configuration file for name service switch SYNOPSIS /etc/nsswitch.conf DESCRIPTION The name service switch configuration file contains the preferred order in which name services will be contacted for name resolution by the filer. For each map, the name services to be used and the lookup order is specified in this file. Currently three name services are supported. They are local files in the /etc directory, NIS and DNS.
passwd NAME passwd - password file SYNOPSIS /etc/passwd DESCRIPTION The passwd file contains basic information about each users account. It contains a one-line entry for each authorized user, of the form: username:password:uid:gid:gcosfield:home_directory:login_shell Required Fields: username The users login name, not more than eight characters. password The users password, in an encrypted form that is generated by the UNIX passwd function.
passwd dan::2345:23:Dan:: jim:::::: SEE ALSO shadow, options, nis, nsswitch.
quotas NAME quotas - quota description file SYNOPSIS /etc/quotas DESCRIPTION The /etc/quotas file describes disk quotas that go into effect when quotas are enabled. All quotas are established on a per-volume basis. If a volume name is not specified in an entry of the /etc/quotas file, the entry applies to the root volume. The following sample /etc/quotas file describes different kinds of quotas: 4XRWD 7DUJHW W\SH GLVN ILOHV PKRZDUG XVHU 0 .
quotas A user or group is specified by one of the following values: a user or group name, which must appear in the password or group database (either in the /etc/passwd or /etc/group file on the filer, or in the password or group NIS map if NIS is enabled on the filer and is being used for the password or group database); a numerical user or group ID; the pathname of a file owned by that user or group.
quotas SEE ALSO qtree, quota, rquotad A-144 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
rc NAME rc - system initialization command script SYNOPSIS /etc/rc DESCRIPTION The command script /etc/rc is invoked automatically during system initialization. Since the filer has no local editor, /etc/rc must be edited from an NFS client with root access to /etc. Alternately, you can use the setup command to generate a new /etc/rc file without using NFS. EXAMPLE This is a sample /etc/rc file as generated by setup: #Auto-generated by setup Tue Jun 2 21:23:52 GMT 1994 hostname filer.dell.
resolv.conf NAME resolv.conf - configuration file for domain name system resolver SYNOPSIS /etc/resolv.conf DESCRIPTION The resolver configuration file contains information that is read by the resolver routines. The file is designed to be human readable and contains a list of keywords with values that provide various types of resolver information. The different configuration options are: nameserver address This specifies the Internet address (in dot notation) of a name server that the resolver should query.
rmtab NAME rmtab - remote mounted file system table SYNOPSIS /etc/rmtab DESCRIPTION /etc/rmtab maintains the list of client mount points between server reboots. The list of client mount points can be obtained by using the MOUNTPROC_DUMP remote procedure call, or by using the UNIX showmount command. When the server successfully executes a mount request from a client, the server appends a new entry to the file. When the client issues an unmount request, the corresponding entry is marked as unused.
serialnum NAME serialnum - system serial number file SYNOPSIS /etc/serialnum DESCRIPTION The file /etc/serialnum should contain the serial number of your machine. The serial number is found on the back of the machine in the lower right hand corner. If the file does not exist on your system, create it and put the machines serial number in it. The file should contain a single line that only has the serial number.
shadow NAME shadow - shadow password file SYNOPSIS /etc/shadow DESCRIPTION The shadow file provides more secure storage for the users password (which would otherwise be in /etc/passwd). When the password field of an entry in /etc/passwd is empty, /etc/shadow must contain a corresponding entry with the same user name but a non-empty encrypted password. username:password: The following list explains the required fields: username The users login name, not more than eight characters.
sm NAME sm - network status monitor directory SYNOPSIS /etc/sm DESCRIPTION The network status monitor provides information about the status of network hosts to clients such as the network lock manager. The network status monitor keeps its information in the /etc/sm directory. The /etc/sm/state file contains an integer that is incremented each time the filer is booted. The /etc/sm/monitor file contains a list of network hosts the filer is monitoring.
sm snap reserve [ vol_name ] | [ vol_name percent ] Sets the size of the indicated volumes snapshot reserve to percent. With no percent argument, prints the percentage of disk space that is reserved for snapshots in the indicated volume. With no argument, the snap reserve command prints the percentage of disk space reserved for snapshots for each of the volumes in the system. Reserve space can be used only by snapshots and not by the active file system.
snapmirror.allow NAME snapmirror.allow - list of filers to which you can replicate volumes from this filer SYNOPSIS /etc/snapmirror.allow DESCRIPTION The /etc/snapmirror.allow file exists on the source filer used for SnapMirror. It contains a list of filers to which you can replicate volumes from the source filer. If the source volume and the mirror exist on the same filer, you still must enter the filer name in this file. In this file, type one filer name per line. EXAMPLE The following snapmirror.
snapmirror.conf NAME snapmirror.conf - configuration file specifying how filers replicate volumes using SnapMirror SYNOPSIS /etc/snapmirror.conf DESCRIPTION The /etc/snapmirror.conf file exists on the filer containing the mirror used for SnapMirror. Each entry of the file specifies the volume to be replicated, an argument for the replication, and the schedule for updating the mirror. Each entry of the /etc/snapmirror.
syslog.conf NAME syslog.conf - syslogd configuration file DESCRIPTION The syslog.conf file is the configuration file for the syslogd daemon (see syslogd). It consists of lines with two TAB separated fields: selector action The selector field specifies the types of messages and priorities to which the line applies. The action field specifies the action to be taken if a message the syslogd daemon receives matches the selection criteria. The selector field is encoded as a facility, a period (.
syslog.conf debug Debug messages used for diagnostic purposes. These messages are suppressed by default. If a received message matches the specified facility and is of the specified level (or a higher level ), the action specified in the action field will be taken. Multiple selectors may be specified for a single action by separating them with semicolon (;) characters. It is important to note, however, that each selector can modify the ones preceding it.
syslog.conf Also see the sample configuration file in /etc/syslog.conf.sample FILES /etc/syslog.conf The syslogd configuration file. /etc/syslog.conf.sample Sample syslogd configuration file.
zoneinfo NAME zoneinfo - time zone information files SYNOPSIS /etc/zoneinfo DESCRIPTION The directory /etc/zoneinfo contains time zone information files used by the timezone command (see timezone). They are in standard UNIX time zone file format as described below. The time zone information files begin with bytes reserved for future use, followed by six four-byte signed values, written in a standard byte order (the high-order byte of the value is written first).
zoneinfo specified in standard time ignores any offset due to Daylight Savings Time. On the other hand, a time specified in wall clock time takes the prevailing value of Daylight Savings Time in to account. Finally there are tzh_ttisgmtcnt GMT/local indicators, each stored as a one-byte value; they tell whether the transition times associated with local time types were specified as GMT or local time.
6\VWHP 6HUYLFHV DQG 'DHPRQV This section contains system services and daemons.
autosupport NAME autosupport - email notification daemon SYNOPSIS Data ONTAP 5.3 is capable of sending email notification to other designated addressees in certain situations. The email contains useful information to help them solve or recognize problems quickly and proactively. The system can also be configured to send a short alert notification containing only the reason for the alert to a separate list of recipients.
autosupport 7. If a disk shelf reports errors, notification is sent with SHELF_FAULT!!!. This event also sends the short note mail. 8. If one of the power supplies in the filer fails, notification is sent with POWER_SUPPLY_DEGRADED!!!. This event also sends the short note mail. 9. If the system shuts down because it has detected that the temperature inside the filer is too high, notification is sent with OVER_TEMPERATURE_SHUTDOWN!!!. This event also sends the short note mail. 10.
autosupport 18. Output from sysconfig -r 19. The /etc/messages file The autosupport feature is manipulated through the options command (see options). The options choices are: autosupport.enable: on,off autosupport.mailhost: Comma-separated list (no spaces) autosupport.to: Comma-separated list (no spaces) autosupport.noteto: Comma-separated list (no spaces) autosupport.from: Local user name autosupport.doit: text word describing reason autosupport.enable: Default is on.
autosupport autosupport.from: Default is autosupport. Enter a user name designated as the sender of the autosupport mail. This allows replies to the mail to be received by a responsible representative at the site. options autosupport.from sysadm autosupport.doit: This is a trigger to send the email out. The text word argument to this option is sent in the email subject line. This is used to identify the reason for the notification.
DNS NAME DNS - Domain Name System DESCRIPTION Domain Name Service provides information about hosts on a network. This service has two parts: a resolver which requests information and a nameserver which provides it. Data ONTAP 5.3 supports only the resolver. When the filer needs to resolve a host address, it first looks at the /etc/nsswitch.conf (see nsswitch.conf) file to get the order in which various name services are to be consulted.
NIS NAME NIS - NIS client service DESCRIPTION The NIS client service provides information about hosts, user passwords, user groups and netgroups on a network. In NIS terminology, each of the above is referred to as the map and the specific information being looked up is called the key. For example, the hosts map is like the /etc/hosts file; it provides a translation from host names to IP addresses.
rmt NAME rmt - remote magtape protocol module SYNOPSIS /etc/rmt DESCRIPTION /etc/rmt is a special command that can be used by remote computers to manipulate a magnetic tape drive over a network connection; for example, the UNIX dump and restore commands often can either use /etc/rmt to access a remote tape, or have rdump and rrestore variants that can do so. /etc/rmt is normally run by the rshd daemon (see rshd) as a result of a remote machine making a request to rshd to do so.
rmt The protocol is comprised of the following commands, which are sent as indicated - no spaces are supplied between the command and its arguments, or between its arguments, and \n indicates that a newline should be supplied: Odevice\nmode\n Open the specified device using the indicated mode.
rmt 5 rewind the tape 6 rewind and unload the tape The return value is the count parameter when the operation is successful. Any other command causes /etc/rmt to close the connection. DIAGNOSTICS All responses are of the form described above.
rquotad NAME rquotad - remote quota server DESCRIPTION The filer supports the remote quota service that allows NFS clients to determine their quota allocation on the server.
rshd NAME rshd - remote shell daemon DESCRIPTION The filer has UNIX-compatible remote shell capability that enables you to execute certain filer commands from a UNIX command line or shell script. It also enables you to use a remote shell application on a PC to enter filer commands. The /etc/hosts.equiv file controls which hosts have access to the filer remote shell. The hosts listed in the /etc/hosts.equiv file are called trusted hosts.
snmpd NAME snmpd - snmp agent daemon DESCRIPTION The filer supports an SNMP version 1 compatible agent that provides support for both the MIB-II management information base for TCP/IP based internets as well as a Dell Custom MIB. A number of user configurable options for the SNMP agent can be set and queried from the console using the snmp command (see snmp). Due to weak authentication in SNMP version 1, SetRequest commands that allow the remote setting of configuration variables have been disabled.
snmpd raid Information on RAID equivalent to the output of the sysconfig -r command (see sysconfig).
syslogd NAME syslogd - log system messages DESCRIPTION The syslogd daemon logs system messages to the console, log files and other remote systems as specified by its configuration file, /etc/syslog.conf. The syslogd daemon reads its configuration file when it starts up during the boot procedure, or within 30 seconds after the /etc/syslog.conf file is modified. For information on the format of the configuration file, see syslog.conf. If /etc/syslog.
A-174 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
*ORVVDU\ $&/ DXWRVXSSRUW Access control list. A list that contains the users or groups access rights to each share. A filer daemon that triggers e-mail messages from the customer site to a specified e-mail recipient when there is a potential filer problem. DGDSWHU FDUG A SCSI card, network card, hot swap adapter card, serial adapter card, or VGA adapter that plugs into a filer expansion slot.
GLVN ,' QXPEHU KRW VZDS DGDSWHU A number assigned by the filer to each disk when it probes the disks at boot time. An expansion card that makes it possible to add or remove a hard disk with minimal interruption to file system activity. (WKHUQHW DGDSWHU LQRGH An Ethernet interface card. A data structure containing information about files on a filer and in a UNIX file system. H[SDQVLRQ FDUG A SCSI card, NVRAM card, network card, hot swap card, or console card that plugs into a filer expansion slot.
195$0 FDFKH 5$,' Nonvolatile RAM in the filer, used for logging incoming write data and NFS requests. Improves system performance and prevents loss of data in case of a filer or power failure. 195$0 FDUG Redundant arrays of independent disks. A technique that protects against disk failure by computing parity information based on the contents of all the disks in the array. The filer uses RAID Level 4, which stores all parity information on a single disk.
V\VWHP ERDUG 9*$ DGDSWHU A printed circuit board that contains the filers CPU, expansion bus slots, and system memory. Expansion card for attaching a VGA terminal as the console. WUHH TXRWD Write Anywhere File Layout. The WAFL file system was designed for the Dell filer to optimize write performance. A type of disk quota that restricts the disk usage of a directory created by the quota qtree command. Different from user and group quotas that restrict disk usage by files with a given UID or GID.
,QGH[ $ % access events, CIFS, auditing, 7-26 backup amount of data, 12-7 data format, 12-5 data not in qtrees, 12-15 devices, 12-3 excluding files, 12-15 incremental, 12-4 metadata, 12-2 name in the /etc/dumpdates file, 12-14 qtrees, 12-7 reasons for, 12-1 specifying files and directories, 12-14 use of nonqualified tape drives, 12-10 Windows NT ACL information, 12-5 access logging, CIFS disabling, 7-29 enabling, 7-29 access rights assigning rights to users, 7-20 CIFS shares, 7-20 active event log, CIF
& cables, checking, 18-13 CGI requests, redirecting, 8-9 changing size of RAID groups, 3-9 character set types, supported, 5-8 CIFS, 7-20 access event displays, 7-27 access event log, 7-26 access logging disabling, 7-29 enabling, 7-29 active event log default, 7-26 specifying, 7-30 adding users, 7-4 assigning and changing access rights, 7-20 creating shares, 7-12 deleting a share, 7-17 displaying session information, 7-35 displaying share information, 7-15 displaying shares, 7-10 displaying statistics, 7-34
cifs.cifs.show_snapshot option, 19-6 copying a volume (continued) recommendation for, 15-4 requirements for, 15-3 cifs.guest_account option, 19-3 copy-on-write technique, 9-1, 9-3 cifs.home_dir option, 7-19, 19-4 cpio, copying files with, 18-17 cifs.netbios_aliases option, 19-5 creating nvfail_rename file, 4-31 cifs.bypass_traverse_checking option, 19-3 cifs.oplocks.enable option, 19-4 cifs.perm_check_use_gid option, 19-5 cifs.save_case option, 5-15 cifs.
directories conversion time, 5-15 created by snapshots, 9-16 Unicode conversion upon CIFS access, reverting to, 5-14 Unicode format conversion upon any access, 5-16 Directory directive, 8-3 disk does not exist message, 18-7 disk fail command, 3-11 disk in use message, 18-7 disk information, using sysconfig -d, 17-1 disk information, using vol status, 17-2 DNS disabling, 4-10 enabling, 4-9 options, 19-7 querying the name server, 4-9 resolving names with, 4-7 dns.
Ethernet setting media type on, 4-15 files copying with cpio, 18-17 large, 4-1 maximum size, 4-1 same file criteria, 9-2 setting maximum number of, 11-10 working with large, 4-1 event auditing, CIFS, configuration, 7-29 filestats command, 3-15 event log, CIFS access, 7-26 default, 7-26 firewall, virtual, 8-5 errors caused by copying a volume, 15-8 caused by exceeding disk quotas, 11-9 displayed by netstat, 18-13 displayed by nvfail, 4-30 events, CIFS, viewing, 7-32 explicit routes in routing table, 4
HTTP (continued) starting service, 8-1 virtual hosting, enabling, 8-5 / httpd.admin.enable option, 19-8 languages, supported list, 5-9 httpd.enable option, 19-8 large files, 4-1 httpd.log.max_file_size option, 19-8 LCD, filer main unit, 1-4 httpd.rootdir option, 19-8 legal characters in file names, 5-6 httpd.timeout option, 19-9 local groups, CIFS, adding to filer, 7-6 httpd.timewait.
minra option, 17-9 minra volume option, 19-15 monitoring status of volumes, 3-12 mounting files if there are qtrees, 11-11 problems with, 18-14 mounting volumes, 3-7 mt command, 14-4 MTU setting, 4-16 multiple RAID groups, 3-1 multiple volumes configuration planning, 3-8 limitations of, 3-8 multiple-mode trunks creating, 4-24 trunks multiple-mode, 4-19 multivolume MIB objects, locations, 4-3 networks (continued) network mask configuring using ifconfig, 4-15 problems with, 18-12 statistics, 18-12 using ifco
nis.domainname option, 19-11 nis.
3 packets, responses to, 4-14 panic messages, 18-19 parity disks, 3-1 role, 3-2 quotas, disk information available through SNMP, 4-4 information available through the custom MIB, 4-4 passwords lost, 18-11 5 pcnfsd.
replicating a volume, 16-1 requests, replies to, 4-14 require group directive, 8-3 SCSI ID, identifying disks, 3-2 require user directive, 8-3 second-level virtual interfaces creating, 4-25 resolving host names, 4-8 serial ports, filer main unit, 1-5 restarting a filer, 18-3 shares creating and changing, 7-12 deleting, 7-17 displaying, 7-10 displaying information about, 7-15 renaming volume, effect on, 7-1 restore, 13-5 restore command data that cannot be restored, 13-2 examples, 13-7 function keys,
SnapRestore (continued) how it works, 3-22 interaction with SnapMirror, 3-23 procedure for reverting a volume, 3-25 typical applications, 3-22 when to use, 3-23 sysconfig command filer configuration, 17-1 hot spare disk availability, 3-6 snapshots accessing, 9-16 automatic, 9-5 commands for, 9-4 created by SnapMirror, 16-4 definition, 9-1 deleting to free space, 9-14 directory name displayed on CIFS clients, 9-17 disk consumption by, 9-8 effects of SnapRestore, 3-22 effects on disk quotas, 9-11 informatio
Technical Support how to contact, 18-1 unrecognized volume name message, 18-5 telnet connection to the filer limiting host access, 19-19 unsuccessful file access detail display, CIFS, 7-28 telnet.enable option, 19-19 uptime command, 17-4 telnet.hosts option, 19-19 URL, how filer translates, 8-8 timed.enable option, 19-13 usable space on disks, 3-4 timed.log option, 19-13 user quotas, creating, 11-7 timed.max_skew option, 19-13 users, CIFS, adding to filer, 7-4 timed.proto option, 19-14 timed.
vol copy throttle command, 15-10 vol create -l command, 5-13 vol status command, 17-2 vol status -d command, 17-2 vol status -l command, 5-13 vol status -r command, 17-3 vol status -v command, 17-3 vol.copy.
warnings for disk failures, 3-5 wcc command, 5-17 WebNFS, 6-1, 6-12 < ypwhich command, 4-11 weekly snapshots, 9-5 Windows file access detail displays, CIFS event, 7-27 Windows NT commands, performing Windows filer tasks, 1-3 14 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide