Escolar Documentos
Profissional Documentos
Cultura Documentos
NAS Gateway
Command Reference
ONStor, Inc.
254 East Hacienda Ave.
Campbell, CA USA 95008
(408) 963-2400
Copyright © 2005-2007 ONStor, Incorporated. All rights reserved.
This document exists for use with the products of ONStor, Inc. and is intended for use by employees,
representatives, assigns, and clientele of ONStor, Inc. This document cannot be copied, reproduced,
transmitted, or stored electronically, in part or in whole, without first obtaining the express consent and
agreement of ONStor, Inc.
This document can contain the names of products and services of other companies. Such products and
services are the property of their owners, and ONStor, Inc. makes no implications or claims, express or
implicit, to the ownership of such products and services. ONStor, Inc. has, in good faith, made efforts to
represent trademarked and copyrighted products and services as the property of their respective owners.
Contents
Audience
This Command Reference is intended for IT professionals that administer the ONStor
Bobcat 2200 Series NAS Gateway (NAS Gateway) products and their company’s
storage area network (SAN). This book is intended to serve IT professionals and
storage administrators of varying levels of experience.
Scope
This Command Reference is designed to help you understand the syntax, formation,
and usage of NAS Gateway commands. Each description of commands contains the
following information:
• Details about the arguments and options that are available to each command
• The results that occur from running the command with different argument or
option setting
• An example of how to run the command
This document is a reference guide. It is not intended as a complete overview of the
NAS Gateway products, storage or networking protocols, or a task-oriented guide
documenting procedures. For more comprehensive material about the NAS Gateway,
refer to the additional NAS Gateway product documentation listed in Table F-1
“Related Documentation” on page i-vi.
Document Organization
This document is organized in chapters alphabetically by command name. Because
commands are listed alphabetically, you can locate the commands either through the
Table of Contents or by following alphabetic sequence through the book. You can
locate the command names of each chapter on the first page of a chapter.
Related Documentation
This document is part of a set of product documentation for the NAS Gateway.
Table F-1 shows the related documentation. This Command Reference is most closely
related to the System Administrator’s Guide because this book expands command
syntax documented in the System Administrator’s Guide.
Release notes are available with every release of EverON™ software. The release
notes contain additional information about bugs and fixes in the product,
documentation errata or omissions, and new features or enhancements.
Revision Trail
This document is regularly reviewed and revised. Table F-2 shows the history of
revision for this document. ONStor recommends to get the latest information
whenever possible. You can retrieve the latest documentation from our website:
www.onstor.com. At the ONStor web site, select the service & support drop-down list,
then select ONStor ASSIST. Type your user name and password. If you do not have a
user name and password, you can register for an account at this web page.
Revision Revision
Document Name Part Number
Level Date
Syntax Usage
The NAS Gateway’s command-line interpreter uses different syntax markers to
indicate specific conditions of usage. Table F-3 shows the different syntax markers
used in the command-line interpreter, and explains what each marker means.
Admin Password
Synopsis
admin password
Description
Use the admin password command to change the administrative user’s password.
When you run the command, the ONStor™ NAS Gateway prompts you twice for the
new password. The second of the new passwords is for verification in case you make
an error when you set the new password the first time. Passwords can have up to 16
alphanumeric characters. Passwords can contain special characters such as *, ?,
quotation marks, and blank spaces. When the NAS Gateway prompts you for a new
password, all characters appear as asterisks (*) so that the actual password is not
displayed on the monitor while being entered.
Example
cluster1-4>admin password
Changing local password for root.
New password:
Retype new password:
cluster1-4>
In this example, the administrator password for the root administrator is changed.
When the password has been correctly entered twice, the NAS Gateway accepts the
changed password.
ARP Add
Synopsis
arp add IPADDR -a MACADDR [-n NODE]
Description
Use the arp add command to add a static address resolution protocol (ARP) entry to
the ARP table. Add and delete static ARP entries manually; they do not automatically
age out of the ARP table. With the arp add command you can associate a media
access control (MAC) address of the device at the far end of a physical link with a
specific IP interface on the ONStor™ NAS Gateway.
Options
Table 2-1 : Options for arp add command
Example
In this example, a static ARP entry is added to the NAS Gateway. The command
syntax indicates the following:
• An ARP entry is added to interface 10.1.1.89.
• The MAC address of the device at the far end of the interface is 00:01:d2:c3:a4:21
• The ARP entry is added to the cluster1-3 node.
Related Commands
arp delete Deletes and ARP entry from any NAS Gateway
in the cluster.
arp show Shows the ARP table.
ARP Delete
Synopsis
arp delete IPADDR [-n NODE]
Description
Use the arp delete command to remove a static ARP entry. Remove static ARP
entries manually; they do not automatically age out of the ARP Table. If you have
created a static ARP entry with the arp add command, you can delete the ARP entry
from a specific IP interface in the NAS Gateway with the arp delete command.
Options
Table 2-2 : Options for arp delete command
Example
In this example, the static ARP entry is deleted. The command syntax indicates the
following:
• The ARP entry for interface 10.1.1.89 is deleted.
• The entry is deleted from the node on which it was configured — in this example,
the cluster1-3 node.
Related Commands
arp add Adds a static ARP to any NAS Gateway within
the cluster.
arp show Shows the ARP table.
ARP Show
Synopsis
arp show -n NODE [-a IPADDR] (NAS Gateway context)
arp show [-a IPADDR] (virtual server context)
Description
Use the arp show command to display the contents of the NAS Gateway’s ARP table.
The NAS Gateway’s ARP table contains only static ARP entries. Static entries are
broadcast entries or those that have been added with the arp add command. You can
display the ARP table contents in four different ways:
• The entire ARP table for the NAS Gateway
• The entire ARP table for the virtual server
• A specific ARP table entry in NAS Gateway context, by specifying the interface
that hosts the ARP entry you want to view
• A specific ARP table entry in virtual server context, by specifying the interface
that hosts the ARP entry you want to view
The NAS Gateway contains a central ARP table on the System Switch and Controller
(SSC). The NAS Gateway’s file processing (FP) controller contains an ARP table,
however, it is smaller and contains only the entries for the devices connected to it
directly. Each virtual server can also have its own ARP table.
Note!
The output of this command differs depending on the context in which you run
the command. If you are in the NAS Gateway context when you run the
command, the display shows information for the whole NAS Gateway. If you
are in the virtual server context, the display shows only the information for that
specific virtual server.
Options
Table 2-3 : Options for the arp show command
Example
The following example shows the ARP table for all NAS Gateways in the cluster.
The following example shows the ARP table for the NAS Gateway on IP address
10.1.1.123.
The following example shows the ARP table for the virtual server VS_PUBSTEST_1.
Related Commands
arp add Adds a static ARP to any NAS Gateway within
the cluster.
arp delete Deletes an ARP entry from any NAS Gateway
within the cluster.
Audit Clear
Synopsis
audit clear VOLNAME
Description
You can manually clear the audit log file by running the audit clear command. This
command erases the audit log file’s contents without erasing the audit log file itself.
When the audit log file is cleared, the volume space used by the file is cleared.
You can run this command at any time; the command is not dependent on the audit log
file’s behavior when it reaches capacity. If you run this command when the audit log
file is configured for circular write, the circular write feature remains configured and
wraps to the beginning of the file the next time the audit log reaches capacity. This
command is useful for audit log files that are not configured with circular write
feature. By running this command on such files, you can empty the file so that new
entries can be written to the audit log.
Note!
The audit clear command is immediate. The ONStor™ NAS Gateway does
not offer confirmation or a way to undo the clear.
Run this command on each volume whose audit log file you want to clear.
Options
The VOLNAME variable is the name of the volume that contains
the audit log file you want to clear. All entries in the audit log file
are erased, and the empty audit log file remains configured and
ready to accept new entries.
Example
In this example, the audit log file for techpubs is cleared. If file auditing is still enabled
when you clear the audit log file, new entries begin filling the log.
Related Commands
audit enable Enables logging of audit records.
audit disable Disables logging of audit records.
audit show config Shows the audit configuration settings.
audit show log Shows the audit log records.
Audit Disable
Synopsis
audit disable VOLNAME
Description
You can disable the file auditing software on each volume by running the audit
disable command. By default, file auditing is disabled, but with this command you
can deactivate the auditing software on a volume where file auditing was enabled. The
audit disable command controls the operational state of the file auditing feature for
an individual volume, so run this command on each volume where you want file
auditing disabled.
When you disable file auditing, the NAS Gateway halts future file auditing on a
volume until the feature is reenabled. However, all entries in the audit log file and the
audit log file’s configuration are retained. If file auditing is disabled, it remains
inactive indefinitely, and no new audit events are tracked and added to the audit log
file.
Options
The VOLNAME variable is the name of the volume on which you
want to disable file auditing.
Example
In this example, the auditing feature is disabled for the volume techpubs.
Related Commands
audit enable Enables logging of audit records.
audit clear Clears the audit log file for the specified volume.
audit show config Shows the audit configuration settings.
audit show log Shows the audit log records.
Audit Enable
Synopsis
audit enable VOLNAME
Description
Use file auditing to view various operations that have occurred on a volume or
directory. The NAS Gateway’s software supports the enabling of the file auditing
software on each volume with the audit enable command. By default, file auditing
is disabled. When you enable file auditing for the first time, the NAS Gateway creates
the audit log file on disk for the specified volume, and the same audit log file is used
for subsequent audits regardless of how many times the auditing software is enabled or
disabled on that volume.
Note!
File auditing can have an impact on the NAS Gateway while enabled, based on
the volume of transactions and amount of data that is scanned in each file
transaction.
File auditing operates on successful and failed file access events.
Options
The VOLNAME variable is the name of the volume on which the
NAS Gateway performs file auditing.
Example
In this example, file auditing is enabled on the volume techpubs. This command
controls the overall state of the file auditing feature.You also need to set file auditing
parameters, such as the audit log size and the success and failure parameters.
Related Commands
audit clear Clears the audit log file for the specified volume.
audit disable Disables logging of audit records.
audit show config Shows the audit configuration settings.
audit show log Shows the audit log records.
audit set The family of audit set commands sets file
auditing parameters.
Synopsis
audit set circular VOLNAME {yes|no}
Description
Because the audit file has a finite capacity, it behaves in one of two ways when it
reaches capacity:
• It performs a circular write operation, by wrapping to the beginning of the file and
writing new entries over the existing entries. For example, if the file is configured
for 56 audit log records, the 57th audit log record is written at location 1 of the file.
• It does not write any more entries, and instead sends an audit log file notification
that the file is full.
You can control the audit file’s behavior at capacity by running the audit set
circular command. Use this command to control the audit file by activating or
deactivating the circular write operation. By default, the circular write feature is
disabled.
Note!
If you do not want to enable the circular write feature, you can clear the audit
log file by running the audit clear command. This command erases stale
entries from the file and allows writing of new entries to the audit log.
Options
Table 3-1 : Options for the audit set circular command
Example
In this example, the audit log file is set to operate in circular write mode on the volume
techpubs.
Related Commands
audit set fail_flag Specifies whether file access should fail if the
auditing operation fails when auditing is
enabled.
audit set fail_privilege Specifies which privileges used for file access
should cause recording of an audit event if the
access fails.
audit set filesize Specifies the maximum size to which audit log
file can grow.
audit set success_privilege Specifies which privileges used for file access
should cause recording of an audit event if the
access succeeds.
Synopsis
audit set fail_flag VOLNAME {yes|no}
Description
The NAS Gateway’s ability to record operations in the audit log file can affect the
completion of file operations. With the audit set fail_flag command, you can
configure the NAS Gateway to disallow an attempted file operation if that operation
cannot be recorded in the audit log file. For example, if file_open operations cannot be
written to the audit log file because the audit log file is full, you can specify not to
permit these operations. If you specify not to permit an operation, it fails and the client
is not allowed to perform the operation because the audit log file cannot record it.
If you disallow file operations because the audit log file cannot record them, ensure
that the audit log file is configured to behave to your file size and file behavior
specifications.
Audit logging can fail for reasons other than the success or failure parameters that you
set. The fail flag you set with the audit set fail_flag command disallows access
to the file if auditing fails for any reason, not just your configured parameters.
Options
Table 3-2 : Options for the audit set fail_flag command
Example
In this example, the audit fail flag is set for the volume techpubs.
Related Commands
audit set circular Specifies whether the audit log file is a circular
file.
audit set fail_privilege Specifies which privileges used for file access
should cause recording of an audit event if the
access fails.
audit set filesize Specifies the maximum size to which audit log
file can grow.
audit set success_privilege Specifies which privileges used for file access
should cause recording of an audit event if the
access succeeds.
Synopsis
audit set fail_privilege VOLNAME PRIVILEGES
[security|backup|restore|takeownership|traverse]
Description
As part of file auditing, specify the audit parameters to be tracked. You can track audit
parameters for negative events on the volume, such as failed file operations. The
determination of a failed file operation is made by a comparison of privilege levels,
such as backup, take-ownership, or restore. If this comparison results in denial of the
operation, the file operation fails.
You can specify which failed file operations to track by configuring a failure
parameter. This parameter specifies all the file operations that the audit log should list
when a comparison of the system access control list (SACL) on the file prevents the
operation from occurring. For example, if you add take-ownership as a failure
parameter, the NAS Gateway audits all attempts that use the take-ownership privilege.
Any failed attempts that use the take-ownership privilege are posted to the audit log
file. If you don’t configure a failure parameter, the NAS Gateway does not audit failed
file operations.
Note!
You cannot explicitly configure actual permissions, for example backup, with
any auditing commands. You only specify the permissions that create an audit
record in the audit log file.
The NAS Gateway compares the permission that is attempting a file access
with the permission required for that file access. In the case of failure
parameters, the NAS Gateway then adds a record to the audit log file whenever
the comparison disallows file access.
Options
Table 3-3 : Options for the audit set fail_privilege command
Example
In this example, file auditing failure parameters are configured for the volume
techpubs. The NAS Gateway is configured to track failed file access attempts for
security, backup, restore, take-ownership, or traverse events.
Related Commands
audit set fail_flag Specifies whether file access should fail if the
auditing operation fails when auditing is
enabled.
audit set circular Specifies the audit log file is a circular file.
audit set filesize Specifies the maximum size to which audit log
file can grow.
audit set success_privilege Specifies which privileges used for file access
should cause recording of an audit event if the
access succeeds.
Synopsis
audit set filesize VOLNAME FILESIZE
Description
The audit log is created automatically when you enable file auditing for the first time,
and it is populated automatically whenever the audit log file’s contents are configured
with success or failure parameters. The amount of entries in the audit log file can vary,
depending on how large you want the file.
You can set the size of the audit log file by running the audit set filesize
command. Use this command to customize the audit log file’s capacity based on your
use of file auditing. For example, if you intend to track few file operations for success
or failure, you can set the audit log file to a smaller size. Conversely, if you want to
enforce very strict and detailed auditing, you can set a large audit log file. Consider the
following when setting the audit log file size:
• Smaller audit log files consume less disk space for the volume, but do not store an
extensive audit trail.
• Larger audit log files consume more disk space for the volume, but provide a more
detailed audit trail.
The audit log file’s size is set in kilobytes. The default size of the file is 0 for unlimited
space. Behavior of the file depends on whether is configured as a circular file:
• If the file size is 0 and the file is circular, the file does not wrap.
• If the file size is 0 and the file is not circular, it continues to grow until it reaches
the maximum disk space minus the amount of user data. At this point, the file no
longer accepts new audit log entries. However, if the volume is configured for
automatic growth before the file reaches the truncation point, the NAS Gateway
can automatically add more disk space.
Because the audit log file contains a full path, the size of each record in the file can
vary, and therefore, the size of each file can vary. If you create success and failure
parameters that track many or all privileges, set your audit log file to a larger size than
if you have fewer success or failure parameters. ONStor recommends to start with 10
kilobytes, but monitor the audit log frequently after its initial configuration, so you can
increase or decrease the file size based on your needs.
Options
Table 3-4 : Options for the audit set filesize command
Example
In this example, the audit log file is set to 10 kilobytes for the volume techpubs. This is
the file’s capacity, and entries are added to the file until it reaches capacity. At that
point, entries are either discarded or wrap around and write over the first (oldest)
entries in the audit log file. The file’s behavior at capacity is set with the audit set
circular command.
Related Commands
audit set circular Specifies whether the audit log file is a circular
file.
audit set fail_privilege Specifies which privileges used for file access
should cause recording of an audit event if the
access fails.
audit set success_privilege Specifies which privileges used for file access
should cause recording of an audit event if the
access succeeds.
Synopsis
audit set success_privilege VOLNAME PRIVILEGES
[security|backup|restore|takeownership|traverse]
Description
As part of file auditing, specify the audit parameters to be tracked. You can track audit
parameters for positive events on the volume, such as successful file operations. The
determination of a successful file operation is made by a comparison of privilege
levels, such as backup, take-ownership, or restore. If this comparison results in
acceptance of the operation, the file operation is successful.
You can specify which successful file operations to track by configuring a success
parameter. This parameters specifies all the file operations that you want to appear in
the audit log when a comparison of the SACL on the file allows the operation to occur.
For example, if you add backup as a success parameters, the NAS Gateway audits all
events that use the backup privilege. Any successful events that use the backup
privilege are posted to the audit log. If you don’t configure any success parameters, the
NAS Gateway does not audit successful file operations.
Note!
You cannot explicitly configure actual permissions, for example backup, with
any auditing commands. You only specify the permissions that create an audit
record in the audit log file.
The NAS Gateway compares the permission that is attempting a file access
with the permission required for that file access. In the case of success
parameters, the NAS Gateway then adds a record to the audit log file whenever
the comparison allows the file access.
Options
Table 3-5 : Options for the audit set success_privilege command
Example
In this example, success parameters are configured for the volume techpubs. The NAS
Gateway is configured to track successful file access attempts for security, backup,
restore, take ownership, or traverse events.
Related Commands
audit set fail_flag Specifies whether file access should fail if the
auditing operation fails when auditing is
enabled.
audit set fail_privilege Specifies which privileges used for file access
should cause recording of an audit event if the
access fails.
audit set filesize Specifies the maximum size to which audit log
file can grow.
audit set circular Specifies whether the audit log file is a circular
file.
Synopsis
audit show config VOLNAME
Description
You can view the file auditing configuration at any time by running the audit show
config command. This command shows the configured file audit parameters for a
specified volume. Run this command on each volume whose configuration you want
to view.
Options
The VOLNAME variable is the name of the volume for which you
want to display the currently configured file auditing parameters.
Example
Related Commands
audit show log Shows the audit log records for the specified
volume.
Synopsis
audit show log VOLNAME [MAXRECORDS]
Description
You can display the audit log file at any time to view the contents. ONStor
recommends to check the audit log file frequently while you are configuring file
auditing features to facilitate any corrections to the file auditing configuration or the
success or failure parameters. You can display a volume’s audit log file by running the
audit show log command. Run this command for each volume whose audit log file
you want to view.
Note!
When you run the audit show log command, Windows clients, or Windows
servers cannot display the audit log file through the Windows Event Viewer.
Options
Table 3-6 : Options for the audit show log command
Example
In this example, four audit log file entries are displayed. This log contains
configuration records and audit records. In the example, the configuration records are
smaller; they have a title that is anything other than file access; and the titles indicate
which action was performed. For example, the first two entries in this example are
configuration records. These entries indicates that the UNIX user user1@domainX
changed the auditing configuration by first clearing the audit log file, then modifying
the auditing configuration.
The remaining entries are audit records as indicated by their title file access. The audit
log contains the following information in each audit record:
• The date and timestamp at which the audit record was created, and the reason for
the record. In these examples, a file access request was sent.
• User name information, including the domain in which the user is requesting
access to a file.
• The path that the user used to attempt access to the file.
• The access information about the request, including whether file access was
allowed or denied,
• The type of request the NAS Gateway received from the user.
• The access mask, which is the string of numerals and the file access abbreviations
that indicate which actions were attempted on the file. These abbreviations map
closely to access mask values used by Windows devices, but the abbreviation for
each label is related to the EverON™ software file system.
• The privileges used to access the file.
Related Commands
audit show config Shows the audit configuration settings.
Synopsis
audit unset fail_privilege VOLNAME PRIVILEGES
[security|backup|restore|takeownership|traverse]
Description
You can remove a configured failure parameter by running the audit unset
fail_privilege command. When you run this command, a configured failure
parameter is deleted from the auditing software. Therefore, failed file operations for
the deleted privilege are no longer tracked in the audit log file.
Note!
A deleted failure parameter is not automatically tracked as a success parameter,
Use the audit set success_privilege command to configure auditing for
success parameters.
Options
Table 3-7 : Options for the audit unset fail_privilege command
Example
In the preceding example the failure notification for the restore privilege is unset, and
the audit log file is displayed. The restore privilege is configured for failure because of
the setting Access Granted=no. However, after the audit unset fail_privilege
command is run for the restore privilege, access attempts with the restore privilege are
no longer posted to the audit log when they fail to complete. With this command, you
are removing the NAS Gateway’s ability to track failed file access attempts for events
that require restore privilege. A subsequent display of the audit log file would show no
further entries for the restore privilege, as shown in the following example display:
In the example display, the first audit entry, which is a configuration record, indicates
that the administrator changed the auditing configuration as shown by Audit modify.
This entry notes the issuance of the audit unset fail_privilege command.
Because the command completed, operations that require the restore privilege on the
file or directory are no longer posted to the audit log on failures.
Note!
When you unset a failure privilege and you have no success privilege
configured, no auditing for that privilege occurs, which leaves you unable to
track file or directory access for that privilege.
Related Commands
audit unset success_privilege Unsets the audit event logging for successes
associated with specific privileges.
Synopsis
audit unset success_privilege VOLNAME PRIVILEGES
[security|backup|restore|takeownership|traverse]
Description
You remove a success parameter by running the audit unset success_privilege
command. When you run this command, a configured success parameter is deleted
from the auditing software. Therefore, successful file operations for the deleted
privilege are no longer tracked in the audit log file.
Note!
A deleted success parameter is not automatically tracked as a failure parameter,
Use the audit set fail_privilege command to configure auditing for failure
parameters.
Options
Table 3-8 : Options for the audit unset success_privilege command
Example
The preceding example, success for the restore privilege is unset, and the audit log file
is displayed. The restore privilege is configured for success as indicated by Access
Granted=yes. However, after the audit unset success_privilege command is run
for the restore privilege, access attempts with the restore privilege are no longer
posted to the audit log when they successfully complete. With this command, you are
removing the NAS Gateway’s ability to track successful file access attempts for events
that require the restore privilege. A subsequent display of the audit log file would
show no further entries for the restore privilege, as shown in the following example
display:
eng31 PUBSTEST>
In this example display, the first audit entry, which is a configuration record, indicates
that the administrator changed the auditing configuration as shown by Audit modify.
This entry notes the issuance of the audit unset success_privilege command.
Because the command completed, access attempts that require the restore privilege are
no longer posted to the audit log on successful completion.
Note!
When you unset a success privilege and you have no failure privilege
configured, no auditing for that privilege occurs, which leaves you unable to
track file or directory access for that privilege.
Related Commands
audit unset fail_privilege Unsets the audit event logging for failures
associated with specific privileges.
Synopsis
autosupport clear statistics
Description
The ONStor™ NAS Gateway tracks the occurrences of system events in the
Autosupport Statistics Summary. The statistics are tracked in runtime, so if the NAS
Gateway is reset, the statistics automatically reset to zero and begin incrementing
again. However, you can manually reset the statistics by running the autosupport
clear statistics command. This command sets all the autosupport statistics
counters to zero so that they can begin incrementing again whenever a system event
occurs.
Example
Related Commands
autosupport show statistics Shows autosupport statistics.
Synopsis
autosupport emrs proxy disable
Description
You can disable proxy support for the EMRS feature at any time by running the
autosupport emrs proxy disable command. This command deactivates the
transmission of EMRS information through any configured proxy. When the proxy is
disabled, the NAS Gateway transmits the information directly to the ONStor secure
server. For details about the EMRS feature, see “Autosupport EMRS Proxy Enable”
on page 4-3.
Example
In the following example, the EMRS information is no longer transmitted from the
proxy.
Related Commands
autosupport emrs proxy enable Enables proxy support for the EMRS
information.
autosupport emrs show config Shows the configuration of the EMRS
information.
Synopsis
autosupport emrs proxy enable -i IPADDR -p PORT [-u USER -P
PASSWORD]
Description
The EMRS feature lets you transmit configuration information and performance
statistics through HTTPS from a NAS Gateway to a secure server at ONStor. The
EMRS feature facilitates diagnosing and troubleshooting the NAS Gateway. You can
use the autosupport emrs proxy enable command to set up a proxy for routing
traffic to the Internet. By default the proxy is disabled.
By default, the EMRS feature transmits information to the secure ONStor server in
any of the following ways:
• The information transfer is initiated by the administrator with the output of the
system get command. This type of information transfer requires an ONStor
Customer Support case number before you can upload the information to the
ONStor server, so you need to open a case with ONStor Customer Support.
• The information is transferred nightly at midnight through a cron job.
• The information transfer is initiated by selected system events. The information is
sent to the ONStor secure server asynchronously after CPU events occur. The
information is transmitted when a CPU reboots.
When you configure the settings for the EMRS feature, the information is written into
the cluster database, so all NAS Gateways in a cluster use the same information.
However, information is collected and transmitted separately for each NAS Gateway
in a cluster, so in a multinode cluster you need to run the system get command for
each NAS Gateway in the cluster.
Consider the following prerequisites for using the EMRS feature:
• Your network needs to support HTTPS traffic to the Internet.
• You need to have administrator privileges on the NAS Gateway and in your
network.
• If your network uses a proxy to route traffic to the Internet, you need the proxy’s IP
address, the port number that supports traffic, and any user name and password
required to access the proxy.
Options
Table 4-1 : Options for the autosupport emrs proxy enable command
Example
In the this example, the NAS Gateway is configured to use the network device at
10.1.2.15 as a proxy and port 9000 to send EMRS information to the proxy. The NAS
Gateway accesses the proxy with the user name netadmin5 and the password phpass.
Related Commands
autosupport emrs proxy disable Disables proxy support for the EMRS feature.
autosupport emrs show config Shows the configuration of the EMRS feature.
Synopsis
autosupport emrs send disable
Description
By default the EMRS feature is enabled. But you can explicitly disable this feature by
using the autosupport emrs send disable command. When you disable the
EMRS feature, the NAS Gateway stops sending system information through nightly or
event-initiated uploads to the ONStor server, and the EMRS configuration is removed
from the cluster. For more details about the EMRS feature, see “Autosupport EMRS
Proxy Enable” on page 4-3.
Example
In the following example, the EMRS feature is disabled.
Related Commands
autosupport emrs send enable Enables the EMRS feature.
autosupport emrs show config Shows the configuration of the EMRS feature.
Synopsis
autosupport emrs send enable
Description
By default the EMRS feature is enabled. But if this feature is disabled, you can
explicitly enable it with the autosupport emrs send enable command. For more
details about the EMRS feature, see “Autosupport EMRS Proxy Enable” on page 4-3.
Example
In the following example, the EMRS feature is enabled.
Related Commands
autosupport emrs send disable Disables the EMRS feature.
autosupport emrs show config Shows the configuration of the EMRS feature.
Synopsis
autosupport emrs show config
Description
Use the autosupport emrs show config command to display the configuration
information of the EMRS feature. The output of this command shows the current
settings and operational state of the EMRS feature configured on a NAS Gateway. For
more details about the EMRS feature, see “Autosupport EMRS Proxy Enable” on
page 4-3.
Example
This example displays the following EMRS configuration for NAS Gateway eng63>:
• The EMRS feature is enabled.
• A proxy server for transmitting EMRS information to the ONStor secure server is
enabled.
• The IP address of the proxy server is 192.168.1.101.
• The proxy port on which the NAS Gateway transmits the EMRS information is
8095.
• The user name that the NAS Gateway uses to access the proxy server is netadmin5.
• The password that the NAS Gateway uses to authenticate with the proxy server is
entered. For security reasons, the actual password is replaced by five asterisks (*)
representing the password.
Note!
If no proxy server is configured, the display shows an asterisk (*) next to each
proxy parameter field.
Related Commands
autosupport emrs send disable Disables the EMRS feature.
autosupport emrs send enable Enables the EMRS feature.
Synopsis
autosupport email from EMAIL
Description
You can configure the address from which you are sending autosupport email by
running the autosupport email from command.
Note!
You can specify only one email ID in the EMAIL field.
If you don’t configure the email address, it defaults to the NAS Gateway node name.
Options
The EMAIL variable is the email address from which all
autosupport email is being sent on generation of important events
and on demand. You can enter any email address.
Example
Related Commands
autosupport email noteto Specifies the email address to send a brief
autosupport note.
autosupport email to Specifies the email address of the recipient.
autosupport show config Shows current autosupport configuration
information.
Synopsis
autosupport email noteto EMAIL
Description
The autosupport feature supports sending an email note when certain critical events
occur. For more information, see the ONStor Bobcat 2200 Series NAS Gateway System
Administrator’s Guide.
Options
The EMAIL variable is the email address of your administrator or
ONStor support contact who is managing the NAS Gateway.
Type a valid email address from 1 to 256 characters, including the
email suffix. The NAS Gateway supports all common domain
suffixes, such as .com, .org, .gov, and .edu.
The email address does not have to exist prior to entering it as
part of the autosupport feature. However, the email alias needs to
exist for the NAS Gateway to successfully forward the
notification messages. If you intend to configure the autosupport
email address first, then create the actual email address later,
make sure that the address you type on the NAS Gateway
matches with the email address that you will later configure.
Example
Related Commands
autosupport email to Specifies the email address to send a detailed
autosupport note.
autosupport generate report Generates and sends instant autosupport report.
autosupport show config Shows current autosupport configuration
information.
autosupport show statistics Shows autosupport statistics.
Autosupport Email To
Synopsis
autosupport email to EMAIL
Description
The autosupport feature supports sending an email notification, which is a detailed
message about any of the following events that occur in runtime:
• Node failures or resets
• Card failures or resets
• CPU failures or resets
• Volume failures or volume space violations
Options
The EMAIL variable is the email address of your administrator or
ONStor support contact who is managing the NAS Gateway.
Type a valid email address from 1 to 256 characters, including the
email suffix. The NAS Gateway supports all common domain
suffixes, such as .com, .org, .gov, and .edu.
The email address does not have to exist prior to entering it as
part of the autosupport feature. However, the email address needs
to exist for the NAS Gateway to successfully forward the
notification messages. If you intend to configure the autosupport
email address first, then create the actual email address later,
make sure that the address you type on the NAS Gateway
matches with the email address that you will later configure.
Example
Related Commands
autosupport email noteto Specifies the email address to send a brief
autosupport note.
Synopsis
autosupport email server SERVER
Description
You can configure the simple mail transfer protocol (SMTP) server to which to direct
autosupport emails by specifying the IP address of the SMTP server. To configure the
SMTP server to which to route autosupport emails run the autosupport email server
command.
The default mail server is automatically determined using DNS MX records, so run
this command only when you want to override the default SMTP server.
Options
The SERVER variable is the IP address of the SMTP server to
which to route autosupport email. To specify the default IP
address use 0.0.0.0.
Related Commands
autosupport email to Specifies the email address to send a detailed
autosupport note.
autosupport show config Shows current autosupport configuration
information.
Synopsis
autosupport generate report
Description
The autosupport generate report command instantly generates an autosupport
report and sends it to the emailto and noteto addresses configured to receive it. This is
also known as on-demand autosupport report generation. You can schedule
autosupport reports to occur at regular intervals with the autosupport schedule
command. For details see “Autosupport Schedule” on page 4-14.
Example
Related Commands
autosupport email to Specifies the email address to send a detailed
autosupport note.
autosupport email noteto Specifies the therefore address to send a brief
autosupport note.
autosupport show config Shows current autosupport configuration
information.
autosupport show statistics Shows autosupport statistics.
Autosupport Schedule
Synopsis
autosupport schedule [-m MINUTE] [-h HOUR] [-d DATE] [-M MONTH] [-
D DAY]
Description
You can schedule autosupport reports to occur at regular intervals by running the
autosupport schedule command. Use this command to create a schedule of times at
which the report is generated. With this command, you can set the following
parameters for system report generation:
• The minutes, between 0 and 59, of the hour at which to generate the system report.
• The hour, from 0 to 23, at which to generate the system report. Hours start at
midnight, which is hour 0, and increment sequentially until 23, which is 11 p.m.
• The date on which to generate a report.
• The month, from 1 to 12, in which to generate the system report. Month 1 is
January, and months increment sequentially to month 12, which is December.
• The day, from 1 to 7, on which to generate the system report. Day 1 is Sunday, and
days increment sequentially to day 7, which is Saturday.
Note!
At initial configuration, all parameters in the autosupport parameters are
configured with no specific value. Instead, they are configured with an asterisk
(*) which indicates that the autosupport feature report can occur at all times in
the range. For example, when the minutes field contains *, the reports are
generated every minute. When the hour field contains *, the reports are
generated every hour. If all fields contain *, reports are generated every minute
of every hour of every day in every month on any date. This default
configuration can cause numerous e-mails. ONStor recommends that you
configure the autosupport schedule with custom values before enabling the
autosupport feature. To return the report schedule to its defaults, run the
autosupport schedule command with all parameters as asterisks.
Options
Table 4-2 : Options for the autosupport schedule command
Example
In the following example, the autosupport report schedule is configured with custom
values.
In the following example, the autosupport report schedule is configured with custom
values.
According to this schedule, the autosupport reports are forwarded to an email at 12:45
a.m. and 12:45 p.m., on the first, fifteenth, and thirtieth day of every month. Details of
the schedule are as follows:
• -m 45 indicates that the report occurs at the 45th minute of the hour.
• -h 0,12 indicates that the report occurs at midnight and noon.
• -d 1,15,30 indicates that the report occurs on day 1, 15, and 30 of the month.
• No value is specified for the month, so reports occurs every month in the year.
• No value was configured for the day, so the report occurs every day of the week.
In the following example, the autosupport report schedule is configured with default
values.
According to this schedule, the autosupport reports are forwarded to an email every
minute. Details of the schedule are as follows:
• -m * indicates that the reports is forwarded every minute in the hour.
• -h * indicates that the reports is forwarded every hour of the day.
• -d * indicates that the reports is forwarded every date in the month.
• -M * indicates that the reports is forwarded every month in the year.
• -D * indicates that the reports is forwarded every day in the week.
Related Commands
autosupport show config Shows the current autosupport configuration.
Synopsis
autosupport show config
Description
The NAS Gateway stores the configured autosupport parameters in memory as the
Autosupport Configuration List. You can view the autosupport configuration at any
time, by running the autosupport show config command. This command shows the
autosupport configuration on the local node only.
Example
This example shows the autosupport configuration list. This list shows the following
parameters:
• The operational state, either enabled or disabled, for the NAS Gateway’s
autosupport feature.
• The configured email address for autosupport notifications.
• The noteto is used as a CC.
• The autosupport schedule’s configured parameters.
• min shows the minutes at which the report is forwarded to a configured email. If
min contains an asterisk, the report is generated at every minute in the hour.
• hour shows the hours at which the report is forwarded to a configured email. If
hour contains an asterisk, the report is forwarded every hour.
• date shows the days in the month at which the report is forwarded to a configured
email. If date contains an asterisk, the report is forwarded every day in the month.
• month shows the months at which the report is forwarded to a configured email. If
month contains an asterisk, the report is forwarded every month of the year.
• day shows the days in the week at which the report is forwarded to a configured
email. If day contains an asterisk, the report is forwarded every day of the week.
In this example, the schedule is configured to forward the autosupport reports at 12:45
a.m. and 12:45 p.m. of the 1st, 15th, and 30th of every month regardless of the day in
the week.
Synopsis
autosupport show statistics
Description
The NAS Gateway tracks performance and operation statistics for the system events it
encounters. These statistics are listed in the autosupport statistics summary. The
autosupport statistics are gathered in realtime whenever the system event is forwarded
to the administrator in a notification or a note. The statistics are tracked in runtime, so
if the NAS Gateway is reset, the statistics reset to zero and begin incrementing again
whenever a system event occurs. You can clear statistics by running the autosupport
clear statistics command.
Example
In this example, the autosupport statistics summary is displaying the following system
events.
In addition to the listed statistics, this display shows when the event last occurred or
the NAS Gateway was last reset:
• The number of node failures or resets
• The number of primary cluster controller (PCC) failures or resets.
• The number of secondary cluster controller (SCC) failures or resets.
• The number of card failures or resets.
• The number of CPU failures or resets.
• The number of logical volume failures or volume space violations.
• The number of IP interface failures or resets.
• The number of port failures or resets.
• The number of NFS file access protocol failures, resets, or violations.
• The number of route flaps, resets, or losses.
• The number of times a file system quota rebuild was started.
• The number of times a file system quota rebuild was completed.
• The number of times a file system quota rebuild was cancelled.
• The number of times a file system quota tree was enabled.
• The number of times a file system quota tree was disabled.
• The number of times a warning level for the file system quota tree was set.
• The number of times a limit for the file system quota tree was set.
• The number of times a file system user quota was enabled.
• The number of times a file system user quota was disabled.
• The number of times a warning level for the file system user quota was set.
• The number of times a limit for the file system user quota was set.
• The number of times a file system group quota was enabled.
• The number of times a file system group quota was disabled.
• The number of times a warning level for the file system group quota was set.
• The number of times a limit for the file system group quota was set.
• Mkfs show the number of volume creations.
• The number of ID mapping events.
• The number of privilege events.
• The number of virtual server events.
• the number of core dump events.
• The number of power supply events.
• The number of domain events.
• The number of cluster database version changes.
• The number of temperature changes.
• The number of fan failures and resets.
• The number of domain name service (DNS) events.
Related Commands
autosupport show config Shows current autosupport configuration.
Synopsis
autosupport state enable|disable
Description
You can enable or disable autosupport. When the autosupport feature is disabled, the
NAS Gateway does not forward autosupport email notifications or notes, and reports
are not written nor are existing reports available for viewing. No statistics are tracked
when autosupport is disabled.
If autosupport is enabled, and you disable it, the NAS Gateway retains all the
configured autosupport parameters for when you reenable the feature. You can enable
or disable the autosupport feature by running the autosupport state command.
Autosupport is disabled by default.
Options
The enable|disable options specify the operational state that you
are setting for the autosupport feature. Enable activates the
autosupport feature. Disable deactivates the autosupport feature.
Autosupport is disabled by default.
Example
In the following example, the autosupport feature is enabled.
The autosupport feature begins forwarding notes and notifications to any configured
email address at the times specified in the autosupport schedule. While autosupport is
enabled, all configured autosupport features and statistics are operational.
In the following example the autosupport feature is disabled.
Related Commands
autosupport show config Shows current autosupport configuration.
Synopsis
cifs server create NAME
Description
You can add a CIFS server to a virtual server with the cifs server create command
at any time. You need to be in the virtual server context. The virtual server does not
need to be disabled to do this.
The intent of this command is to add additional network names to a virtual server so
that you can use any one of them to reach the CIFS shares.
Options
The NAME variable is the name of the CIFS server to add.
Example
In this example, the CIFS server cifsserver2 is created for the virtual server
techpubsvs.
Related Commands
cifs server delete Delete a CIFS server name.
cifs server show Show the list of CIFS server names.
Synopsis
cifs server delete NAME
Description
You can delete a CIFS server from a virtual server with the cifs server delete
command at any time. You need to be in the virtual server context, and the virtual
server does not need to be disabled to do this.
Options
The NAME variable is the name of the CIFS server to delete.
Example
In this example, the CIFS server cifsserver2 is deleted from the virtual server
techpubsvs.
Related Commands
cifs server create Add a CIFS server name.
cifs server show Show the list of CIFS server names.
Synopsis
cifs server show
Description
You can display a list of CIFS servers for a virtual server with the cifs server show
command at any time. You need to be in the virtual server context, and the virtual
server does not need to be disabled to do this.
Example
eng46 TECHPUBSVS>
This example shows a list of CIFS servers for the virtual server techpubsvs.
Related Commands
cifs server create Add a CIFS server name.
cifs server delete Delete a CIFS server name.
Synopsis
cifs share add VOLNAME SHARENAME PATHNAME [-A
DOMAIN\USERGROUP:AUDITTYPE:RIGHTS] [-a ACCESSBASEDENUM] [-c
COMMENT] [-d DOMAIN\USERGROUP:RIGHTS] [-g
DOMAIN\USERGROUP:RIGHTS] [-o CACHING] [-s SESSIONS] [-w
WIDELINKS]
Description
CIFS advertises file systems. The share consists of the following parts:
• The volume that is shared with clients.
• The name of the share.
• The path to the volume and directory that is shared with the clients. The directory
that you reference with the path needs to exist in the file system.
• The access control rights.
Table 5-1 : Options for the cifs share add command (Continued)
Table 5-1 : Options for the cifs share add command (Continued)
Table 5-1 : Options for the cifs share add command (Continued)
Table 5-1 : Options for the cifs share add command (Continued)
Table 5-1 : Options for the cifs share add command (Continued)
Table 5-1 : Options for the cifs share add command (Continued)
The -A, -d, and -g options can appear multiple times to build a larger ACL.
Note!
This command supports a maximum of 25 arguments.
Example
In this example, the virtual server pubstest3 is configured with a CIFS share. The
directory \techpubs on the volume pubstest is shared through the share techpubs.
Related Commands
cifs share delete Deletes a share.
cifs share modify Modifies a share.
cifs show Displays the share names of all exported file
systems and show information on the specified
share.
vol create Creates a logical volume, brings it online,
creates and mounts a file.
Synopsis
cifs share delete SHARENAME
Description
You can delete a CIFS share at any time by running the cifs share delete
command. This command deletes the share, and the shared file system resource
becomes unavailable.
Note!
You cannot delete the system hidden share IPC$.
Options
The SHARENAME variable is an alphanumeric character string of
up to 128 characters that describes the share that you want to
delete.
Example
In this example, the CIFS share techpubs is deleted. Any resource that was shared
through techpubs is no longer available through that share. However, if a different
share is configured to export the resource, it is available to the clients through that
alternate share.
Related Commands
cifs share add Adds a specified share or path for CIFS users.
Synopsis
cifs share modify SHARENAME [-A
DOMAIN\USERGROUP:AUDITTYPE:RIGHTS] [-a ACCESSBASEDENUM] [-c
COMMENT] [-d DOMAIN\USERGROUP:RIGHTS] [-g
DOMAIN\USERGROUP:RIGHTS] [-o CACHING] [-R
DOMAIN\USERGROUP:AUDITTYPE] [-r DOMAIN\USERGROUP] [-s SESSIONS]
[-w WIDELINKS]
Description
The NAS Gateway supports the Microsoft Windows feature access-based enumeration
(ABE) of CIFS shares.
With this feature, more control exists over what users see when they enumerate a
directory to only those files and directories for which they have
FILE_GENERIC_READ rights. ABE provides more security. For more information
about access based enumeration, you can search the Microsoft web site. You can use
the cifs share modify command to enable or disable ABE on a CIFS share. By
default ABE is disabled.
Options
Table 5-2 : Option for the cifs share modify command
Table 5-2 : Option for the cifs share modify command (Continued)
Table 5-2 : Option for the cifs share modify command (Continued)
Table 5-2 : Option for the cifs share modify command (Continued)
Table 5-2 : Option for the cifs share modify command (Continued)
Table 5-2 : Option for the cifs share modify command (Continued)
Table 5-2 : Option for the cifs share modify command (Continued)
Example
Related Commands
cifs share add Adds a share name for the specified path.
cifs share delete Deletes a share.
cifs show Displays the share names of all
exported file systems and shows
information on the specified share.
vol create Creates a logical volume, brings it online,
creates and mounts a file.
volume share export Exports shares from a volume to a file.
volume share import Imports share from a file to a volume.
CIFS Show
Synopsis
cifs show [SHARENAME]|[all]|[-v VOLNAME [-P PAGENUMBER [-S PAGESIZE]]]
Description
When you configure a CIFS share, it is added to a list of shares. This list contains the
share definition and path and parameter information for the share. SHARENAME
displays information about a specific share.
The shares list shows regular file system shares and shares that are hidden from
clients. A dollar sign ($) indicates that a share is hidden from clients. The NAS
Gateway supports the IPC$ share by default.
Note!
You can view the list of configured shares through standard CIFS client
browsing, for example, through the Network Neighborhood display when
using a Windows client. The resulting list of Network Places is the contents of
the CIFS shares list.
Options
Table 5-3 : Options for the cifs show command
Example
In the following example, all shares configured in the virtual server are displayed.
In this example, the virtual server pubstest3 is configured with a CIFS share. Because
the command does not include a specific share name, the NAS Gateway shows all the
shares configured in the virtual server, including the hidden shares IPC$ and VSCAN$
(for virus scanning).
This example shows detailed information for the share sharenewx, which includes the
following information:
• The name of the share
• The name of the volume that is shared
• The path to the volume that is shared
• An optional comment
• The session limit
• The caching option
• Additional options
• The security level
• The ACL
Related Commands
cifs server Manage CIFS sever names on a virtual server.
cifs share add Add a share for the specified path.
cifs share modify Modifies a share.
Synopsis
gns add dir cifs ROOTNAME\PATH [-d DOMAIN\USERGROUP:RIGHTS]
[-g DOMAIN\USERGROUP:RIGHTS]
Description
This command adds a new global name space directory to every virtual server.
Options
Table 6-1 : Options for the gns add directory command
Table 6-1 : Options for the gns add directory command (Continued)
Table 6-1 : Options for the gns add directory command (Continued)
Example
The following example adds the global name space directory maryroot3\dirtest.
Related Commands
gns delete cifs Deletes a CIFS global name space object.
gns modify dir cifs Modifies a CIFS virtual directory in the global
name space.
gns show cifs Displays CIFS global name space objects.
Synopsis
gns add junction cifs ROOTNAME\PATH [-t TARGET]
Description
This command adds a new global name space junction to every virtual server.
Options
Table 6-2 : Options for the gns add junction command
Table 6-2 : Options for the gns add junction command (Continued)
Example
The following example adds a junction with a ROOTNAME\PATH of
maryroot5\junction1 and with a target path of \\eng61-vs1\share1.
Related Commands
gns delete cifs Deletes a CIFS global name space object.
gns modify junction cifs Modifies a CIFS junction in the global name
space.
cifs share add Adds a share name for the specified path.
cifs share modify Modifies a share.
Synopsis
gns add root cifs ROOTNAME [-a ACCESSBASEDENUM] [-c COMMENT]
[-d DOMAIN\USERGROUP:RIGHTS] [-g DOMAIN\USERGROUP:RIGHTS]
[-o CACHING]
Description
A GNS root is logically the top of the global name space. There can be more than one
GNS root, such as one for Marketing and another for Engineering. Each one might
lead to a different, but overlapping, set of virtual servers and shares.
This command creates a new GNS root that is exported by every virtual server in the
cluster as the CIFS share \\vsvr\ROOTNAME.
Options
Table 6-3 : Options for the gns add root command
Table 6-3 : Options for the gns add root command (Continued)
Table 6-3 : Options for the gns add root command (Continued)
Table 6-3 : Options for the gns add root command (Continued)
Example
The following example adds root pubroot, denies read rights for matrix\grouptest1 and
grants read rights for matrix\domain users.
Related Commands
gns delete cifs Deletes a CIFS global name space object.
gns modify root cifs Modifies a CIFS global name space root.
gns show cifs Displays CIFS global name space objects.
GNS Delete
Synopsis
gns delete cifs ROOTNAME[\PATH] [-r]
Description
This command deletes global name space objects.
Options
Table 6-4 : Options for gns delete command
Example
The following example deletes maryroot3\dirtest and uses the -r recursive option.
Related Commands
gns add dir cifs Adds a CIFS virtual directory to the global name
space.
gns add junction cifs Adds a CIFS junction to the global name space
gns add root cifs Adds a CIFS Root to the global name space.
Synopsis
gns modify dir cifs ROOTNAME\PATH [-d DOMAIN\USERGROUP:RIGHTS]
[-g DOMAIN\USERGROUP:RIGHTS] [-n NEWNAME]
[-r DOMAIN\USERGROUP]
Description
This command modifies a global name space directory in every virtual server.
Options
Table 6-5 : Options for the gns modify directory command
Table 6-5 : Options for the gns modify directory command (Continued)
Table 6-5 : Options for the gns modify directory command (Continued)
Table 6-5 : Options for the gns modify directory command (Continued)
Example
The following example renames dir1 to newDir.
Related Commands
gns add dir cifs Adds a CIFS virtual directory to the global name
space.
gns delete cifs Deletes a CIFS global name space object.
gns show cifs Displays CIFS global name space objects.
Synopsis
gns modify junction cifs ROOTNAME\PATH [-n NEWNAME] [-r TARGET]
[-t TARGET]
Description
Modifies a CIFS junction in the global name space.
Options
Table 6-6 : Options for the gns modify junction command
Table 6-6 : Options for the gns modify junction command (Continued)
Table 6-6 : Options for the gns modify junction command (Continued)
Example
The following example adds a target.
Related Commands
cifs share add Adds a share name for the specified path.
cifs share modify Modifies a share.
gns add junction cifs Adds a CIFS junction to the global name space.
gns delete cifs Deletes a CIFS global name space object.
gns show cifs Displays CIFS global name space objects.
Synopsis
gns modify root cifs ROOTNAME [-a ACCESSBASEDENUM] [-c COMMENT]
[-d DOMAIN\USERGROUP:RIGHTS] [-g DOMAIN\USERGROUP:RIGHTS]
[-n NEWNAME] [-o CACHING] [-r DOMAIN\USERGROUP]
Description
This command modifies the global name space root.
Options
Table 6-7 : Options for the gns modify root command
Table 6-7 : Options for the gns modify root command (Continued)
Table 6-7 : Options for the gns modify root command (Continued)
Table 6-7 : Options for the gns modify root command (Continued)
Table 6-7 : Options for the gns modify root command (Continued)
Table 6-7 : Options for the gns modify root command (Continued)
Example
The following example sets the caching option to programs.
Related Commands
gns add root cifs Adds a CIFS Root to the global name space.
GNS Show
Synopsis
gns show cifs [all|ROOTNAME[\PATH]]
Description
This command displays information about global name space objects.
If ROOTNAME is omitted, or all is specified, the names of all the roots are displayed.
If ROOTNAME is provided and PATH is omitted the detailed information about the root,
including the comment, the ACL, and the list of child GNS objects is displayed. For
each child object the name and the object type, either virtual directory or junction, is
displayed.
If ROOTNAME and PATH are provided and they refer to a virtual directory detailed
information about the directory including the ACL and the list of child GNS objects is
displayed. For each child object the name and the object type, either virtual directory
or junction, is displayed.
If ROOTNAME and PATH are provided and they refer to a junction, the list of target
paths to which this junction points is displayed.
Note!
If the virtual server context is not set it may not be possible to convert the
security information into normal user and group names.
Options
Table 6-8 : Options for the gns show command
Example
The following example displays the names of all the roots.
The following example shows detailed information about ROOTNAME maryroot5 and
PATH dir3.
Related Commands
gns add dir cifs Adds a CIFS virtual directory to the global name
space.
gns add junction cifs Adds a CIFS junction to the global name space.
gns add root cifs Adds a CIFS Root to the global name space.
Synopsis
cluster add nasgateway NASGATEWAYNAME -a IPADDR
Description
By default, each ONStor™ NAS Gateway is its own cluster of one. In this
configuration each individual NAS Gateway is its own cluster controller and cluster
node, and each NAS Gateway maintains its own cluster database.
However, you can create a cluster of multiple NAS Gateways by adding NAS
Gateways with the cluster add nasgateway command. The cluster creation process
for multiple NAS Gateways involves configuring one NAS Gateway, then adding
other NAS Gateways to the cluster. In this configuration the following occurs:
• The cluster adopts the node name of the NAS Gateway on which you configure the
cluster.
• The cluster controller is elected after you run the cluster commit command.
• Each NAS Gateway you add to the cluster synchronizes with the cluster controller
and updates its cluster database.
With the cluster add nasgateway command, you can specify the node name of the
NAS Gateway to be added and posts its name in the cluster member list. The node
name is configured as part of the start script the first time you turn on the NAS
Gateway.
To make the NAS Gateway active in the cluster run the cluster commit command.
When this command completes, one cluster controller is elected from the nodes, and
all nodes in the cluster become active.
Options
Table 7-1 : Options for the cluster add nasgateway command
Example
In this example, the NAS Gateway Falcon is added to the cluster. The NAS Gateway’s
IP address is also specified to enable addition of the NAS Gateway to a cluster where
DNS is not active to resolve the node name Falcon.
Related Commands
cluster commit Commits changes made to a cluster.
cluster uncommit Uncommits changes made to a cluster.
cluster delete nasgateway Removes a NAS Gateway from a cluster.
Synopsis
cluster add group GROUPNAME
Description
NAS Gateway groups are subgroups within the cluster. Each NAS Gateway group can
contain one or more NAS Gateways that are manually added to the NAS Gateway
group. A NAS Gateway group is not mandatory, but it is helpful if you want to
configure and manage some NAS Gateways in the cluster differently than others. NAS
Gateway group boundaries are strictly enforced with the exception of control
messages, such as the synchronization of the cluster database between the cluster
controller and the nodes in the cluster. Failover of virtual servers need to respect the
NAS Gateway group boundaries, so virtual servers can fail over only within their
respective NAS Gateway group. Each cluster can support a maximum of four Gateway
groups, excluding the default group. You can add NAS Gateways to a group any time
after you have configured the group.
Options
The GROUPNAME variable is the name of the NAS Gateway
group that you are adding to the cluster. Group names can have up
to 64 alphabetic characters.
Example
In this example, the NAS Gateway group birdsofprey is added to the cluster.
Related Commands
cluster delete group Removes a NAS Gateway group from cluster.
cluster show group Shows NAS Gateway group configuration.
Cluster Commit
Synopsis
cluster commit
Description
Cluster parameters do not have to be active for you to be able to configure them. To
make cluster parameters active in the cluster database after you have configured them,
run the cluster commit command. For example, if you run the cluster add
nasgateway command, that command issues on the cluster node. However, the
command is not written to the cluster database and made active to the rest of the nodes
in the cluster until you run the cluster commit command.
Some cluster commands require the cluster commit command. The following table
shows each cluster command and whether it requires the cluster commit command.
Table 7-2 : Commands requiring cluster commit
Example
In this example, the cluster commit command activates the cluster configuration.
Related Commands
cluster add nasgateway Adds a NAS Gateway to a cluster.
cluster delete nasgateway Removes a NAS Gateway from a cluster.
cluster uncommit Uncommits changes made to a cluster.
Synopsis
cluster delete nasgateway NASGATEWAYNAME -a IPADDR
Description
When you delete a NAS Gateway from a cluster, it is removed from the cluster and its
node name is removed from the cluster members list. Therefore, the deleted NAS
Gateway no longer participates in the cluster. You can delete a NAS Gateway by
running the cluster delete nasgateway command.
Removing a NAS Gateway from a cluster with the cluster delete nasgateway
command causes the NAS Gateway to restart only . When the NAS Gateway restarts,
it deletes all configuration information from its cluster database, except the IP
interface configuration for the system switch and controller (SSC) ports and network
time protocol (NTP) configuration.
Note!
If the NAS gateway being deleted was servicing virtual servers, they do not
failover to another node in the cluster. They have to be moved prior to deleting
the NAS gateway
Options
Table 7-3 : Options for the cluster delete nasgateway command
Optio
Object Description
n
Example
In this example, the NAS Gateway Falcon is deleted from the cluster. In this example,
the NAS Gateway’s IP address is also being specified to enable deletion of the NAS
Gateway from a cluster where DNS is not active to resolve the node name Falcon.
Note!
To proceed with the deletion, do not forget to run cluster commit after
cluster delete nasgateway.
Related Commands
cluster commit Commits changes made to a cluster.
Synopsis
cluster delete group GROUPNAME
Description
You can delete a NAS Gateway group from a cluster by running the cluster delete
group command. You cannot delete a NAS Gateway group if it still contains NAS
Gateways. If you attempt to delete a NAS Gateway group that is not empty, the NAS
Gateway posts an error message stating that the requested operation failed because the
NAS Gateway group is not empty.
Options
The GROUPNAME variable is the name of the NAS Gateway
group that you are deleting from the cluster. Group names can
have up to 64 alphabetic characters.
Example
In this example, the NAS Gateway group birdsofprey is deleted from the cluster. If you
have previously deleted all NAS Gateways from the group birdsofprey with the
cluster delete nasgateway command, the NAS Gateway group birdsofprey is
deleted when the cluster delete group command completes.
Related Commands
cluster add group Creates a NAS Gateway group within cluster.
cluster show group Shows NAS Gateway group configuration.
cluster move nasgateway Moves a NAS Gateway from one NAS Gateway
group to another.
Synopsis
cluster move nasgateway NASGATEWAYNAME -g GROUPNAME [-a]
Description
You can move a NAS Gateway from one NAS Gateway group into another NAS
Gateway group by running the cluster move nasgateway command. Virtual servers,
except for the management virtual server, stay with the current NAS Gateway group
unless you specify that they be moved to the destination NAS Gateway group.
Options
Table 7-4 : Options for the cluster move nasgateway command
Example
In this example, the NAS Gateway nasgateway1 is moved to NAS Gateway group
nasgatewaygroup1 along with all virtual servers that belong to the NAS Gateway that
is moved.
Related Commands
cluster add group Creates a NAS Gateway group within a cluster.
cluster commit Commits changes made to the cluster.
cluster delete group Removes a NAS Gateway group from a cluster.
cluster show group Displays the NAS Gateway group configuration.
Synopsis
cluster show cluster
Description
You can display the cluster configuration at any time by running the cluster show
cluster command. Cluster configuration is the result of parameters you configured
and activated with the cluster commit command. If you configure cluster
parameters, but do not run the cluster commit command, the parameters do not
activate, so they do not appear in the cluster configuration.
Because each NAS Gateway in the cluster contains an identical version of the cluster
database, you can run the cluster show cluster command on any NAS Gateway in
the cluster and you will see the same information.
Example
The following example shows information for a multiple NAS Gateway cluster.
The cluster show cluster command also contains a table of information about the
nodes that are participating in the cluster. The table shows the following information
for the cluster’s nodes:
• NAS Gateways shows the node names of the NAS Gateways that are configured in
the cluster. Those node names are added to this display when you run the cluster
commit command.
• IP shows the IP address on which each NAS Gateway is configured. The address
shown is the SSC management port address that was assigned during the OCT, or
through the interface modify sc1 or sc2 command.
• State shows the current operational state of each NAS Gateway in the cluster. Valid
states are UP for a NAS Gateway that is online in the cluster as a cluster node, or
DOWN for a NAS Gateway that is restarting or offline as a cluster node.
• PCC shows each NAS Gateway’s state as a cluster controller in the cluster. Valid
values are NO for a NAS Gateway that has not been elected the role of cluster
controller, or YES for a NAS Gateway that has been elected the role of cluster
controller.
The following example shows information for a cluster of one NAS Gateway.
Related Commands
cluster add nasgateway Adds a NAS Gateway.
cluster commit Commits changes made to a cluster.
cluster delete nasgateway Deletes a NAS Gateway.
Synopsis
cluster show group
Description
At any time, you can display the configuration of the NAS Gateway group in which
the current NAS Gateway resides. The NAS Gateway group configuration shows
information about all NAS Gateway groups that are configured in the cluster and lists
all the NAS Gateways that are configured in each NAS Gateway group. You can
display the NAS Gateway groups configured in the cluster by running the cluster
show group command. This command shows the following information:
Example
In this example, the NAS Gateway groups configured in the cluster are displayed. In
this example, the cluster contains the NAS Gateway group default. This NAS Gateway
group contains two NAS Gateways listed by name, eng57 and virtual-filer.
Related Commands
cluster add group Creates a NAS Gateway group within a cluster.
cluster delete group Removes a NAS Gateway group from a cluster.
cluster move nasgateway Moves a NAS Gateway from one NAS Gateway
group to another.
Synopsis
cluster show summary
Description
At any time, you can use the cluster show summary to find out the information about
the current cluster. You can use the cluster show summary command to display
the following information:
• Number of NAS Gateways in the cluster
Example
In this example, the cluster show summary command shows the summary of the
current cluster configuration.
Related Commands
cluster show cluster Displays cluster configuration..
system show summary Displays the NAS Gateway configuration
summary.
Cluster Uncommit
Synopsis
cluster uncommit
Description
If yo have configured cluster parameters but not yet committed them to the cluster
database, you can delete the uncommitted parameters by running the cluster
uncommit command. When parameters are uncommitted, they are not active on the
node, and they are not propagated into the cluster database.
Note!
The cluster uncommit command does not remove parameters that have
already been committed to the cluster database. To change a committed cluster
database parameter, run the related cluster command, then run the cluster
commit command.
Some cluster commands require the cluster uncommit command to invalidate their
settings if they have already been committed. The following table lists each cluster
command and indicates which commands require a cluster uncommit command to
change.
Table 7-5 : Commands Requiring Cluster Uncommit
Example
Related Commands
cluster commit Commits changes made to a cluster.
cluster delete nasgateway Deletes a NAS Gateway.
cluster add nasgateway Adds a NAS Gateway.
Synopsis
domain add ldap DOMAINNAME SERVER_URIS DEFAULT_BASE_SCOPE
[-u LOGIN_DN] [-p PASSWORD_BASE_SCOPE][-g GROUP_BASE_SCOPE]
[-h HOST_BASE_SCOPE] [-n NETGROUP_BASE_SCOPE]
Description
You can add an LDAP domain to the NAS Gateway’s configuration by issuing the
domain add ldap command. This command also specifies the primary LDAP server
and optionally, a backup LDAP server with which the NAS Gateway will register to
become part of the domain.
Options
Table 8-1 : Options for the domain add ldap command
Table 8-1 : Options for the domain add ldap command (Continued)
Table 8-1 : Options for the domain add ldap command (Continued)
Table 8-1 : Options for the domain add ldap command (Continued)
Note!
Because all optional arguments are character strings, verify any values you
enter with your LDAP system administrator to ensure that they are valid.
Invalid values cause LDAP search errors and might produce unexpected
results.
Example
In the following example, the LDAP domain cmdrefexample is added to the LDAP
server 10.3.23.33.
Related Commands
domain delete ldap Deletes the LDAP domain specified.
domain modify ldap Modifies the LDAP domain configuration.
domain show ldap Shows the list of LDAP domains configured for
the NAS Gateway.
domain verify ldap Verifies the LDAP domain configuration.
Synopsis
domain add nis DOMAINNAME IPADDR [IPADDR] [IPADDR] [IPADDR]
Description
To log on to a UNIX domain, the domain needs to exist. You can add the domain to the
ONStor™ NAS Gateway’s configuration by running the domain add nis command,
which enables the NAS Gateway to add a network information service (NIS) domain
to its configuration.
The NAS Gateway needs to have a virtual server configured and operating in the
domain that you add with the domain add command. When you configure a domain,
the virtual server in that domain checks with the NIS server to validate the domain and
user. Therefore, the virtual server needs to be part of the same domain in which the
user is configured. You can add a NAS Gateway’s virtual server to the domain with the
command, vsvr set domain.
Options
Table 8-2 : Options for the domain add nis command
Example
In this example, the NIS domain chromatis is added to the NAS Gateway, and the
domain controller is configured as 10.3.119.128. When this command completes, the
NAS Gateway attempts to join the domain by contacting the NIS server at
10.3.119.128.
Related Commands
domain delete nis Deletes the NIS domain specified.
domain modify nis Modifies the NIS domain configuration.
domain show Shows the list of domains configured for the
NAS Gateway.
Synopsis
domain add windows DOMAINNAME LOGINUSER HOSTNAME [HOSTNAME]
[-NONETBIOS] [-k KRBDOMAINNAME] [-t CLOCKSKEW]
Description
To log on to a Windows domain, the domain needs to exist. You can configure the
Windows domain in the NAS Gateway’s configuration by running the domain add
windows command. This command requires a logon user name and password to allow
the NAS Gateway to join the domain. When you specify the logon user name, the
NAS Gateway prompts you for a password for that logon user name.
The NAS Gateway needs to have a virtual server configured and be operating in the
domain that you add with the domain add windows command. When you configure a
domain, the virtual server in that domain checks with the Windows domain controller
server to validate the domain and user. Therefore, the virtual server needs to be part of
the same domain in which the user is configured.
Note!
With this command, you need to also specify a password. With the Windows
domain passwords, the software imposes a minimum length of six characters.
Make sure that you specify a password of six characters or more when entering
a password on EverON™ software.
For Windows domains, if the controllers are on a different subnet than the
virtual server, you must configure the WINS server, that the NAS Gateway will
use, for name resolution by issuing the vsvr set wins command before
you issue the domain add command.
The user of the NAS Gateway/virtual server should have a minimum of
NETWORK privilege in the cluster or virtual server scope to execute this
command.
Options
Table 8-3 : Options for the domain add windows command
Table 8-3 : Options for the domain add windows command (Continued)
Table 8-3 : Options for the domain add windows command (Continued)
Example
In this example, the Windows domain domain1 is added to the NAS Gateway. As part
of this command. The logon user name user1 is configured to allow the NAS Gateway
to log on to the domain controller and join the domain. To do this, the user needs to
have permission to add a computer to the domain. The domain controller is configured
as host1. The -NONETBIOS option specified that the domain controller can only be
contacted through DNS resolution. When this command completes, the NAS Gateway
prompts you for a password for the logon user. Without it, the NAS Gateway is unable
to join the domain.
In the following example, a Windows domain with a fully-qualified domain name
(FQDN) is added.
In the example above, the windows domain HELIX is modified so that it now uses the
FQDN of the domain instead of its IP address.
Note!
The domain using the FQDN can be added with or without the –NONETBIOS
option.
Related Commands
domain delete windows Deletes the Windows domain specified.
domain modify windows Modifies the Windows domain configuration.
domain show Shows the list of domains configured for the
NAS Gateway.
Domain Delete
Synopsis
domain delete {ldap|nis|windows} DOMAINNAME
Description
You can delete a domain at any time if no virtual servers are joined to the domain. If
virtual servers are joined to the domain, the domain needs to be cleared by using the
vsvr clear domain command in all the virtual servers.
Note!
Clearing the domain requires that the virtual server to be in a disabled state.
When you delete the domain, the NAS Gateway leaves the domain and cannot
participate in the domain’s services. You can delete a domain by running the domain
delete command. You can delete a single domain at a time.
Note!
If you want to change the domain definition on the NAS Gateway, you can
delete the domain and reconfigure it. However, a more efficient way to change
a domain definition is through the domain modify command.
Options
Table 8-4 : Options for the domain delete command
Example
In the following example, the LDAP domain domain1 is deleted.
Related Commands
domain add ldap Adds the LDAP domain specified.
domain add nis Adds the NIS domain specified.
domain add windows Adds the Windows domain specified.
domain show Shows the list of domains configured for the
NAS Gateway.
domain verify ldap Verifies the LDAP domain configuration.
domain verify nis Verify the configuration of a NIS domain.
domain verify windows Verify the configuration of a Windows domain.
Synopsis
domain modify ldap DOMAINNAME [-s SERVER_URIS]
[-d DEFAULT_BASE_SCOPE] [-u LOGIN_DN] [-p PASSWORD_BASE_SCOPE] [-
g GROUP_BASE_SCOPE] [-h HOST_BASE_SCOPE] [-n
NETGROUP_BASE_SCOPE]
Description
You can modify parameters of an existing domain by issuing the domain modify
ldap command.
Note!
Except for the -s SERVER_URIS and the -d DEFAULT_BASE_SCOPE options,
you can enter an empty string to clear an option, for example, -u “ “.
If the scope is not specified or is not BASE, ONE, or SUB, the default scope is
SUB.
Options
Table 8-5 : Options for the domain modify ldap command
Table 8-5 : Options for the domain modify ldap command (Continued)
Examples:
“ou=eng, o=company, c= us:SUB”
“ou=qa, o=company, c= us:BASE”
“ou=finance, o=company, c=
us:ONE”
• BASE specifies a search just at the
level specified in the directory.
• ONE specifies a search at the base
level plus one layer below in the
directory.
• SUB specifies a search through all
subdirectories of the tree.
Note!
When enclosing values in quotation
marks, a space between the values after
the comma is valid. A space before the
values BASE, SUB, and ONE is not
required.
Note!
If the scope is not specified or is not
BASE, ONE, or SUB, the default scope
is SUB.
Table 8-5 : Options for the domain modify ldap command (Continued)
Note!
Because all optional arguments are character strings, verify any values you
enter with your LDAP system administrator to ensure that they are valid.
Invalid values cause LDAP search errors and might produce unexpected
results.
Example
Related Commands
domain add ldap Adds an LDAP domain to the NAS Gateway.
domain delete ldap Deletes an LDAP domain from the NAS
Gateway.
domain modify ldap schema Modifies the schema of an LDAP domain.
domain show ldap Displays a list of LDAP domains configured for
the NAS Gateway.
domain show ldap schema Displays the schema of an LDAP domain.
domain verify ldap Verifies the LDAP domain configuration.
Synopsis
domain modify ldap schema (user | group | netgroup | host)
DOMAINNAME [OPTIONS ...]
Description
You can modify the schema of a configured LDAP domain by running the domain
modify ldap schema command. With this command you can modify User, Group,
Netgroup, and Host schemas.
Options
Table 8-6 : Options for the domain modify ldap schema command
Table 8-6 : Options for the domain modify ldap schema command
Table 8-6 : Options for the domain modify ldap schema command
Table 8-6 : Options for the domain modify ldap schema command
Table 8-6 : Options for the domain modify ldap schema command
Example
Related Commands
domain add ldap Adds an LDAP domain to the NAS Gateway.
domain delete ldap Deletes an LDAP domain from the NAS
Gateway.
Synopsis
domain modify nis DOMAINNAME IPADDR [IPADDR] [IPADDR] [IPADDR]
Description
You can modify an existing domain or any of its parameters by running the domain
modify command.
Options
Table 8-7 : Options for the domain modify nis command
Table 8-7 : Options for the domain modify nis command (Continued)
Example
In this example, the domain chromatis is modified. In this example, the IP address of
the NIS server is changed to 10.2.17.21.When this command completes, the NAS
Gateway attempts to join the domain by contacting the domain controller at
10.2.17.21.
Related Commands
domain add nis Adds the NIS domain specified.
domain delete nis Delete the NIS domain specified.
domain show Shows the list of domains configured for the
NAS Gateway.
Synopsis
domain modify windows DOMAINNAME LOGINUSER HOSTNAME [HOSTNAME]
[-t CLOCKSKEW]
Description
You can modify an existing Windows domain or any of its parameters by running the
domain modify command.
Note!
For Windows domains, if the controllers are on a different subnet than the
virtual server, you must configure the WINS server that the NAS Gateway will
use for name resolution by issuing the vsvr set wins command before
you issue the domain add command.
This command cannot turn a pre-Windows 2000 domain (NTLMxx)
configuration into a Windows 200x domain ( Kerberos) configuration.
Options\
Table 8-8 : Options for the domain modify windows command
Table 8-8 : Options for the domain modify windows command (Continued)
Example
In the following example, a Windows domain is modified.
In this example, the Windows domain chromatis is modified on the NAS Gateway.
The logon user name is configured to test1. The domain controller is also being
modified to 10.2.17.21. When this command completes, the NAS Gateway prompts
you for a password for the new logon user name. When the command completes, the
NAS Gateway attempts to join the domain by contacting the domain controller at
10.2.17.21 using the newly modified parameters.
In the following example a Windows domain with a FQDN is modified.
In this example, the Window domain chromatis is modified. The logon user name
onstor\tester is configured to allow the NAS Gateway to log on to the domain
controller and join the domain. The FQDN onstor is added for supporting NAS
Gateway access through multiple domains. The FQDN allows the user to access the
virtual server PUBSTEST even though the user is configured in a different domain
than PUBSTEST.
Related Commands
domain add windows Adds the Windows domain specified.
domain delete windows Delete the Windows domain specified.
domain show Shows the list of domains configured for the
NAS Gateway.
domain verify windows Verify the configuration of a Windows domain.
Domain Show
Synopsis
domain show {all|ldap|nis|windows} [DOMAINNAME]
Description
The NAS Gateway tracks all the domains it has joined in the domain list. This list is
available for each NAS Gateway. You can, however, see a domains list that shows the
domains that are available to a specific virtual server by running the vsvr domain
show command.
To view the NAS Gateway.’s domains list, run the domain show command.You can
filter the display as follows by running a keyword with the domain show command.
• You can display all domains regardless of domain type.
• You can display all LDAP domains or a specific LDAP domain by name.
• You can display all NIS domains or a specific NIS domain by name.
• You can display all Windows domains or a specific Windows domain by name.
Options
Table 8-9 : Option for the domain show command
Example
In this example, all domains are displayed in the domain list that contains the
following information:
• The type of each domain configured, either LDAP, NIS, or Windows.
• The domain name. The logon user field lists the name of the Windows logon user
that was configured. For Windows domain names, the NAS Gateway prompts you
for a logon user name to be used to log on to the domain. The password for that
logon user, however, is not displayed for security reasons. This command also
shows FQDNs for instances where you need to access a virtual server from another
virtual server that is not in the same domain.
• The IP address of the domain controller.
The following example, shows all domain types.
Related Commands
domain add ldap Adds a LDAP domain to the NAS Gateway.
domain delete ldap Deletes the LDAP domain specified.
domain modify ldap Modifies the LDAP domain configuration.
domain modify ldap schema Modifies the schema of an LDAP domain.
domain verify ldap Verifies the LDAP domain configuration.
domain add nis Adds the NIS domain specified.
domain delete nis Delete the NIS domain specified.
domain modify nis Modifies the NIS domain configuration.
domain add windows Adds the Windows domain specified.
domain delete windows Delete the Windows domain specified.
domain modify windows Modifies the Windows Domain configuration.
domain verify nis Verify the configuration of a NIS domain.
domain verify windows Verify the configuration of a Windows domain.
Synopsis
domain show ldap schema DOMAINNAME
Description
Use the domain show ldap schema command to view the LDAP schema information
contained in a specified LDAP domain name.
Options
The DOMAINNAME variable specifies the LDAP domain name of
the schema you want to display.
Example
The following example shows the LDAP schema is for Open LDAP domain
cmdrefexample.
The following example shows the LDAP schema for the AD LDAP domain winad,
which is configured for the Windows environment.
Related Commands
domain add ldap Adds a LDAP domain to the NAS Gateway.
domain delete ldap Deletes the LDAP domain specified.
domain modify ldap Modifies the LDAP domain configuration.
domain modify ldap schema Modifies the schema of an LDAP domain.
domain show ldap Displays list of LDAP domains configured
for the NAS Gateway.
domain verify ldap Verifies the LDAP domain configuration.
Synopsis
domain verify ldap DOMAINNAME
Description
Run this command from the virtual server context to verify the LDAP domain
configuration. This command connects to the LDAP server and makes LDAP queries
using the LDAP configuration.
Options
The DOMAINNAME variable is the LDAP domain name for the
virtual server. DOMAINNAME is the domain name you
previously created in the NAS Gateway using the domain add
ldap command.
Example
eng25>
eng25> vsv set eng25-3
eng25 ENG25-3>
eng25 ENG25-3> domain verify ldap onstorlab
User name lookup results : #name=59, #uid=59, #passwd=59,
#gid=59
User id lookup results : #name=59, #uid=59, #passwd=59,
#gid=59
Group name lookup results : #name=18, #gid=18
Group id lookup results : #name=18, #gid=18
User group id lookup results : #gid=11
Host name lookup results : #name=65, #alias=0, #addr=32
Host addr lookup results : #name=65, #alias=0, #addr=32
Netgroup name lookup results : #triple=294, #member=27
Related Commands
domain add ldap Adds a LDAP domain to the NAS Gateway.
domain delete ldap Deletes the LDAP domain specified.
Synopsis
domain verify nis DOMAINNAME IPADDR [IPADDR] [IPADDR] [IPADDR]
Description
Verify the configuration of a NIS domain.
Note!
This command has to be run within the context of the vsvr that is joined to the
NIS domain.
Options
Table 8-10 : Options for the domain verify nis command
Example
Related Commands
domain add nis Adds a NIS domain to the NAS Gateway.
domain delete Deletes the NIS domain specified.
domain modify nis Modifies the NIS domain configuration.
domain show Displays a list of domains that are configured for
the NAS Gateway.
domain verify windows Verify the configuration of a Windows domain.
Synopsis
elog clear log
Description
The elog clear log command deletes all entries in the event log. When you run this
command, the event log is immediately cleared, and it can begin accepting messages
whenever new system events occur.
In this example, all messages are deleted from the current event log.
Related Commands
elog show log Shows locally stored log messages.
Synopsis
elog display {enable|disable}
Description
Use the elog display command to activate or deactivate the display of event log
messages on the system switch and controller (SSC). Therefore, when you run this
command, you can determine whether the event log messages are allowed to scroll
across the management display. By default, the event log message display is enabled.
Options
The enable|disable commands specify whether to enable or disable
the event log message display on the ONStor™ NAS Gateway’s
Example
In this example, the event log message display is disabled. When the software is
disabled, the event messages are no longer displayed on the management session.
Related Commands
elog show config Shows the current event log configuration.
elog show log Shows locally stored event log messages.
Synopsis
elog facility
{local0|local1|local2|local3|local4|local5|local6|local7}
Description
The elog facility is a way of categorizing event log messages arriving at an event log
host from different NAS Gateways. The event log messages are named with the same
user-level facility codes that a standard UNIX syslog program uses. The facility codes
used are local0 through local7. These values are identifiers that you can apply to the
event log messages that are forwarded from specific NAS Gateways to allow a syslog
host to track which messages are coming from which NAS Gateways. Use the elog
facility command to set facility levels for filtering messages from different NAS
Gateways at a common syslog host.
Options
The local0|local1|local2|local3|local4|local5|local6|local7
facility codes are the possible user-level facility codes for
assignment to an NAS Gateway. Do not assign the same facility
code to more than one specified NAS Gateway. local0 is the
default elog facility.
Example
In this example, the elog facility level on the current NAS Gateway is set to local3. If
event log messages are forwarded to a syslog host, the messages from this NAS are
displayed with a local3 tag. The local3 tag indicates that the event log messages are
from the NAS Gateway cluster1-4.
Related Commands
elog show config Shows the current event log configuration.
elog state Disables or enables event log capability.
Elog Find
Synopsis
elog find KEYWORD
Description
Because the event log message log can support numerous messages, the NAS Gateway
supports a basic keyword search engine for locating text strings within the event log
message log. Use the elog find command to find specific keywords without having
to perform a line-by-line scroll through the entire log. The elog find command
returns all lines that contain the keyword you specify. The search string is case-
sensitive.
Options
The KEYWORD variable is the string that you are searching for in
the event log message log. Type an alphanumeric keyword of up
to 256 characters. Keywords can contain an asterisk (*) as a
wildcard character. Do not use the question mark (?) as a wildcard
character because that is part of the NAS Gateway’s command
completion online help.
Example
In the following example all error level events in the event log are located.
In this example, the NAS Gateway is searching the log for all the error level messages.
The results are displayed on the management console.
In the following example all events that occurred on the SSC are located.
In this example, the NAS Gateway is searching the log for all messages about the SSC.
The results are displayed on the management console.
In the first message, the SSC is synchronizing with the NTP signal broadcast from the
NTP server. In the second message, the SSC is recognizing the network-layer
activation of a management port.
In the following example all Close messages, for example, all close requests
(CloseReq) and close responses (CloseRsp) are located.
In this example, the NAS Gateway is displaying all the messages that contain the text
string Close.
Related Commands
elog clear log Clears all locally stored log messages.
elog show log Shows locally stored log messages.
Elog Host
Synopsis
elog host IPADDR
Description
The event log host runs the syslog functionality to receive event log messages. You
can forward event log messages to syslog daemons running on the specified event log
host. The address you specify determines whether event log messages are forwarded to
a remote host or the local host as follows:
• If the host address is set to 0, all event log messages are forwarded to the local
syslog daemon and stored in /usr/local/agile/log/messages.
• If a nonzero syslog host is specified, all messages are forwarded to the specified
host using the currently configured facility code.
Note!
If you set the syslog host to a valid IP address, make sure that the remote syslog
host is configured to receive syslog messages from other hosts.
Options
The IPADDR variable is the IP address assigned to the remote syslog
host. The local syslog daemon on the NAS Gateway forwards event log
messages to the remote host with the IP address that you specify. Type
an IP address in dotted decimal notation, for example: 10.1.11.134.
Example
In this example, the event log remote host is set at 10.11.128.169. The NAS Gateway’s
local syslog daemon forwards the event log messages to this IP address. Because a
valid IP address was specified for the remote event log host, the local event log
daemon does not direct the event log messages to the syslog.conf file. Instead, the local
syslog daemon forwards the event log messages to the remote host.
Related Commands
elog show config Shows the current event log configuration.
Elog Level
Synopsis
elog level {debug|info|notice|warning|error|critical|alert|emergency}
Description
The event log of the NAS Gateway provides messages about system activity of
various levels. The event log messages are governed by an event log daemon that runs
on the SSC. Elog messages are prioritized with the same priority levels used by the
standard UNIX syslog tool.
Elog forwards only those messages to the syslog daemon that are the configured
severity or greater. All messages with lower priority levels are discarded. For example,
if you configured the elog tool to handle warning-level messages, the NAS Gateway
would display system messages of the severity warning, error, critical, alert, and
emergency. The NAS Gateway would not display messages that are notice,
information, or debug level. You can choose to have the event log messages saved to a
file or forwarded to a different host as follows:
• If you choose to have event log messages saved to a file, they are automatically
saved to /var/agile and is called “messages”.
Any administrator of the event log host machine can edit and print the file.
• If you choose to have event log messages saved to a host, they are sent to an a
syslog.conf file at an IP address that you specify. Any administrator of the event
log host machine can edit and print the file.
Options
Table 9-1 : Options for elog level command
Option Severity
Example
In this example, the command is setting the elog tool to forward messages that are
critical level and more serious whenever the elog software is enabled.
Related Commands
elog show config Shows the current event log configuration.
Synopsis
elog show config
Description
Use the elog show config command to display the current configuration of the event
log parameters. You can run this command at any time to verify the configuration or
ensure that any changes you have made actually occurred. This command shows the
following event log configuration information:
• The state of the elog software, either enabled or disabled.
• The configured event log message level. All messages equal to or greater than the
configured severity are displayed.
• The state of the event log display, either enabled or disabled.
• The current local facility for this NAS Gateway.
• The IP address of the event log local host, either an all zeroes value, or a nonzero
IP address.
Example
In this example, the current event log configuration is displayed. The event log
configuration shows the following information:
Related Commands
elog show log Shows the current event log.
elog state Disables or enables event log capability.
Synopsis
elog show log [NUMLINES]
Description
Use the elog show log command you display the event log. This log keeps a record
of the locally stored event log messages. You can display the entire log or you can
specify the number of lines in the log that you want to view. Each event log message is
one line, so the number of lines you choose to display equates to the number of event
log messages that are displayed.
Note!
The elog show log command shows current event log content, but not the
content of any older archived event log files. However, you can view the event
log strings in any archived files, including older files, by running the elog find
command.
Options
The NUMLINES variable is the number of lines to display from the
event log. Each message is one line, so the number of lines you
type equates to the number of messages that are displayed.
Example
Related Commands
elog show config Shows the current event log configuration.
elog state Disables or enables event log capability.
Synopsis
elog state {enable | disable}
Description
Use the elog state command to activate or deactivate the elog software feature. If
you disable the elog software, any parameters you have set remain configured for the
next time you enable the elog software. When the elog software is disabled, no event
log messages are forwarded to the syslog daemon.
Note!
Elog messages are enabled by default. You do not need to explicitly enable
them.
You can control the screen display of event log messages with the elog display
command. When event log is enabled, you can use the elog display command
to activate or deactivate the display of event log messages on the management
console.
Options
The enable|disable commands are to activate or deactivate the elog
software feature.
Example
In the following example the elog software is disabled.
When the software is disabled, the elog feature no longer displays messages across the
management console’s display screen or forwards event log messages to their
destination file or host.
In the following example the elog software is enabled.
When the software is enabled, the elog feature displays messages across the
management console’s display screen or forwards messages event log messages to
their destination file or host. By default, event log messages are enabled.
Related Commands
elog show config Shows the current event log configuration.
Filesystem Convert
Synopsis
filesystem convert VOLNAME
Description
The filesystem convert command converts the filesystem to the latest. Any new
volume will automatically be created with the latest FS version 28. The filesystem convert is
used to convert file systems that were created prior to the upgrade to version 26. The
filesystem version id displayed by the volume show VOLNAME command output. A file
system needs to be converted to be able to support 1024 hardlinks per file. The volume
should be taken offline before executing this command.
Note!
When the filesystem convert command completes
successfully, there is no output to the console.
Options
The VOLNAME variable is the name of an existing volume.
Related Commands
filesystem revert Reverts the filesystem to an older version.
volume offline Takes the specified volume offline.
volume online Brings a volume online.
volume show Displays volume information.
Synopsis
filesystem quota disable VOLNAME [user,group,tree]
Description
You can explicitly disable or enable individual quotas. If a quota has been enabled,
you can disable it by running the filesystem quota disable command. With this
command you can simultaneously disable all quotas of any or all types on a volume.
For example, you could disable all user quotas on vol1 at the same time. Or, by using a
comma-separated list, you could disable all user and group quotas on vol1 at the same
time, or all user, group, and tree quotas on vol1 at the same time.
When a quota is disabled, it is no longer available for tracking or enforcement. When
you disable a quota, a quota rebuild occurs when you reenable the quota. The rebuild
occurs if the number of quotas being enabled is one or greater.
When quotas are disabled, they keep the usage parameters they had before they were
disabled, unless any changes were made to the quota configuration while they were
disabled. All parameter values, default and custom, are retained while a quota is
disabled. The parameter values are restored when a quota is reenabled.
You can change quota parameters while the quota is disabled. After you make the
change, the new parameters are not active until you reenable the quota, and the quota
completes a quota rebuild.
Note!
Power cycling and restarting the NAS Gateway do not change quota state. The
quota remains in the same operational state that it was in before the event that
caused the power cycle or restart to occur.
Options
Table 10-1 : Options for filesystem quota disable command
Example
In this example, all quotas (user, group, and tree) are disabled on the techpubs volume.
Related Commands
filesystem quota enable Enables quotas on a volume.
Synopsis
filesystem quota enable VOLNAME {user,group,tree}
Description
You can explicitly disable or enable individual quotas. If a quota has been disabled,
you can enable it by running the filesystem quota enable command. With this
command you can simultaneously enable all quotas of any or all types on a volume.
For example, you could enable all user quotas on vol1 at the same time. Or, by using a
comma-separated list, you could enable all user and group quotas on vol1 at the same
time, or all user, group, and tree quotas on vol1 at the same time.
Whenever a quota undergoes a state change from disabled to enabled, the quota
rebuild process occurs. During this process, the ONStor™ NAS Gateway scans the file
system to discover where quotas are configured and how they are applied, to either a
user, group, or tree. Any time you enable one or more quotas, the NAS Gateway
rebuilds the quotas.
When the quotas are enabled for the first time, they have the following default values
that you can configure with settings that are more appropriate for your network:
• track only mode, no enforcement of quota limits for the user, group, or tree. Only
tracking and recording usage occur.
• infinite default limits and warning thresholds.
• no logging of events when limits or thresholds are exceeded.
However, if quotas are reenabled, they contain the same parameters they had before
they were disabled unless any changes were made to the quota configuration while
they were disabled. In this situation, only the operational state changes.
Note!
Power cycling and restarting the NAS Gateway do not change quota state. The
quota remains in the same operational state that it was in before the event that
caused the power cycle or restart to occur.
Options
Table 10-2 : Options for filesystem quota enable command
Example
In this example, all quotas (user, group, and tree) are enabled on the techpubs volume.
Related Commands
filesystem quota disable Disables quotas on a volume.
Synopsis
filesystem quota group config VOLNAME [-d] [-e {enforce |
trackonly}] [-l LIMIT] [-L {yes | no}] [-w WARNING] [-W {yes | no}]
Description
You can configure group quotas in the filesystem as either default or specific group
quotas. With default group quotas you can configure quota conditions and behavior for
all groups that access a volume. Default group quotas are configured on a volume, and
you can apply a baseline of the same usage conditions to all members of the groups
that access the volume. Because default group quotas are applied to all groups that use
a volume, you can configure only one default group quota on each volume.
You can configure default group quotas for each volume by running the filesystem
quota group config command.
You can configure a default group quota in one of the following ways for monitoring
usage and enforcing conditions on that usage:
• Track only mode enables the NAS Gateway to track the group’s usage on the
volume without enforcing any results if the group exceeds the allocated amount of
volume space.
• Enforce mode enables the NAS Gateway to track the group’s usage on the volume
and enforce the quota.
Quotas are assigned to a volume, so you need to run the filesystem quota group
config command from the context of the same virtual server that contains the volume
where you want the quota defined. You can also use this command to change an
existing default group quota. Default group quota that already exist when you run the
command are updated with any arguments that have changed.
Options
Table 10-3 : Options for the filesystem quota group config command
Table 10-3 : Options for the filesystem quota group config command
Table 10-3 : Options for the filesystem quota group config command
Table 10-3 : Options for the filesystem quota group config command
Table 10-3 : Options for the filesystem quota group config command
Example
In the following example a default group quota with all default parameters is
configured.
In this example, the default group quota is configured on the volume techpubs.
Because no custom quota parameters are specified, the quota is configured with the
following default parameters:
• Track only mode
• Infinite log and warning values
• No log limit, which disallows generating an event for the quota log when the
absolute usage limit is met or exceeded
• No log warning, which disallows generating an event for the quota log when the
absolute usage limit is met or exceeded
In the following example a default group quota with custom parameters is configured.
In this example, an enforce mode default group quota is configured on the volume
techpubs. This quota is configured with the following parameters:
• Enforce mode
• An absolute usage limit of 160 MiBs
• The ability to generate a log message when events meet or exceed the absolute
usage limit
Because no other parameters are specified, the omitted parameters are set to their
default values as follows:
• Infinite warning limit
• No logging of events that exceed the warning threshold
Related Commands
filesystem quota group set Sets or changes quota usage limits or warning
thresholds for a specific group.
filesystem quota group show Shows group quota configuration or group
quotas.
Synopsis
filesystem quota group set VOLNAME GROUPNAME [-l LIMIT] [-w
WARNING] [-d]
Description
You can configure group quotas in the file system as default group quotas or specific
group quotas. With specific group quotas you can set specific usage conditions for
individual users that access the volume. These usage conditions for specific group
quotas are applied along with the default group quotas on the volume. When multiple
quotas are configured, the NAS Gateway analyzes all of them, and applies the strictest
to offer the most control over usage. Specific group quotas are optional. If no group
quotas are configured, no usage is tracked or enforced for each group.
You can configure specific group quotas with the filesystem quota group set
command. Use this command to set different limit and warning values for a specific
group. You can also use the -d argument to reset a specific group quota’s limit and
warning values to the limit and warning values configured in the default group quota.
You can configure specific quotas on the same volume as default group quotas. If a
specific and default group quota are configured on the same volume, both quotas are
processed when a disk allocation occurs, and the most restrictive usage case is
enforced.
Specific group quotas inherit the following quota parameters from the default quota
configured on a volume:
• Type (either enforce or track only)
• Log warning or no log warning
• Log limit or no log limit
Specific group quotas support specifying a group identity (GID), a network
information services (NIS) name, or a Windows name, for example:
• 99@onstor (LDAP or NIS user identity [UID] format)
• groupname@domain (LDAP or NIS group name)
• pubs@onstor (LDAP or NIS user name format)
• onstor\software (Windows group name format)
Group names need to be valid and known to the LDAP, NIS, or Windows domain
controllers. Because the NAS Gateway is multiprotocol, you can map common
Internet file services (CIFS) and network file system (NFS) users between domain
types through ID mapping. You cannot assign a specific group quota to GID 0.
Note!
It is possible to configure a 0 MiB quota. Although unusual, it is a valid
configuration in some cases. For example, assume that a group has finished a
project and no longer needs special usage conditions. You can set a 0 MiB
enforce-mode quota on the group so that no new usage can accumulate for that
group name. Or, you can set a 0 MiB track-only mode quota to allow additional
usage to accumulate and post messages to the quota log when any usage occurs
for the group.
Options
Table 10-4 : Options for the filesystem quota group set command
Table 10-4 : Options for the filesystem quota group set command (Continued)
Table 10-4 : Options for the filesystem quota group set command (Continued)
Example
In the following example a specific group quota is configured.
In this example, a specific group quota is set on the techpubs volume. The specific
group quota is applied to pubs@onstor so that any member of this group is allowed to
access the volume techpubs with the following custom conditions:
• Absolute usage limit of 400 MiBs
• Warning limit of 340 MiBs
Related Commands
filesystem quota group config Configures default group quotas on a volume.
filesystem quota group show Shows group quota configuration or group
quotas.
Synopsis
filesystem quota group show VOLNAME [GROUPNAME|-all][-P PAGENUMBER
[-s PAGESIZE]]
Description
You can display a group quota definition by running the filesystem quota group
show command. Use this command you display the group quota records in the
following ways:
• By volume
• By specific group name (for specific group quotas only)
• For all users on the volume
This command returns group quota information regardless of whether the quota is
enabled or disabled. The quota configuration information is displayed in any of the
following ways:
• If the quota feature is enabled and the quota configuration contains no specific
group quotas, the output of this command shows the default quotas assigned to
everyone on the volume.
• If no limit or warning has been configured, the output of this command shows
infinite warning and limit levels.
• If the quota feature is disabled, the output shows unknown (disabled) to indicate
that usage cannot currently be measured because the quota software is disabled.
• If the quota build phase is in progress, the output of this command shows unknown
(rebuilding) to indicate that usage cannot currently be measured because the quota
software is rebuilding.
Options
Table 10-5 : Options for the filesystem quota group show command
Example
In the following example default group quota information on a volume is displayed.
In this example, the default group quota information for the techpubs volume is
displayed as follows:
• The state of the quota software on the volume. Valid values are either yes for
enabled, or no for disabled.
• The mode (either track only or enforce) that is configured on the quota.
• The absolute usage limit that is applied to everyone on the volume.
• The state of generating log messages for an event that meets or exceeds the
absolute limit shown in Limit. Valid values are yes for message generation, or no
for no message generation.
• The warning limit at which messages are generated to alert you when the usage is
approaching the absolute maximum.
• The state of generating log messages for an event that meets or exceeds the
warning limit shown in Warn. Valid values are yes for message generation, or no
for no message generation.
Group: pubs@onstor
Limit: 400 MiB
Warn: 340 MiB
Usage: 274 MiB
eng38 ENG38VS0>
In this example, the warning, limit, and current usage for the specific group
pubs@onstor is displayed with the following information:
• The group name. If this value is a GID, the term “GID” is displayed along with the
number, for example, GID78@onstor.
• The absolute usage limit for the group pubs@onstor.
• The warning threshold for the group pubs@onstor.
• The current usage for the group pubs@onstor.
In the following example the filesystem quota group show command with the -all
keyword is run.
Group: gid78@onstorlab
Limit: default
Warn: default
Usage: 500 MiB
Group: group2@onstorlab
Limit: default
Warn: default
Usage: 274 MiB
Group: software@onstorlab
Limit: default
Warn: default
Usage: 500 MiB
eng38 ENG38VS0>
In this example, all specific user quotas configured on the volume techpubs are
displayed with the following information:
• The group name. You can display a GID along with group names.
• The absolute usage limit for the group pubs@onstor.
• The warning threshold for the group pubs@onstor.
• The current usage for the group pubs@onstor.
Related Commands
filesystem quota group config Configures default group quotas on a volume.
filesystem quota group set Sets or changes quota usage limits or warning
thresholds for a specific group.
Synopsis
filesystem quota log clear
Description
You can clear locally stored log messages by running the filesystem quota log
clear command. Quota log messages contain information about specific usage events
that meet or exceed a warning or limit threshold. The quota log receives messages
when a quota is configured with the following parameters:
• A limit or a warning value
• A log limit value
Clearing the quota log is immediate and removes all entries.
Example
Related Commands
filesystem quota log show Shows quota log contents.
Synopsis
filesystem quota log facility
{local0|local1|local2|local3|local4|local5|local6|local7}
Description
The quota log facility interfaces with the standard Syslogd capability to provide
logging of important system information at the specified level of priority. With this
facility, you can locally save, forward to a remote host, or display system messages on
the system console. Quota log messages use the same user-level facility codes as a
standard UNIX syslog program.
Options
One of the following values
local0|local1|local2|local3|local4|local5|local6|loc
al7 denotes the facility code. The default value is local6.
Example
Related Commands
filesystem quota log show config Shows the current log configuration.
Synopsis
filesystem quota log host IPADDR
Description
The quota log facility interfaces with the standard syslogd capability to provide
logging of system information at the specified level of priority. With this facility, you
can locally save, forward to a remote host, or display system messages on the system
console.
You can forward quota log messages to syslog daemons running on a specified host by
running the filesystem log host command. If the host address is set to 0, all quota
log messages are forwarded to the local syslog daemon. Quota log messages for
priority less than info are not saved in the local log. If a nonzero syslog host is
specified, all messages are forwarded to the specified host using the currently
configured facility code. In this case, make sure that the remote syslog host is
configured to receive syslog messages from other hosts because some
implementations, by default, are configured to not receive syslog messages forwarded
by other hosts. Remote logging is disabled by default, so all messages are sent to the
local host.
Options
The IPADDR variable is the IP address of a remote host that runs
syslogd and is capable of receiving quota log messages from this
NAS Gateway.
Example
In this example, 192.168.172.1 is specified as the syslogd host for sending quota log
messages.
Related Commands
filesystem quota log show config Shows the current log configuration.
Synopsis
filesystem quota log show [NUMLINES]
Description
You can display locally stored log messages by running the filesystem quota log
show command. Quota log messages contain information about specific usage events
that meet or exceed a warning or limit threshold. The quota log receives messages
when a quota is configured with the following parameters:
• A limit or a warning value
• A log limit value
Usage can approach a limit or a warning value, so events are logged once per day
regardless of how many times a warning or limit threshold is exceeded in a 24-hour
period.
Options
The NUMLINES variable is an optional argument that specifies the
number of lines to display. The number of lines you specify are
counted in most-recent to least-recent order to facilitate seeing the
most recent usage events. Type a 32-bit number for the
Example
After the quota log has finished scrolling, the NAS Gateway command prompt
reappears. You can continue with other operations, or you can clear the quota log to
start a fresh recording of quota events.
Related Commands
filesystem quota log clear Clears the quota log for all volumes.
Synopsis
filesystem quota log show config
Description
You can display locally quota log configuration information by running the
filesystem quota log show config command. Quota log configuration shows the
log facility and the host address.
Example
Related Commands
elog show config Shows the current event log configuration.
Synopsis
filesystem quota tree config VOLNAME [-d] [-e {enforce | trackonly}]
[-l LIMIT] [-L {yes | no}] [-w WARNING] [-W {yes | no}]
Description
You can configure tree quotas, also called hierarchical or directory quotas, in the file
system as default or specific tree quotas. With default tree quotas you can configure
conditions and behavior for a part of the directory structure on a volume.
Default tree quotas apply to a volume, and the usage is charged to directories on the
volume, not to users or groups that access the directory. Therefore, individual users or
groups receive usage conditions and can be charged for their use of the directory even
if the users or groups do not have specific user or group quotas assigned to them.
When user or group quotas and tree quotas are assigned, all configured quotas are
applied. The most restrictive quota is enforced.
You can configure default tree quotas for each volume by running the filesystem
quota tree config command.
You can configure default tree quotas in one of the following ways for monitoring
usage and enforcing conditions on that usage, for example:
• Track only mode enables the NAS Gateway to track the usage of the tree on the
volume without enforcing any results if usage exceeds the allocated amount of
volume space.
• Enforce mode enables the NAS Gateway to track the usage of the tree on the
volume and enforce the quota.
Quotas are assigned to a volume, so you need to run the filesystem quota tree
config command from the context of the same virtual server that contains the volume
where you want the quota defined. You can also use this command to change an
existing default tree quota. Default tree quotas that already exist when you run the
command are updated with any arguments that have changed.
You can configure or modify a default tree quota regardless of its state. If a quota is
disabled when you make a change, the new arguments take effect when the quota is
reenable
Table 10-6 : Options for the filesystem quota tree config command
Table 10-6 : Options for the filesystem quota tree config command (Continued)
Table 10-6 : Options for the filesystem quota tree config command (Continued)
Example
In the following example a default tree quota with all default parameters is configured.
In this example, the default tree quota is configured on volume techpubs. Because no
custom quota parameters are specified, the quota is configured with the following
default parameters:
• Track only mode
• Infinite log and warning values
• No log limit, which disallows generating an event for the quota log when the
absolute usage limit is met or exceeded
• No log warning, which disallows generating an event for the quota log when the
absolute usage limit is met or exceeded
In the following example a default tree quota with custom parameters is configured.
In this example, a default tree quota is configured on volume techpubs. This quota is
configured with the following values.
• Track only mode
• An absolute usage limit of 500 MiBs
• The ability to generate a log message when events meet or exceed the absolute
usage limit
• A warning threshold of 450 MiBs, to alert you when usage on techpubs is
approaching the absolute limit.
• The ability to generate a log message when usage meets or exceeds the warning
limit
In the following example an enforce mode quota is configured.
In this example, an enforce mode default tree quota is configured on volume techpubs.
This quota is configured with the following parameters:
• Enforce mode
• An absolute usage limit of 460 MiBs
• The ability to generate a log message when events meet or exceed the absolute
usage limit
Because no other parameters are specified, the omitted parameters are set to their
default values, which are as follows:
• Infinite warning limit
• No logging of events that exceed the warning threshold
Related Commands
filesystem quota tree set Sets specific quotas on a directory, or changes
quota usage limits or warning thresholds.
filesystem quota tree show Shows tree quota configuration or tree quotas.
Synopsis
filesystem quota tree remove VOLNAME PATHNAME
Description
The filesystem quota tree remove command removes a directory which is the
root of tree quota. All the directories and files under the quota tree will be removed
recursively.
This command is not supported on file systems which were created prior to EverOn
version 3.0.0 when the tree quota is not empty. Such file systems must be converted to
the latest layout version before issuing this command.
If the PATHNAME is not a director y or quota tree root, the command fails.
Options
Table 10-7 : Options for the filesystem quota tree remove command
Example
In the following example, path name pnested/cnested is removed from volume
pcvol.
eng56 ENG56-VS1>
Related Commands
filesystem convert Converts the filesystem layout to the latest
version.
filesystem quota tree config Configures default tree quotas on a volume.
filesystem quota tree show Displays tree quota configuration or tree quotas.
filesystem quota tree set Sets specific quotas on a directory, or changes
quota usage limits or warning thresholds.
volume show Displays one or more volumes.
Synopsis
filesystem quota tree set VOLNAME PATHNAME [-l LIMIT] [-w WARNING]
[-n {yes | no} [-d]
Description
You can configure tree quotas, also called hierarchical or directory quotas, in the file
system as default tree quotas or specific tree quotas. Specific tree quotas support
tracking or enforcing usage conditions on a specific part of the directory structure.
When you configure a tree quota, any child directories in the directory tree inherit its
conditions. If the specific tree quota is nested, usage of a directory is recursively
charged up the tree to all quota tree roots until the closest simple quota is encountered
(or the root directory), whichever is first.
You can configure specific tree quotas on a directory in the file system by running the
filesystem quota tree set command. As part of running this command, you
specify the directory path to which the quota applies. You can specify the root
directory as part of the specific tree quota or a nonroot directory, but only if that
directory is empty. Any nonroot directory you specify needs to be in relation to the
root of the volume, so always include the root slash ( / ) when you specify the directory
path as shown in the following examples:
• / configures the directory as the root of whichever volume is specified when you
configure the quota.
• /dir1 configures the quota for dir1 on whichever volume is specified when you
configure the quota.
• /dir1/dir2 configures the quota for dir2, which resides as a child of dir1 on
whichever volume is specified when you configure the quota is.
If a default tree quota and a specific tree quota are on the same volume, both quotas are
processed when a disk allocation occurs, and the most restrictive usage case is
enforced.
Specific tree quotas inherit the following quota parameters from the default tree quota
configured on a volume:
• Type (either enforce or track only)
• Log warning or no log warning
• Log limit or no log limit
For specific tree quotas, you can specify directory paths in either Windows or UNIX
formats. Because the NAS Gateway is multiprotocol, it interprets the path correctly
and applies the quota. For example, you can specify /vol1/eng/publications for a
UNIX environment and \vol1\eng\publications for the same directory paths, and the
NAS Gateway applies the quotas where you configure them.
Note!
The directory path where the quota is applied needs to exist before running the
filesystem quota tree set command.
Options
Table 10-8 : Options for the filesystem quota tree set command
Table 10-8 : Options for the filesystem quota tree set command (Continued)
Table 10-8 : Options for the filesystem quota tree set command (Continued)
Example
In the following example a specific tree quota is configured.
In this example, a specific tree quota is set on the volume techpubs. The specific tree
quota is applied to /dir1/dir2 so that any user or group is allowed to access that
directory with the following custom conditions:
• Absolute usage limit of 80 MiBs
• Warning limit of 66 MiBs
• Nested quota
Related Commands
filesystem quota tree config Configures default tree quotas on a volume.
filesystem quota tree show Shows the tree quota configuration or tree
quotas.
Synopsis
filesystem quota tree show VOLNAME [PATHNAME|-all]
Description
You can display a tree quota definition by running the filesystem quota tree show
command. Use this command to display the tree quota records in the following ways:
• By volume
• By specific path (for specific tree quotas only)
• For all users on the volume
Note!
Use either the back slash ( \ ) or forward slash (/) in this command. The NAS
Gateway always represents the directory structure with back slashes.
This command returns tree quota information regardless of whether the quota is
enabled or disabled. The quota configuration information is displayed in any of the
following ways:
• If the quota feature is enabled and the quota configuration contains no specific
directory quotas, the output of this command shows the default quotas on the
volume.
• If no limit or warning has been configured, the output of this command shows
infinite warning and limit levels.
• If no limit or warning has been configured, the output of this command shows
infinite for the warning and limit levels. Usage shows zero MiBs until usage occurs
on the volume.
• If the quota feature is disabled, the output shows unknown (disabled) to indicate
that usage cannot currently be measured because the quota software is disabled.
• If the quota build phase is in progress, the output of this command shows unknown
(rebuilding) to indicate that usage cannot currently be measured because the quota
software is rebuilding.
Options
Table 10-9 : Options for the filesystem quota tree show command
Table 10-9 : Options for the filesystem quota tree show command (Continued)
Example
The following example shows default tree quota information.
In this example, the default tree quota information on the volume techpubs is
displayed as follows:
• The state of the quota software on the volume. Valid values are either yes for
enabled, or no for disabled.
• The mode (either track only or enforce) that is configured on the quota.
• The absolute usage limit that is applied to everyone on the volume.
• The state of generating log messages for an event that meets or exceeds the
absolute limit shown in Limit. Valid values are yes for message generation, or no
for no message generation.
• The warning limit at which messages are generated to alert you when the usage is
approaching the absolute maximum.
• The state of generating log messages for an event that meets or exceeds the
warning limit shown in Warn. Valid values are yes for message generation, or no
for no message generation.
The following example shows a specific directory.
Directory: \dir1
Limit: 80 MiB
Warn: 75 MiB
Usage: 55 MiB
Nested: yes
eng38 ENG38VS0>
This example shows the warning, limit, and current usage for the directory /dir1 with
the following information:
• The directory name. The directory structure is always displayed with backslashes
( \ ) regardless of whether the directory itself is actually a Windows format ( \ ) or
UNIX format ( / ).
• The absolute usage limit for the directory /dir1.
• The warning threshold for the directory /dir1.
• The current usage for the directory /dir1.
• The state of the directory /dir1 as a simple or nested directory. A value of yes in the
Nested field indicates a nested directory; a value of no indicates a simple directory.
In the following example, all specific tree quotas on a volume are displayed.
Directory: \
Limit: infinite
Warn: infinite
Usage: 1066 MiB
Nested: no
Directory: \dir1
Limit: 80 MiB
Warn: 75 MiB
Usage: 55 MiB
Nested: yes
Directory: \dir2
Limit: 33 MiB
Warn: 22 MiB
Usage: 1011 MiB
Nested: yes
eng38 ENG38VS0>
In this example, the following information of all specific tree quotas configured on the
volume techpubs are displayed:
• The directory name. The directory structure is always displayed with backslashes
( \ ) regardless of whether the directory itself is actually a Windows format ( \ ) or
Related Commands
filesystem quota tree config Configures default tree quotas on a volume.
filesystem quota tree set Sets specific quotas on a directory, or changes
quota usage limits or warning thresholds.
Synopsis
filesystem quota user config VOLNAME [-d] [-e {enforce | trackonly}]
[-l LIMIT] [-L {yes|no}] [-w WARNING] [-W {yes | no}]
Description
You can configure user quota in the file system as default or specific user quotas.
Default user quotas are configured on a volume and apply to every user who accesses
the volume. With default user quotas you can configure a baseline of the same quota
conditions and behavior for all users who access a volume. Because the default user
quota on each volume applies to everyone, only one default user quota can exist on
each volume.
You can configure default user quotas in one of the following ways for managing
usage:
• Track only mode enables the NAS Gateway to track the user’s usage on the volume
without enforcing any results if the user exceeds the allocated amount of volume
space.
• Enforce mode enables the NAS Gateway to track the user’s usage on the volume
and enforce the quota.
Quotas are assigned to a volume, so run the filesystem quota user config
command from the context of the virtual server that contains the volume where you
want the quota defined. You can also use this command to change an existing default
user quota. Default user quota that already exist when you run the command are
updated with any arguments that have changed.
Note!
For this command to take effect, the virtual server needs to be enabled and the
volume needs to be online and in read-write mode. An online volume in read-
only mode cannot receive any new quota information until its is in read-write
mode.
Options
Table 10-10 : Options for the filesystem quota user config command
Table 10-10 : Options for the filesystem quota user config command
Table 10-10 : Options for the filesystem quota user config command
Table 10-10 : Options for the filesystem quota user config command
Example
In the following example a default user quota with all default parameters is
configured.
In this example, the default user quota is configured on the volume techpubs. Because
no custom quota parameters are specified, the quota is configured with the following
default parameters:
• Track only mode
• Infinite log and warning values
• No log limit, which disallows generating an event for the quota log when the
absolute usage limit is met or exceeded
• No log warning, which disallows generating an event for the quota log when the
absolute usage limit is met or exceeded.
In the following example a default user quota with custom parameters is configured.
In this example, a track-only default user quota is configured on the volume techpubs.
This quota is configured with the following values.
• Track only mode
• An absolute usage limit of 200 MiBs
• The ability to generate a log message when events meet or exceed the absolute
usage limit
• A warning threshold of 150 MiBs, to alert you when usage on techpubs is
approaching the absolute limit.
• The ability to generate a log message when usage meets or exceeds the warning
limit.
In the following example an enforce mode quota is configured.
In this example, an enforce mode default user quota is configured on the volume
techpubs. This quota is configured with the following parameters:
• Enforce mode
• An absolute usage limit of 160 MiBs
• The ability to generate a log message when events meet or exceed the absolute
usage limit
Because no other parameters are specified, the omitted parameters are set to the
following default values:
• Infinite warning limit
• No logging of events that exceed the warning threshold
Related Commands
filesystem quota user set Sets or changes quota usage limits or warning
thresholds for a specific user.
filesystem quota user show Shows user quota configuration or user quotas.
Synopsis
filesystem quota user set VOLNAME USERNAME [-l LIMIT] [-w WARNING]
[-d]
Description
You can configure user quotas in the file system as either default user quotas or
specific user quotas. Use specific user quotas to set specific usage conditions for
individual users that access the volume. These usage conditions for specific user
quotas are applied along with the default user quotas on the volume. When multiple
quotas are configured, the NAS Gateway analyzes all of them and applies the strictest
to offer the most control over usage. Specific user quotas are optional. If no user
quotas are configured, then no usage is tracked or enforced for each user.
You can configure specific user quotas with the filesystem quota user set
command. Use this command to set different limit and warning values for a special
user. You can also use the optional argument -d to reset a specific user quota’s limit
and warning values to the limit and warning values configured in the default user
quota.
You can configure specific quotas on the same volume as default user quotas. If
specific and default user quotas are configured on the same volume, both quotas are
processed when a disk allocation occurs, and the most restrictive usage case is
enforced.
Specific user quotas inherit the following quota parameters from the default quota
configured on a volume:
• Type (either enforce or track only)
• Log warning or no log warning
• Log limit or no log limit
Specific user quotas support specifying a UID, an NIS or LDAP name, or a Windows
name, for example:
• 99@onstor (LDAP or NIS UID format)
• gary@onstor (LDAP or NIS user name format)
• onstor\gary (Windows user name format)
User names need to be valid and known to the Windows or NIS domain controllers.
Because the NAS Gateway is multiprotocol, you can map CIFS and NFS users
between domain types through ID Mapping. You cannot assign a specific user quota to
UID 0.
Note!
It is possible to configure a 0 MiB quota. Although unusual, it is a valid
configuration in some cases. For example, assume that an employee no longer
works with you. You can set a 0 MiB enforce-mode quota on the user so that no
new usage can accumulate for that user name. Or, you can set a 0 MiB track-
only mode quota to allow additional usage to accumulate and post messages to
the quota log when any usage occurs for the departed user.
Options
Table 10-11 : Options for the filesystem quota user set command
Table 10-11 : Options for the filesystem quota user set command (Continued)
Example
In the following example a specific user quota is configured.
In this example, a specific user quota is set on the volume techpubs. The specific user
quota is applied to timg@onstor so that this user is allowed to access the volume
techpubs with the following custom conditions:
• Absolute usage limit of 400 MiBs
• Warning limit of 340 MiBs
Related Commands
filesystem quota user config Configures default user quotas on a volume.
filesystem quota user show Shows user quota configuration or user quotas.
Synopsis
filesystem quota user show VOLNAME [USERNAME|-all][-P PAGENUMBER
[-S PAGESIZE]]
Description
You can display a user quota definition by running the filesystem quota user
show command. Use this command to display the user quota records in the following
ways:
• By volume.
• By specific user name (for specific user quotas only)
• For all users on the volume
This command returns user quota information regardless of whether the quota is
enabled or disabled. The quota configuration information is displayed in any of the
following ways:
• If the quota feature is enabled and the quota configuration contains no specific user
quotas, the output of this command shows the default quotas assigned to everyone
on the volume.
• If no limit or warning has been configured, the output of this command shows
infinite warning and limit levels.
• If no limit or warning has been configured, the output of this command shows
infinite for the warning and limit levels. Usage shows zero MiBs until usage occurs
on the volume.
• If the quota feature is disabled, the output shows unknown (disabled) to indicate
that usage cannot currently be measured because the quota software is disabled.
• If the quota build phase is in progress, the output of this command shows unknown
(rebuilding) to indicate that usage cannot currently be measured because the quota
software is rebuilding.
Options
Table 10-12 : Options for the filesystem quota user show command
Example
The following example shows default user quota information on a volume.
In this example, the following default user quota information on the volume techpubs
is displayed:
• The state of the quota software on the volume. Valid values are either yes for
enabled, or no for disabled.
• The mode (either track only or enforce) that is configured on the quota.
• The absolute usage limit that is applied to everyone on the volume.
• The state of generating log messages for an event that meets or exceeds the
absolute limit shown in Limit. Valid values are yes for message generation, or no
for no message generation.
• The warning limit at which messages are generated to alert you when the usage is
approaching the absolute maximum.
• The state of generating log messages for an event that meets or exceeds the
warning limit shown in Warn. Valid values are yes for message generation, or no
for no message generation.
The following example shows information a specific user.
User: onstor\timg
Limit: default
Warn: default
Usage: 274 MiB
eng38 ENG38VS0>
In this example, the following warning, limit, and current usage information for the
specific user onstor\timg is displayed:
• The user name. You can display a UID along with user names.
• The absolute usage limit for the user pubs@onstor.
• The warning threshold for the user pubs@onstor.
• The current usage for the user pubs@onstor.
The following example shows information about all specific users.
User: UID5544@onstorlab
Limit: default
Warn: default
Usage: 500 MiB
User: rajeshk@onstorlab
Limit: 7777 MiB
Warn: 6666 MiB
Usage: 500 MiB
User: onstor\timg
Limit: default
Warn: default
Usage: 274 MiB
eng38 ENG38VS0>
This example shows all the specific users, and their limits, warning thresholds, and
current usage showing the following information:
• The user name. You can display a UID along with user names.
• The absolute usage limit for the user pubs@onstor.
• The warning threshold for the user pubs@onstor.
• The current usage for the user pubs@onstor.
Related Commands
filesystem quota user config Configures default user quotas on a volume.
filesystem quota user set Sets or changes quota usage limits or warning
thresholds for a specific user.
Filesystem Revert
Synopsis
filesystem revert VOLNAME
Description
This command reverts the filesystem to the previous version. This command should only
be used if the software needs to be reverted to a previous version where the latest filesystem
version, version 28, is not supported. Any current volume with a filesystem version greater
than 26 would have to be reverted using the filesystem revert command prior to revert
to the previous software version. The filesystem version is displayed by the volume show
VOLNAME output.The volume should be taken offline before executing this command.
Note!
When the filesystem revert command completes successfully,
there is no output to the console.
Options
The VOLNAME variable specifies an existing volume.
Related Commands
filesystem convert Converts the filesystem to the latest version.
volume offline Takes the specified volume offline.
volume show Displays volume information.
Synopsis
filesystem show stats cache [-n NODENAME | VOLNAME]
Description
File system cache statistics display in detail the cache usage for the file system,
including the traffic usage of I/O operations. You can display the file system cache
statistics by running the filesystem show stats cache command. This command
tracks the statistics for each NAS Gateway, so all statistics are displayed for all
volumes on the current NAS Gateway. You can specify a node or volume name to
view the cache statistics for a specific volume or a specific NAS Gateway.
Options
Table 10-13 : Options for the filesystem show stats cache command
Note!
Because the file system show stats cache command with the -n
NODENAME option runs from the NAS Gateway context and the command
with the VOLNAME option runs from the virtual server context, you cannot
combine both options in running the command.
Example
Table 10-14 shows the file system statistics that are tracked through the filesystem
show stats cache command.
Column Description
Type The type of file system metadata event that is tracked. Valid values are:
• inodebuf for the number of inode buffers cached.
• 8knondir for the number of 8K file system blocks not used in directory
functions that have been cached.
• 1knondir for the number of 1K file system blocks not used in directory
functions that have been cached.
• 8kdir for the number of 8K file system blocks used for directory operations.
• 1kdir for the number of 1K file system blocks used in directory functions
that have been cached.
• user for the number of times the user data cache has been used.
• inodes for the number of times the inode cache has been used.
• quotas for the number of time the quota cache has been used.
Max The current maximum size in units of the object cached, for example, a
1k or 8k block of data. The object tracked is listed in Type. This field is a
soft limit that interoperates with the LWM and HWM fields. When Max
reaches the LWM value, the cache can grow at internally computed
increments to, but not past the value listed in the HWM field.
Used The number of times the cache has been used for the object listed in
Type.
Dirty The number of times the objects listed in Type have been modified. This
statistic indicates that an object was written to disk.
Hits The number cache uses for each type of object listed in the Type field.
The number for this field shows how many times each listed object was
found in the cache.
Misses The number of cache misses for each type of object listed in the Type
field. The number in this field shows how many times an object of this
type was not found in the cache.
Column Description
COW The number of copy on write (COW) operations that have been used.
LWM The low watermark (LWM) for each object in the cache. This field
interoperates with the Max field to adjust the cache size. When Max
equals the LWM value, the cache is triggered to grow at internally
computed increments.
HWM The high watermark (HWM) for each object in the cache. This field
interoperates with the Max field to adjust the cache size. When Max
equals the LWM value, the cache is triggered to grow at internally
computed increments. The HWM field shows the absolute maximum to
which the cache can grow.
The second table in the display shows the file system I/O counters for various types of
read and write operations that are cached. Table 10-15 explains the columns in the I/O
section of the cache statistics display.
Table 10-15 : Columns in I/O section of cache statistics display
Column Description
I/O Type Indicates whether the statistic being tracked is a read or write
operation. The read and write operations tracked are for user
data read or write operations and metadata read or write
operations. A write operation indicates that a modified entry in
the cache was written to disk, and a read operation indicates that
an entry was read in from disk.
Current Pending The total number of read or write operations that were in
progress at the time the filesystem show stats show
cache command was run.
Max Pending The peak usage recorded for the Current Pending field.
Meta Total The total number of read or write operations for metadata.
Column Description
User Total The total number of read or write operations for user data.
Log Total The total number of read or write operations for the transaction
journal.
Synopsis
filesystem show stats cache hash [-n NODENAME | VOLNAME]
Description
File system information is hashed to more efficiently locate metadata in NAS Gateway
memory. The NAS Gateway’s file system cache hash statistics focus primarily on
inode and metadata usage. You can display the file system cache statistics by running
the filesystem show stats cache hash command. These statistics show
information about the following:
• Inodes
• Memory buffers
• User data
• Pages
• Disks
By default, this command tracks statistics for each NAS Gateway, so all statistics are
displayed for all volumes on the current NAS Gateway. You can specify a node name
or a volume name to view the cache hash statistics for a specific volume.
Options
Table 10-16 : Options for the filesystem show stats cache hash command
Note!
Because the filesystem show stats cache hash command with the
-n NODENAME option runs from the NAS Gateway context and the command
with the VOLNAME option runs from the virtual server context, you cannot
combine both options in running the command.
Example
File system statistics are displayed in three parts, which consist of two tables and a list.
Table 10-17 shows the first table of the file system cache hash statistics.
Table 10-17 : Columns in the cache statistics display
Column Description
Type The type of file system metadata event that is tracked. Valid values are:
• inodebuf for the number of inode buffers cached.
• 8knondir for the number of 8K file system blocks not used in
directory functions that have been cached.
• 1knondir for the number of 1K file system blocks not used in
directory functions that have been cached.
• 8kdir for the number of 8k file system blocks used for directory
operations.
• 1kdir for the number of 1K file system blocks used in directory
functions that have been cached.
• user for the number of times the user data cache has been used.
• inodes for the number of times the inode cache has been used.
• quotas for the number of time the quota cache has been used.
Max The current maximum size in units of the object cached, for example, a
1k or 8k block of data. The object tracked is listed in Type. This field is
a soft limit that interoperates with the LWM and HWM fields. When
Max reaches the LWM value, the cache can grow at internally computed
increments to the value listed in the HWM field.
Used The number of times the cache has been used for the object listed in
Type.
Dirty The number of times the objects listed in Type have been modified. This
statistic indicates that an object was written to disk.
Hits The number of cache uses for each type of object listed in the Type field.
The number for this field shows how many times each listed object was
found in the cache.
Column Description
Misses The number of cache misses for each type of object listed in the Type
field. The number in this field shows how many times an object of this
type was not found in the cache.
COW The number of copy on write (COW) operations that have been used.
LWM The low watermark (LWM) for the each object in the cache. This field
interoperates with the Max field to adjust the cache size. When Max
equals the LWM value, the cache is triggered to grow at internally
computed increments.
HWM The high watermark (HWM) for each object in the cache. This field
interoperates with the Max field to adjust the cache size. When Max
equals the LWM value, the cache is triggered to grow at internally
computed increments. The HWM field shows the absolute maximum to
which the cache can grow.
The second table in the display shows the file system I/O counters for various types of
read and write operations that are cached. Table 10-18 explains the columns in the I/O
section of the cache statistics display.
Table 10-18 : Columns in I/O section of cache statistics display
Column Description
I/O Type Indicates whether the statistic being tracked is a read or write
operation. The read and write operations tracked are for both user
data read or write operations and metadata read or write
operations. A write operation indicates that a modified entry in
the cache was written to disk, and a read operation indicates that
an entry was read in from disk.
Column Description
Current Indicates the total number of read or write operation that were in
Pending progress at the time the filesystem show stats cache
hash command was run.
Max Pending The peak usage recorded for the Current Pending field.
Meta Total The total number of read or write operations for metadata.
User Total The total number of read or write operations for user data.
Log Total the total number of read or write operations for the transaction
journal.
Example
• MetaBuf Inum Statistics shows the following metadata inum usage for the file
system:
- The total number of hash buckets available for distributing hashed
metadata buffer inums
- The total number of metadata buffer inums that have been hashed
- The total number of containers that have received hashed metadata
buffer inum information
- The maximum depth of each of the hash containers
- The average depth of each of the hash containers
Related Commands
filesystem show stats cache Shows filesystem cache statistics.
filesystem show stats cache verboseShows verbose cache statistics.
vsvr set Sets the current virtual server for all future
commands.
Synopsis
filesystem show stats cache verbose [-n NODENAME | VOLNAME]
Description
The file system tracks verbose cache statistics for metadata. Verbose cache statistics
track the usage of the write-back cache and the write-back daemon as follows:
• The write-back cache is used whenever a user or metadata object is modified and
the cache is full, causing the user or metadata to be written to disk.
• The write-back daemon is triggered on regular intervals and when specific file
system events occur.
You can display these file system cache statistics by running the filesystem show
stats cache verbose command. By default, this command tracks statistics for each
NAS Gateway. Therefore, all statistics are displayed for all volumes on the current
NAS Gateway. You can specify a node name or a volume name to view the verbose
cache statistics for a specific NAS Gateway volume.
Options
Table 10-19 : Options for the filesystem show stats cache verbose command
Optio
Object Description
n
Note!
Because the filesystem show stats cache verbose command
with the -n NODENAME option runs from the NAS Gateway context and the
command with the VOLNAME option runs from the virtual server context, you
cannot combine both options in running the command.
Example
<<display continues...>>
The file system statistics are displayed in three parts: two tables and a list. Table 10-20
shows the first table of the file system cache statistics.
Table 10-20 : Columns in the cache statistics display
Colum
Description
n
Type The type of file system metadata event that is tracked. Valid values are as
follows:
• inodebuf for the number of inode buffers cached.
• 8knondir for the number of 8K file system blocks not used in directory
functions that have been cached.
• 1knondir for the number of 1K file system blocks not used in directory
functions that have been cached.
• 8kdir for the number of 8k file system blocks used for directory operations.
• 1kdir for the number of 1K file system blocks used in directory functions that
have been cached.
• user for the number of times the user data cache has been used.
• inodes for the number of times the inode cache has been used.
• quotas for the number of time the quota cache has been used.
Max The current maximum size in units of the object cached, for example a 1k
or 8k block of data. The object tracked is listed in Type. This field is a
soft limit that interoperates with the LWM and HWM fields. When Max
reaches the LWM value, the cache can grow at internally computed
increments to the value listed in the HWM field.
Used The number cache uses for the object listed in Type.
Dirty The number of times the objects listed in Type have been modified. This
statistic indicates that an object was written to disk.
Hits The number of cache uses for each type of object listed in the Type field.
The number for this field shows how many times each listed object was
found in the cache.
Colum
Description
n
Misses The number of cache misses for each type of object listed in the Type
field. The number in this field shows how many times an object of this
type was not found in the cache.
COW The number of copy on write (COW) operations that have been used.
LWM The low watermark (LWM) for the each object in the cache. This field
interoperates with the Max field to adjust the cache size. When Max
equals the LWM value, the cache is triggered to grow at internally
computed increments.
HWM The high watermark (HWM) for each object in the cache. This field
interoperates with the Max field to adjust the cache size. When Max
equals the LWM value, the cache is triggered to grow at internally
computed increments. The HWM field shows the absolute maximum to
which the cache can grow.
The second table in the display shows the file system I/O counters for various types of
read and write operations that are cached. Table 10-21 explains the columns in the I/O
section of the cache statistics display.
Table 10-21 : Columns in I/O Section of cache statistics display
Column Description
I/O Type Indicates whether the statistic being tracked is a read or write
operation. The read and write operations tracked are for both user
data read or write operations and metadata read or write
operations. A write operation indicates that a modified entry in the
cache was written to disk, and a read operation indicates that an
entry was read in from disk.
Column Description
Current The total number of read or write operations that were in progress
Pending at the time the filesystem show stats cache verbose command
was run.
Max Pending The peak usage recorded for the Current Pending field.
Meta Total The total number of read or write operations for metadata.
User Total The total number of read or write operations for user data.
Log Total The total number of read or write operations for the transaction
journal.
Example
eng62 VS62L> filesystem show stats cache verbose
Ignore the VS context for global stats on local nas gateway
Cachestats for all volumes:
Type Max Used Dirty Hits Misses Hit % COW LWM HWM
------------------------------------------------------------------------------------------------
------
8knondir 5930 746 0 53420 9935 84.32 25 5930 17781
inodeBuf 17790 177 0 93573 2607 97.29 10 17790
53683
8kdir 1186 10 0 1358 59 95.84 14 1186 4294
1knondir 91391 13 0 417 13 96.98 0 91391 112154
1kdir 104447 10 0 219 48 82.02 2 104447 209375
totals 0 0 0 0 0 0.00 0 0 0
inodes 371367 217 0 1930 466 80.55 0 371367 918128
quotas 536 6 0 205 8 96.24 1 536 536
I/O Curr Max Meta User Log
Type Pending Pending Total Total Total
------------------------------------------------------------------
read 0 259 11897 490 355
write 0 258 4628 48 2850
Writeback buf for inode: superblock disk_writes: 154 trans_writes: 192
Writeback buf for inode: inode inode disk_writes: 1292 trans_writes: 1793
Writeback buf for inode: root inode disk_writes: 13 trans_writes: 171
Writeback buf for inode: ref count inode disk_writes: 3002 trans_writes: 8899
Writeback buf for inode: unused inode disk_writes: 13 trans_writes: 98
Writeback buf for inode: full block inode disk_writes: 7 trans_writes: 126
Writeback buf for inode: dir in inode disk_writes: 8 trans_writes: 230
Writeback buf for inode: quota inode disk_writes: 70 trans_writes: 221
Writeback buf for inode: trashcan inode disk_writes: 1 trans_writes: 3
Writeback buf for inode: snapshot dir inode disk_writes: 27 trans_writes: 207
Writeback buf for inode: system hidden disk_writes: 9 trans_writes: 67
Writeback buf for inode: cifs shares disk_writes: 16 trans_writes: 26
Writeback buf for inode: unused disk_writes: 13 trans_writes: 2760
wb wakeup counts:
eventType meta user
sync 65 0
inoSync 113 0
waiter 1139305 0
periodic 284877 284877
resched 1139337 0
quotaSync 7 0
Max per Loop 16 1
inode cleaner counts:
all 59
start 56
Max per Loop 5
eng62 VS62L>
Table 10-22 shows the write-back buffer action for inodes and explains what each
entry means.
Table 10-22 : Write-back Buffer for Inodes statistics
bad inode disk_writes The number of bad inode disk write operations.
This statistic shows the number of times a bad
inode was written to disk.
trans_writes The number of bad inode transaction write
operations. This statistic shows the number of
transactions that modified an inode with the type
Bad.
inode inode disk_writes The number of inode disk write operations. This
statistic shows the number of times an inode with
the type Inode was written to disk.
trans_writes The number of inode transaction write operations.
This statistic shows the number of transactions that
modified an inode with the type Inode.
ref count inode disk_writes The number of reference count inode disk write
operations. This statistic shows the number of times
an inode with the type reference count was written
to disk.
trans_writes The number of reference count inode transaction
write operations. This statistic shows the number of
transactions that modified an inode with the type
Ref Count.
snapshot dir inode The number of snapshot directory inode disk write
disk_writes operations. This statistics shows the number of
times an inode with the type snapshot directory was
written to disk.
The file system cache verbose statistics also display write-back wake up statistics in a
table. These statistics track specific events that activate the file system’s write-back
daemon, which in turn, triggers the write-back of user data or metadata from the write
back cache to disk. Table 10-23 shows the write-back wake up statistics. These
statistics are tracked for both user data buffers and metadata buffers.
Table 10-23 : Write-back Wake Up statistics
Field Description
Field Description
The file system cache verbose statistics also show the Inode cleaner statistics. The
inode cleaner triggers the write back of inodes to disk. These statistics monitor the
following information:
Related Commands
filesystem show stats cache hash Shows statistics related to hash utilization of the
cache.
filesystem show stats cache verboseShows verbose cache statistics.
vsvr set Sets the current virtual server for all future
commands.
Synopsis
filesystem show stats performance [-n NODENAME | VOLNAME]
Description
The file system performance statistics show information about the runtime operation
of the file system based on specific file system request types. The performance
statistics also list average response or completion times for each file system request
type. Through the completion times you can assess file system performance by noting
how quickly requests are processed. Many of the file system requests tracked resemble
NFS v3 or CIFS file system requests.
You can view performance statistics by running the filesystem show stats
performance command. By default, this command tracks statistics for each NAS
Gateway, so all statistics are displayed for all volumes on the current NAS Gateway.
You can specify a node name or a volume name to view the performance statistics for
a specific volume.
Options
Table 10-24 : Option for the filesystem show stats performance command
Optio
Object Description
n
Note!
Because the filesystem show stats performance command with
the -n NODENAME option runs from the NAS Gateway context and the
command with the VOLNAME option runs from the virtual server context, you
cannot combine both options in running the command.
Example
Total ops: 10
Average response time: 1988 usecs
Average cpu usage: 1099 usecs
Cur/Max active requests: 0/1
Max contexts: 5
Total bytes Tx over hyper channel to TXRX: 0
Total bytes Rx over hyper channel from TXRX: 11857192
eng38 ENG38-VS1>
The file system performance statistics are displayed in two sections. The first section
is a table of the completion times for each file system request. Table 10-25 shows the
columns in this display and explains what each column shows.
Table 10-25 : Columns, File System Performance Statistics Display
Column Description
ReqType The type of file system request that is tracked. The file
system requests tracked through this field support NFS
v3 and CIFS.
count The number of each type of file system request that is
tracked.
cpuUsec The average response time, in microseconds, that a
CPU has dedicated to each type of file system request.
ioUsec The average time, in microseconds, that is spent
waiting on each file system request.
lockUsec The average response time, in microseconds, that is
spent waiting for shared or exclusive locks to be
applied.
admUsec The average response time, in microseconds, that the
CPU is waiting for administrative operations to
complete.
elapsed The average elapsed time, in microseconds, for each
file system request completed.
The second section of the file system performance statistics contains the following
totals for all file system requests served:
• Total Ops shows the number of file system operations.
• Cur/Max active requests shows the current and peak number of active file system
requests.
• Max Contexts shows the number of file system contexts being tracked.
• Total bytes Tx over hyper channel to TXRX shows the number of bytes that are
transmitted to the file system transmit/receive data mover through the hyper
channel subprotocol.
• Total bytes Rx over hyper channel from TXRX shows the number of bytes that are
received from the file system transmit/receive data mover through the hyper
channel subprotocol.
Related Commands
filesystem show stats performance daemonShows file system performance statistics
related to background daemons running in the
EverON™ operating system.
filesystem show stats performance ioShows file system performance statistics
related to disk input/output.
vsvr set Sets the current virtual server for all future
commands.
Synopsis
filesystem show stats performance daemon [-n NODENAME | VOLNAME]
Description
The file system daemon statistics show performance statistics of the NAS Gateway’s
daemons. These statistics list average response or completion times for each file
system request type.
You can display the file system daemon performance statistics by running the
filesystem stats show performance daemon command. By default, this
command tracks statistics for each NAS Gateway, so all statistics are displayed for all
volumes on the current NAS Gateway. You can specify a volume name to view the
daemon performance statistics either for a specific NAS Gateway or for a specific
NAS Gateway volume.
Options
Table 10-26 : Option for the filesystem show stats performance daemon
command
Note!
Because the filesystem show stats performance daemon
command with the -n NODENAME option runs from the NAS Gateway
context and the command with the VOLNAME option runs from the virtual
server context, you cannot combine both options in running the command.
Example
In this section of the file system daemon performance commands, the average
response times are listed per file system request, and at the bottom of this display, the
totals and average of the totals are displayed. Table 10-27 shows the contents of the
file system requests, and explains what each column tracks.
Table 10-27 : Columns in the File System Performance statistics display
Column Description
ReqType The type of file system request that is tracked. The file
system requests tracked through this field support NFS
v3 and CIFS.
count The number of each type of file system request that is
tracked.
cpuUsec The average response time in microseconds that a CPU
has dedicated to each type of file system request.
ioUsec The average time in microseconds that is spent waiting
on each file system request.
lockUsec The average response time in microseconds that is
spent waiting for shared or exclusive locks to be
applied.
admUsec The average response time in microseconds that the
CPU is waiting for administrative operations to
complete.
elapsed The average elapsed time in microseconds for each file
system request completed.
The bottom of this section of the file system performance statistics contains the
following totals for all file system requests served:
• Total Ops shows the number of file system operations.
• Cur/Max active requests shows the current and peak number of active file system
requests.
• Average response time shows the average amount of time in microseconds that file
system operations take to complete. This number is based on the number displayed
in the Total Ops field.
• Average CPU usage shows the average amount of time in microseconds that the
CPU takes to process each file system operation. This number is based on the
number displayed in the Total Ops field.
• Max Contexts shows the number of file system contexts that are tracked.
• Total bytes Tx over hyper channel to TXRX shows the number of bytes that are
transmitted to the file system transmit/receive data mover through the hyper
channel subprotocol.
• Total bytes Rx over hyper channel from TXRX shows the number of bytes that are
received from the file system transmit/receive data mover through the hyper
channel subprotocol.
The following statistics are displayed in the second table of the file system daemon
performance statistics.
eng38 ENG38-VS1> filesystem show stats performance daemon
Thread Statistics (total times in usec since last reset)
ReqType cpuUsec ioUsec lockUsec admUsec tape
read
tape write elapsed
-------------------------------------------------------------------
------------------------------
invalid 0 0 0 0 0
0 0
wblog 0 0 0 0 0
0 0
wbmeta 0 0 0 0 0
0 0
wbuser 0 0 0 0 0
0 0
inoclnr 0 0 0 0 0
0 0
inogrow 0 0 0 0 0
0 0
inocnt 0 0 0 0 0
0 0
refcnt 0 0 0 0 0
0 0
snap 0 0 0 0 0
0 0
freezer 0 0 0 0 0
0 0
alloc 0 0 0 0 0
0 0
buddy 0 0 0 0 0
0 0
trash 0 0 0 0 0
0 0
dump 0 0 0 0 0
0 0
max daemon 0 0 0 0 0
0 0
(null) 0 0 0 0 0
0 0
invalid 0 0 0 0 0
0 0
buf 0 0 0 0 0
0 0
eng38 ENG38-VS1>
Table 10-28 shows the columns that are tracked in this section of the file system
daemon performance statistics and explains what statistics are tracked.
Table 10-28 : Columns in the File System Performance Statistics Display
Column Description
Related Commands
filesystem show stats performance Shows file system performance statistics.
filesystem show stats performance ioShows file system performance statistics
related to disk input/output.
vsvr set Sets the current virtual server for all future
commands.
Synopsis
filesystem show stats performance io [-n NODENAME | VOLNAME]
Description
The file system I/O performance statistics track the operation and performance of
specific user data and metadata functions. The file system I/O performance statistics
include the standard file system performance statistics for reference, but the I/O
statistics elaborate on the statistics tracked in the ioUsec column. The statistics in this
column are provided as more detailed statistics and counters for each of the supported
file system request types. Many of the file system requests tracked resemble NFS v3 or
CIFS file system requests, just like the file system performance statistics.
You can view I/O performance statistics by running the filesystem show stats
performance io command. By default, this command tracks statistics for each NAS
Gateway, so all statistics are displayed for all volumes on the current NAS Gateway.
You can view the I/O performance statistics either for a specific NAS Gateway or for a
specific NAS Gateway volume.
Options
Table 10-29 : Option for the filesystem show stats performance io command
Table 10-29 : Option for the filesystem show stats performance io command
Note!
Because the filesystem show stats performance io command
with the -n NODENAME option runs from the NAS Gateway context and the
command with the VOLNAME option runs from the virtual server context, you
cannot combine both options in running the command.
Example
<<display continues...>>
Table 10-31 explains what type of information each column in the output displays.
Table 10-30 : Columns in the File System Performance statistics display
Column Description
ReqType The type of file system request that is tracked. The file
system requests tracked through this field support NFS v3
and CIFS.
Column Description
The following statistics are the detailed statistics from the ioUsec column of the first
section of file system I/O.
Table 10-31 shows what each column in the ioUsec column of detailed file system
statistics display contains and explains what each field means.
Table 10-31 : Detailed file system I/O statistics
Column Description
ReqType The type of file system request that is tracked. The file
system requests tracked through this field support NFS
v3 and CIFS.
Count The number of each type of file system request that is
tracked.
UserRead The time in microseconds that each request type has
spent waiting for user read I/O.
UserWrite The time in microseconds that each request type has
spent waiting for user write I/O.
commit The time in microseconds that each request type has
spent waiting for an NFS commit.
MetaRead The time in microseconds that each request type has
spent waiting for metadata read I/O.
MetaWrite The time in microseconds that each request type has
spent waiting for metadata write I/O.
Log The time in microseconds that each request type has
spent waiting for transaction log I/O.
The last section of the file system performance statistics i/o example contains the
following totals for all file system requests served:
• Total Ops shows the number of file system operations.
• Cur/Max active requests shows the current and peak number of active file system
requests.
• Cur/Max log transactions shows the current and peak number of transaction
journal transactions.
• Max Contexts shows the number of file system contexts that are tracked.
• Total bytes Tx over hyper channel to TXRX shows the number of bytes that are
transmitted to the file system transmit/receive data mover through the hyper
channel subprotocol.
• Total bytes Rx over hyper channel from TXRX shows the number of bytes that are
received from the file system transmit/receive data mover through the hyper
channel subprotocol.
Related Commands
filesystem show stats performance Shows file system performance statistics.
filesystem show stats performance daemonShows file system performance statistics
related to background daemons running in the
EverON operating system.
vsvr set Sets the current virtual server for all future
commands.
Synopsis
filesystem show stats resource [-n NODENAME | VOLNAME]
Description
Prior to running a file system request, the NAS Gateway runs a resource checking
algorithm to determine whether enough resources exist to provide a reasonable
attempt at completing the request. If resources exist, the file system request completes.
If no resources exist, the file system request is blocked and queued, while the NAS
Gateway rechecks resource availability.
The file system resource statistics show file system resource usage and availability
prior to a file system request being completed. These conditions are displayed as
counters that describe the number of successful or blocked file system requests.
You can display the file system resource performance statistics by running the
filesystem show stats resource command. By default, this command tracks
statistics for each NAS Gateway, so all statistics are displayed for all volumes on the
current NAS Gateway. You can view the resource statistics either for a specific NAS
Gateway or for a specific NAS Gateway volume.
Options
Table 10-32 : Option for the filesystem show stats resource command
Note!
Because the filesystem show stats resource command with the -
n NODENAME option runs from the NAS Gateway context and the command
with the VOLNAME option runs from the virtual server context, you cannot
combine both options in running the command.
Example
Total: 0
Log/Alloc Count
--------------------------------------
Forced write due to TO 0
Ongoing Trans not decr 0
Alloc in cont space 0
No emap found in alloc 0
Rnd alloc in cont space 0
Rnd alloc over compl disk 0
Total: 0
Other Count
--------------------------------------
Memory cleaner called 0
eng46>
This display contains two sections. The first section shows resource checking counters
for individual file system operations. The counters in this section do not indicate errors
and check for the following:
• No log resource shows the number of times that the transaction journal did not
have enough resources to complete a transaction.
• No user buffer resource shows the number of times that not enough buffers were
available for user data operations to complete.
• No meta 8knondir resource shows the number of times that not enough resources
were available for 8k nondirectory metadata operations to complete.
• No meta 1knondir resource shows the number of times that not enough resources
were available for 1k non-directory metadata operations to complete.
• No meta 8kdir resource shows the number of times that not enough resources were
available for 8k directory metadata operations to complete.
• No meta 1kdir resource shows the number of times that not enough resources were
available for 1k directory metadata operations to complete.
• No inode cache resource shows the number of times that not enough resources
were available in the inode cache.
• No memory resource shows the number of times that not enough memory was
available.
• No sac buffer cache shows the number of times that no storage access control
(SAC) buffers were available in the cache.
• No ultra buffer cache shows the number of times that no ultra buffers were
available in the cache.
• No vol log buffer resource shows the number of times that no log buffers were
available for a volume.
• No thread/esm/stack resource shows the number of times that no threads, state
machines, of thread stacks were available.
• No edesc/buf shows the number of times that no E descriptors or buffers were
available.
• Blocked for snapshot shows the number of times that file system operations were
temporarily suspended for the completion of a snapshot.
• Blocked in pause state shows the number of times that file system operations were
temporarily suspended because the resource was in pause state.
• No IO resource shows the number of times that no resources were available for
processing user or metadata I/O.
The second section contains metrics that track and quantify the occurrence of specific
events in the file system. The counters in this section do not indicate errors.
• Forced write due to TO shows the number of times file system information was
written to disk due to a time-out.
• Ongoing trans not decr shows the number of currently active transaction that have
not been decremented.
• Alloc in cont space shows the number of blocks that have been allocated in a
contiguous space.
• No emap found in alloc shows the number of times the file system has not found an
Emap entry in the resource allocation.
• Rnd allocat in cont space shows the number of blocks that have been randomly
allocated in a contiguous space.
• Rnd allocat over compl disk shows the number of number of blocks that have been
randomly allocated over a complete disk.
• Memory cleaner called shows the number of times the buffer cache was cleaned up
because the NAS Gateway encountered a low memory resource condition.
Related Commands
vsvr set Sets the current virtual server for all future
commands.
ID Map Delete
Synopsis
idmap delete {user | group} INDEX
Description
You can delete an ID mapping at any time. When you delete an ID mapping, the user
or group for which you created the mapping can no longer be translated between a
common Internet file services (CIFS) or network file services (NFS) domain.
Therefore, that user or group can log on to their native domain only. For example, a
native Windows user or group is no longer be able to log on to an UNIX domain, and a
native UNIX user or group is no longer be able to log on to a Windows domain.
Note!
The entries in the identity list are numbered sequentially, so when you delete an
index entry, the remaining entries renumber to move up or down in the identity
list to keep a contiguous range of numbers.
Options
Table 11-1 : Options for the idmap delete command
Example
In the following example, a user is added.
In this example, the ID Map at index 1 is deleted. After deleting this entry, the user is
longer mapped between the domains based on the conditions applied in ID Map 1.
However, if other mappings, such as one for a group that the user is a member of, or a
default mapping for the user name, still exists, the user is able to map between CIFS
and NFS by using those rules.
In the following example, a group is deleted.
In this example, the ID Map at index 1 is deleted. After deleting this entry, the group is
no longer mapped between the domains based on the conditions applied in ID Map 1.
However, if other mappings, such as the default mapping for the group name, still
exists, the group is able to map between CIFS and NFS by using those rules.
Related Commands
domain add ldap Adds an LDAP domain to the NAS Gateway.
domain add nis Adds an NIS domain to the NAS Gateway.
domain add windows Adds an Windows domain to the NAS Gateway.
idmap insert user Inserts a user identity mapping between NIS or
LDAP and Windows identities.
idmap edit user Edits a user existing identity mapping between
NIS or LDAP and Windows entities.
idmap notify user Allows the administrator to notify that an
external configuration change may have an
impact on user identity mapping.
ID Map Edit
Synopsis
idmap edit {user | group} INDEX
Description
The ONStor™ NAS Gateway supports identity mapping between UNIX and Windows
domains. With identity mapping, you can specify the following translations:
• How UNIX user and group IDs (UIDs and GIDs, respectively) are translated to
Windows users and groups
• How Windows users and groups are translated to UNIX UIDs and GIDs
You can edit an ID mapping by running the idmap edit command. Editing allows you
replace an ID mapping in the identity list. As part of this command, you need to
specify an index number, which is a numeric value, that indicates which entry in the
list is to be replaced.
Options
Table 11-2 : Options for the idmap edit command
Usage
When you run the idmap edit user or idmap edit group command, you are
prompted to type the user or group mapping, which takes the form:
Enter the user mapping: windowsDomain\name ==/<=/=> name@unixDomain
(*=wildcard, name empty=no mapping)
or
Enter the group mapping: windowsDomain\name ==/<=/=> name@unixDomain
(*=wildcard, name empty=no mapping)
Mapping information takes three building blocks: the Windows identity, the mapping
director, and the NFS identity. The building blocks consist of the following:
• The first building block is windowsDomain\name, where name is a Windows user
or group name that is mapped to a UNIX user or group. Separate the
windowsDomain and name components with a back slash (\). Both components
support an asterisk (*) to represent “any” or a blank space to represent no mapping.
For example:
spectrum\domain admins
spectrum\*, or spectrum\
• The second building block is the mapping director. The NAS Gateway supports
unidirectional or bidirectional translation:
Example
In the following example a user is edited. This command takes two steps.
In this example, the user spectrum\paulw is mapped between Windows and UNIX
domains. When the mapping is complete, Windows user spectrum\paulw can access
files in the NFS/UNIX domain chromatis and the UNIX user pwilson@chromatis can
access CIFS/Windows files in the CIFS/Windows domain spectrum.
In the following example a group is edited. This command takes two steps.
In this example, the index entry 1 is edited. In this entry, the group spectrum\domain
admins is mapped between Windows and UNIX domains. When the mapping is
complete, members of the windows group domain admins can access files in the NFS/
Related Commands
domain add ldap Adds an LDAP domain to the NAS Gateway.
domain add nis Adds an NIS domain to the NAS Gateway.
domain add windows Adds an Windows domain to the NAS Gateway.
idmap insert user Inserts a user identity mapping between NIS or
LDAP and Windows identities.
idmap edit user Edits a user existing identity mapping between
NIS or LDAP and Windows entities.
idmap notify user Allows the administrator to notify that an
external configuration change may have an
impact on user identity mapping.
idmap show user Shows the user identity mapping lists.
ID Map Insert
Synopsis
idmap insert {user | group} INDEX
Description
You can create and insert an ID mapping by running the idmap insert command.
This command inserts a mapping rule in the identity list, which lists all Windows users
and groups. The identity list contains two sections: one for users and one for groups.
As part of the idmap insert command, you need to specify an index number, which
is a numeric value that indicates where in the list the ID mapping is added.
Note!
By default, the NAS Gateway maps the user name between domains, so you
only need to add an ID map if the user name is different. For example, if the
Windows user paulw keeps the user name paulw in the UNIX/NFS domain,
there is no need to add an ID map.
Creating an ID map is a two step process that starts with specifying the ID type, either
user or group, and an index number. After entering this portion of the command, press
Enter and at the prompt type the name mapping as the second step.
Options
Table 11-3 : Options for the idmap insert command
Usage
When you run the idmap insert user or idmap insert group command, you are
prompted to type the user or group mapping, which takes the form:
Example
In the following example, a user is added. This command takes two steps.
In this example, the group spectrum\paulw is mapped between Windows and UNIX
domains. When the mapping is complete, Windows user spectrum\paulw can access
files in the NFS/UNIX domain chromatis and the UNIX user paulwilson@chromatis
can access CIFS/Windows files in the CIFS/Windows domain spectrum.
In the following example, a group is added. This command takes two steps.
In this example, the user spectrum\domain admins is mapped between Windows and
UNIX domains. When the mapping is complete, members of the windows group
domain admins can access files in the NFS/UNIX domain chromatis and users from
the NFS/UNIX domain chromatis can access files in the CIFS/Windows domain
spectrum.
Related Commands
domain add ldap Adds an LDAP domain to the NAS Gateway.
domain add nis Adds an NIS domain to the NAS Gateway.
domain add windows Adds an Windows domain to the NAS Gateway.
idmap insert user Inserts a user identity mapping between NIS or
LDAP and Windows identities.
Synopsis
idmap notify change {user | group}
Description
Because the NAS Gateway is a multiprotocol device, it can serve clients in both NFS
and CIFS environments. CIFS users are mapped to NFS users and NFS users are
mapped to CIFS users through ID mapping.
Certain conditions on the Windows or NIS or LDAP domain controllers can affect
how the NAS Gateway recognizes and maps NFS and CIFS users through the ID map.
For example, if a new NIS or LDAP user name is created, it might cause a new
mapping to match to a CIFS user that did not exist before. In this situation, the NAS
Gateway needs to update some system cache information and user and group
mappings in the security file. You can affect an explicit update by running the idmap
notify change command.
The idmap notify change command is helpful for situations where you know of
changes to the Windows or NIS or LDAP configuration. For example, assume you
need to change an NIS or LDAP map on your NIS or LDAP server. When you add an
entry for the user timg to your NIS or LDAP password map, you know it will have an
impact on the NAS Gateway’s identity mapping because timg has an account in a
Windows domain. In this situation, use the idmap notify change command so that
quotas are recomputed to properly account for the charge.
Use the idmap notify change command to alert the NAS Gateway to changes in the
ID map. With this command, the NAS Gateway can reconstruct the ID map with new
quota-related information. When the new ID map is constructed, internal caches and
the user and group records in the security file are refreshed. Therefore, the relevant
entries are updated to use the most recent version of the ID map, which ensures that
the user and group entries are kept current. The idmap notify change command
invokes a quota rebuild phase.
Options
user|group specifies whether to update the ID mappings of
either users or groups.
Example
Related Commands
domain add ldap Adds an LDAP domain to the NAS Gateway.
domain add nis Adds an NIS domain to the NAS Gateway.
domain add windows Adds an Windows domain to the NAS Gateway.
idmap insert user Inserts a user identity mapping between NIS or
LDAP and Windows identities.
idmap edit user Edits a user existing identity mapping between
NIS or LDAP and Windows entities.
idmap notify user Allows the administrator to notify that an
external configuration change may have an
impact on user identity mapping.
idmap show user Shows the user identity mapping lists.
ID Map Show
Synopsis
idmap show {all | user | group} [-P PAGENUMBER [-S PAGESIZE]]
Description
When you configure ID mappings, the NAS Gateway adds the user and group
mappings to the identity list. You can display the identity list by running the idmap
show command.
The identity list contains separate sections for user and group mappings. As part of this
command, you can filter the output by specifying the type of ID mapping, either user
or group, that you want the NAS Gateway to display. You also can use the all
keyword to see both sections of the identity list.
The identity list contains information about the user or group names for CIFS and
NFS, the index number for each mapping, and the direction of name mapping.
Options
Table 11-4 : Option for the idmap show command
Example
In this example, all ID maps are shown. The identity list contains the user or group, the
index number associated with the user or group, and the identity map semantic, which
includes the Windows domain and user, the translation director to indicate which way
the mapping works, and the UNIX user and domain. When the identity list is
displayed, the NAS Gateway shows the users section first, and the groups section last.
Interface Create
Synopsis
interface create INTERFACE -l LPORT [-s (enable | disable)]
[-t VLANTAG] [-a IPADDR/MASKLEN] [,IPADDR/MASKLEN] ...]
[-p [cifs=(enable | disable)], [nfs=(enable | disable)]]
[-w PRIMARYIPADDR [,SECONDARYIPADDR]]
Description
A virtual server uses interfaces to support file system services. Interfaces are created
by using logical ports. You can associate multiple interfaces within a virtual server
with the same logical port. When creating an interface, you can also configure WINS
server IP addresses and enable or disable CIFS and NFS protocols. You can also assign
a VLAN tag to the interface enabling the NAS Gateway to process 802.1q packets
Options.
Table 12-1 : Options for interface create command
Example
In the following example, the interface eth0 is created using the default lport fp.1.
In the following example, the interface eth1 is created using the user-defined lport
mylport. The VLAN tag is set to 120.
Related Commands
interface delete Deletes an IP address from a physical interface.
route add Adds a static route to any node within a cluster.
interface modify Modifies any of the interface’s parameters. Use
this command to add or delete IP addresses.
Interface Delete
Synopsis
interface delete INTERFACE
Description
Use the interface delete command to delete an interface. When you delete an
interface, ensure that no IP addresses are associated with it. Use the interface
modify command to remove IP addresses. See “Interface Modify” on page 12-6.
Options
The INTERFACE variable specifies the interface you are deleting.
Example
Related Commands
interface create Assigns an IP address to a physical interface.
interface modify Modifies any of the interface’s parameters. Use
this command to add or delete IP addresses.
Interface Modify
Synopsis
interface modify INTERFACE -l LPORT [-s (enable | disable)]
[-t VLANTAG][-a IPADDR/MASKLEN] [,IPADDR/MASKLEN] ...]
[-d IPADDR [,IPADDR]...][-p [cifs=(enable | disable)], [nfs=(enable |
disable)]] [-w PRIMARYIPADDR [,SECONDARYIPADDR]]
Description
A virtual server uses interfaces to support file system services. Interfaces are created
by using logical ports. You can associate multiple interfaces within a virtual server
with the same logical port. When creating an interface, you can also configure WINS
server IP addresses and enable or disable CIFS and NFS protocols. You can also assign
a VLAN tag to the interface enabling the NAS Gateway to process 802.1q packets.
Use the interface modify command to modify the parameters of an existing
interface.
Options.
Table 12-2 : Options for interface modify command
Note!
On the SSC, interfaces are created by default (sc1 and sc2). Only the -s, -a, and
-d options are supported on the SSC, for example, interface modify sc1 -a
100.2.3.1/16 and interface modify sc2 -d 100.5.3.1/16.
Example
In this example, the state of the interface fp.1 is modified from enabled to disabled.
Related Commands
interface create Creates an interface on a physical interface.
interface delete Deletes an interface from a physical interface.
route add Adds a static route to any node within a cluster.
Interface Show
Synopsis
interface show {interface | ip} [-a SPEC] [-n NODE] (NAS Gateway
context)
interface show {interface | ip} [-a SPEC] (virtual server context)
Description
Use the interface show command to display one of two tables on the NAS Gateway:
• The IP table, which contains all IP addresses assigned to interfaces.
• The interfaces table, which contains all interfaces.
With the interface show command, you can also view a specific entry in either of
the tables.
Note!
The output of this command differs depending on the context in which you run
the command. If you are in the NAS Gateway context when you run the
command, the display shows information for the SSC only. If you are in the
virtual server context, the display shows only the information for that specific
virtual server.
Options
Table 12-3 : Options for the interface show command
Example
The following example shows the interface table in NAS Gateway context.
This table lists the SSC interfaces configured on the NAS Gateway. The interfaces
table contains the following information:
• Interface shows the name of the interface. Valid values are:
- sc1 is the SSC’s 10/100 management port connection, which is the left
port as you look at the SSC faceplate.
- sc2 is the SSC’s 10/100 management port connection 2, which is the
right port as you look at the SSC faceplate.
Note!
The sc1 and sc2 interfaces are created by default. Use the interface
modify command to modify these two interfaces.
• Admin shows the state as UP when the interface is enabled and DOWN when the
interface is disabled.
• Operation shows the link state.
• Mac Address column indicates the hardware address of the device.
• LPORT shows the name of the logical port used by the interface.
The following example shows the interface table in virtual server context.
This table lists all interfaces configured on the specified virtual server. The interface
table consists of the following information:
• Interface shows the name of each interface. Valid values are:
• Admin shows the state as UP when the interface is enabled and DOWN when the
interface is disabled.
• Operation shows the link state.
• Mac Address column indicates the hardware address of the device.
• LPORT shows the name of the logical port used by the interface.
• Vlan show the VLAN tag. A value of 0 indicates that VLAN tagging is disabled.
The following example shows the IP table in NAS Gateway context.
This table lists all IP interfaces configured on the NAS Gateway. The IP table consists
of the following information:
• dest column shows the IP addresses supported on the interface.
• mask column shows the subnet masking for the IP address on the interface.
• interface column shows the interface name. Valid values are:
- lo0, which is the system data bus.
- sc1 or sc2, or both, which indicates the SSC’s 10/100 management
interfaces.
Note!
You cannot modify the IP addresses of sc1 and sc2 once the NAS Gateway is
part of a cluster of two or more.
The following example shows the IP table in virtual server context.
This table lists all IP interfaces configured on the virtual server. The IP table consists
of the following information:
Localmap Edit
Synopsis
localmap edit (passwd|group|netgroup) [(-g|-s)]
Description
You can create and edit local NIS password and group files for multiprotocol access by
running the localmap edit command. This command starts a vi editor where you can
modify the password and group files. You need to be in the virtual server context to
run this command. You can use this command to do the following:
• Add user names and IDs, and group names and IDs to the password and group
files.
• Delete user names and IDs, and group names and IDs from the password and
group files.
Options
Table 13-1 : Option for localmap edit command
Example
Related Commands
domain add nis Adds the NIS domain specified.
localmap import Imports password and group files for
multiprotocol access from an FTP server.
Localmap Import
Synopsis
localmap import {passwd|group|netgroup} LOCATION
Description
You can import the password and group files for multiprotocol file access from an FTP
server by issuing the localmap import command. You need to be in the virtual server
context to run this command.
Options
Table 13-2 : Options for localmap edit command
Example
In the following example, a password is imported.
Related Commands
domain add nis Adds the NIS domain specified.
localmap edit Edits password and group files for multiprotocol
access.
Lport Create
Synopsis
lport create LPORTNAME -m {single | failover | aggregation} -a
PORTS
-s {enable | disable}
Description
Logical port names are logical constructions that enable you to group links so that they
appear as one single entity.
You can create a logical port by running the lport create command. You can assign
one of three modes of operation to the port you create: single, failover, or aggregation.
The logical port’s behavior differs depending on which one of the following modes
you assign:
• Single mode, where a single active link of the logical port carries traffic. In this
mode no provisions for failover or load balancing exist.
• Failover mode, where only one active physical port of the logical port carries
traffic. The other physical link on the logical port is available to carry traffic but
only if the active link becomes unavailable. When the active link state changes to
DOWN, the live backup link can assume operation as the new active physical link,
and continue carrying traffic after a switch over. During switchover, packet
retransmission is governed by higher layers of the IP protocol suite such as
transport control protocol (TCP) or user datagram protocol (UDP).
Note!
For each logical port, configure a preferred link or port. After setting the
preferred port, the port becomes the active port for the logical port as long as
the preferred port is UP. You can set the preferred port by running the lport
prefer command.
• Aggregation mode, where all links in the logical port are considered active and
carry traffic simultaneously. In a link-aggregated configuration, the traffic is load
balanced across all physical links that are associated with the logical port. In link-
aggregated mode, the traffic has an inherent redundancy. For example, if three
links are configured in the same logical port, and one of the links is put into the
DOWN state, the traffic continues along the other two links in a load-balanced
manner.
The lport create command needs to have at least one link but cannot have more
than four links. When you create a logical port, you can also enable or disable it.
When creating a logical port, consider the following:
• A logical port, default or user defined, that has already been associated with an
interface cannot participate in a new logical port.
• The same logical port, default or user defined, cannot participate in multiple
logical ports. For example, you cannot configure default lport fp1.0 in both logical
port 1 and logical port 2.
Options
Table 14-1 : Options for the lport create command
Example
In the following example, a logical port in single mode is created.
In this example, the logical port lp1.0 is created, enabled, and configured to operate in
single mode with fp1.0. No provision for failover or load balance exists in this
configuration.
In this example, the logical port lp1.0 is created, enabled, and configured to operate in
failover mode with fp1.0 and fp1.1. These two ports can act as redundant switch over
links for traffic processed on the ports.
In the following example, a logical port in aggregation mode is created.
In this example, the logical port lp1.0 is created, enabled, and configured to operate in
aggregation mode with fp1.0 and fp1.1. All ports on the NAS Gateway process and
load balance the traffic equally.
Related Commands
lport delete Remove a logical port.
lport modify Modify a logical port.
lport prefer Set a preference port for a logical port.
lport show Show logical port configuration.
Lport Delete
Synopsis
lport delete LPORTNAME
Description
The NAS Gateway supports removing physical links from a logical port. You can
delete backup links one at a time, but you cannot delete the active link because such a
deletion would disrupt traffic on the port. You can delete physical links from the
logical port by running the lport delete command. This command is helpful for
moving physical links from one logical port to another because you need to delete the
association of a link to a logical port before assigning the link to a new logical port.
Note!
To completely delete the entire logical port, you can run the lport delete
command.
Options
The LPORTNAME variable specifies an alphanumeric identifier for
the logical port that you are adding, for example, lp.0, lp.1, lp.2,
or lp.3.
Example
The lport delete command deletes the logical port lp.0. When the physical ports
associated with the logical port are removed from the logical port, you need to
configure them with their own IP interface to support routes and traffic.
Lport Modify
Synopsis
lport modify LPORTNAME -m [single | failover | aggregation] -a
[PORTS]
-s [enable | disable]
Description
You can modify a logical port by running the lport modify command. The link can
be one of three modes of operation: single, failover, or aggregation. The logical port’s
behavior differs depending on which one of the following the modes you assign:
• Single mode, where a single active physical port of the logical port carries traffic.
In this mode no provisions for failover or load balancing exist.
• Failover mode, where only one active physical port of the logical port carries
traffic. Other physical links on the logical port are available to carry traffic but
only if the active link becomes unavailable. When the active link state changes to
DOWN, the live backup link can assume operation as the new active physical link,
and continue carrying traffic after a switchover. During switchover, packet
retransmission is governed by higher layers of the IP protocol suite such as TCP or
UDP.
Note!
For each logical port, configure a preferred port. After setting the preferred
port, the port becomes the active port for the logical port as long as the
preferred port is UP. You can set the preferred port by running the lport prefer
command.
• Aggregation mode, where all physical links in the logical port are considered
active and carry traffic simultaneously. In a link-aggregated configuration, the
traffic is load balanced across all physical links that are associated with the logical
port. In link aggregated mode, the traffic has an inherent redundancy. For example,
if three links are configured in the same logical port, and one of the links is put into
the DOWN state, the traffic continues along the other two links in a load-balanced
manner.
Note!
If a physical port is deleted from the logical port, a new single logical port is
created with the deleted physical port.
You can also enable or disable the logical port.
Options
Table 14-2 : Options for the lport modify command
Example
In the following example, a logical port in single mode is modified.
In this example, the logical port lp1.0 is modified and configured to operate in single
mode with fp1.0. No provision for failover or load balance exists in this configuration.
In this example, the logical port lp1.0 is modified and configured to operate in failover
mode with fp1.0 and fp1.1. These two ports can act as redundant switch over links for
traffic processed on the ports.
In the following example, a logical port in aggregation mode is modified.
In this example, the logical port lp1.0 is modified and configured to operate in
aggregation mode with fp1.0, fp1.1, fp1.2, and fp1.3 All ports on the NAS Gateway
would process and load balance the traffic equally.
In the following example, a logical port is disabled.
Related Commands
lport delete Remove a logical port.
lport prefer Set a preference port for a logical port.
lport show Show logical port configuration.
Lport Prefer
Synopsis
lport prefer LPORTNAME -a PORTS
Description
The NAS Gateway supports a preferred link in situations where multiple links exist on
the logical port. When two or more ports exist on the logical port, the preference value
you assign determines which one is the active link that carries traffic. You can set the
preferred link by running the lport prefer command.
Options
Table 14-3 : Options for the lport prefer command
Example
In this example, the logical port lp1.0 has been created already with fp1.0 and fp1.1.
By default, the first port added to the logical port, is the preferred port. However,
because the lport prefer command is run, the specified port becomes the preferred
link. In this example, the port fp1.1 is configured as the preferred port for the logical
port pubstest. As the preferred link, port fp1.1 is the active link.
Related Commands
lport delete Remove a logical port.
lport modify Modify a logical port.
lport show Show logical port configuration.
Lport Show
Synopsis
lport show [LPORTNAME] [-n NODE]
Description
The NAS Gateway keeps a list of all the logical ports and their associated physical
links in the logical ports table. The logical ports table contains each logical port and
provides information about how the logical port is configured and operating. You can
display the logical ports table by running the lport show command. Use this
command to display all logical ports or one specific logical port.
Options
Table 14-4 : Options for the lport show command
Example
In this example, the logical ports table shows all logical ports with the following
information:
• Name indicates the name of the logical port.
• Admin shows the logical port’s state that was explicitly set through the -s
enable|disable argument of the lport create or lport modify command.
• Operation shows the state that the port actually is in.
• Mode indicates the operational mode that is configured for the logical port. Valid
values are single, aggregation or failover.
• IPCnt indicates the number of IP interfaces that are assigned to the logical port.
This field contains a numeric value that is at least one, and at most one less than
the total amount of ports configured in the logical port. There is no minimum and
maximum number for IPCnt.
• PrefPort indicates the port that has been assigned as the preferred port. The
preferred port is considered the active port, and the preferred port is the first port
configured in the logical port unless you have assigned a different preferred port
by running the lport prefer command.
• ActPort shows the names of the ports in the logical port that are actively
supporting traffic.
• Ports indicates the number of ports configured in the logical port. This field needs
to contain at least one port, but cannot contain more than four ports.
Related Commands
lport create Create a logical port.
lport delete Remove a logical port.
lport modify Modify a logical port.
lport prefer Set a preference port for a logical port.
LUN Label
Synopsis
lun label DEVICENAME [-f] [-r RAIDLEVEL] [-c CLUSTERNAME]
Description
The ONStor™ NAS Gateway sees LUNs in the following ways:
• Logical volume LUNs that have been assigned to logical volume space of a file
system.
• Free LUNs that are available, but have not been used for logical volume space.
• Foreign LUNs that are not available to the NAS Gateway.
• Out-of-cluster LUNS that have been labeled by another NAS Gateway on the same
SAN.
Initially when the system discovers a LUN, the NAS Gateway reads the label on the
LUN. If the LUN does not own an ONStor label, the LUN is marked as a foreign
LUN. If the LUN owns an ONStor label, but the label belongs to a different NAS
Gateway, the LUN is marked as an out-of-cluster LUN.
Use the lun label command to manually apply an ONStor label to a LUN that is
either a foreign or out-of-cluster LUN. After the LUN has been labeled, the NAS
Gateway views it as a free LUN, thus, the LUN can be claimed for use in a volume or
for automatic growth of the file system.
Note!
• This command is valid only for devices marked FREE, FOREIGN, and
OUTCLUSTER.
• You can remove a LUN label, by running the lun unlabel command.
Warning!
Before labeling a LUN that shows as outCluster, make sure that
the LUN does not belong to a volume on the other cluster. Use the
lun show disk command output to verify this after running the
lun rescan command.
Options
Table 15-1 : Options for the lun label command
Example
LUN Rescan
Synopsis
lun rescan {all | DEVICE_NAME} [NODE]
Description
The lun rescan command rescans the list of devices and controllers that are
accessible to the NAS Gateway. This command can be run from every gateway.
Note!
You need to run this command before importing a volume.
Options
Table 15-2 : Options for the lun rescan command
Example
In the following example, all devices accessible to NAS Gateway eng 46 are
rescanned.
Related Commands
lun show Lists all devices and controllers in the cluster.
LUN Show
Synopsis
lun show
Description
After the Fibre Channel (FC) discovery phase, the NAS Gateway has a view of the
entire storage network. From this perspective, the NAS Gateway creates the storage
availability report, which is a listing of all the devices that have registered in the FC
topology. The storage availability report organizes all devices by controller, device
type, and RAID level. The report shows size and the following usage information for
LUNs:
• Size, in megabytes, of used LUN space in each device.
• Size, in megabytes, of free LUN space in each device.
• Size, in megabytes, of the out-of-cluster LUN in each device.
• Size, in megabytes, of the foreign LUN space in each device.
You can display the storage availability report by running the lun show command.
The output of this command can span multiple pages. To navigate the LUN display,
you can use the following standard UNIX conventions:
• Press Enter to page forward through the display one page at a time, or you can hold
down the Enter key to rapidly page to the end of the display.
• Press q to cancel the display.
Note!
Zoning is a common practice in storage area networks (SANs). The NAS
Gateway cannot discover or display devices that have been zoned away from it.
Example
This example shows the storage availability report with the following information:
• Controller indicates the name of the storage device, for example the RAID
controller, that is governing the individual LUN.
• Type shows the physical device to which the LUN is assigned. Typical values are:
- Tape, for tape drive or library.
- Disk, for LUNs that are configured on a disk device, such as a JBOD or
a RAID.
- Stacker, for a tape library’s head or robot arm.
• Raid indicates the level of RAID that a particular LUN is configured to support.
• Used(MB) shows the amount of used LUN space on the listed device.
• Free (MB) shows the amount of free LUN space on the listed device.
• Out Cluster (MB) shows the amount of LUN space that is assigned to a different
cluster on the listed device.
• Foreign (MB) shows the amount of LUN space that is assigned to an unknown
device.
Synopsis
lun show all [-n NODE][-P PAGENUMBER [-S PAGESIZE]]
Description
The NAS Gateway sees LUNs as being in one of the following states:
• Used, assigned to a NAS Gateway
• Free, unassigned and available for use
• Foreign LUNs, discovered but not available to the NAS Gateway.
• Out of Cluster state
When LUNs are displayed, the NAS Gateway shows the LUNs regardless of whether
they are assigned to single tape or disk, a tape controller, or a RAID.
The lun show all command displays all LUNs that the NAS Gateway has
discovered. The display shows LUNs and their configuration parameters.
Note!
The lun show all command can span multiple pages. To navigate the LUN
display, press Enter to page forward through the display. To stop viewing the
display, press Q then Enter.
Options
Table 15-3 : Options for the lun show all command
Example
This example shows the LUN list with the following information:
• Device Name indicates the name of the storage device, for example the RAID
controller, that is governing the individual LUN.
• Model shows the physical device to which the LUN is assigned. Typical values are
as follows:
- Tape, for all LUNs that are configured on a tape device, such as a tape
drive or a tape library.
- Disk, for LUNs that are configured on a disk device, such as a JBOD or
a RAID.
• Raid indicates the level of RAID that a particular LUN is configured to support.
• Size indicates the maximum amount of storage space in megabytes for which the
LUN has been configured. This field shows only the configured maximum storage
space on the LUN; this field does not show the amount used or the amount that
remains free.
• State shows the availability of the LUN. The LUN can be in any one of the
following states:
- Used
- Free
- OutCluster
- Foreign
• Cluster shows whether the LUN has been assigned to a cluster. The values appear
as follows:
- n/a indicates that the LUN is not part of a cluster.
- Any value that is not n/a indicates the name of the cluster to which the
LUN belongs.
• Volume shows the name of the volume to which the LUN has been assigned.
Synopsis
lun show device DEVICENAME [-n NODE]
Description
Use the lun show device command to display detailed information about a particular
LUN. The NAS Gateway sees LUNs as being in one of the following states:
• Used, assigned to a NAS Gateway
• Free, unassigned and available for use
• Foreign, discovered but not available to the NAS Gateway
• Out of cluster
After the FC discovery phase, the NAS Gateway has a view of the entire storage
network topology. This view includes LUNs that are owned by different devices, for
example, LUNs owned by disk and tape devices.
Options
Table 15-4 : Options for the lun show device command
Example
Name : HITACHI_60432_24
Model : HDS9910
Type : Disk
Size (MB) : 2346.94
Raid Level : Raid-5
State : Foreign
Nodes : cluster1-4 cluster2-4
Active path :
Path list : Port WWN LUN
sp.1 0x500060e802ec1012 64
sp.0 0x500060e802ec1011 64
cluster1-4>
This example shows the LUN list with the following information:
• Name indicates the name of the individual LUN.
• Model indicates the model number of the device on which the LUN is configured.
• Type indicates the type of physical device, disk or tape, on which the LUN has
been configured.
• Size (MB) indicates the maximum amount of storage space in megabytes for which
the LUN has been configured.This field shows only the configured maximum
storage space on the LUN; not the amount used or the amount that remains free.
• Raid Level indicates the level of RAID that a particular LUN is configured to
support.
• State shows the availability of the LUN. The LUN can be in any one of the
following four states:
- Used
- Free
- OutCluster
- Foreign
• Nodes shows which nodes in the cluster can access the LUN.
• Active Path indicates what path is currently being used to support access to the
LUN.
• Path List shows the connectivity to the LUN. This field shows the following:
- The NAS Gateway port on which you can access the LUN.
- The world wide name (WWN) of the controller governing the LUN.
- The LUN ID number for the particular LUN.
Synopsis
lun show disk [-c CONTROLLER] [-r RAID_LEVEL] [-t STATE] [-n NODE][-P
PAGENUMBER [-S PAGESIZE]]
Description
The NAS Gateway sees LUNs as being in one of four states:
• Used, assigned to a NAS Gateway
• Free, unassigned and available for use
• Foreign, discovered but not available to the NAS Gateway
• Out of cluster
After the FC discovery phase, the NAS Gateway has a view of the entire storage
network topology. This view includes LUNs that are owned by different devices, for
example, the LUNs owned by disk and tape devices. You can view all LUNs that have
been configured on disk devices by running the lun show disk command.
Options
Table 15-5 : Options for the lun show disk command
Example
In the following example, all disk LUNs are displayed.
Device Name
Model Raid Size (MB) State Cluster Volume
-------------------------------------------------------------------
-------------------------------------------------------------------
--------------
3PARdata_0255_000410255
INSERV Raid-0 10239.94 free eng46
3PARdata_0255_0003E0255
INSERV Raid-0 10239.94 used eng46
techpubsvol
NEXSAN_500040200eec040f_64D73FCC
SATABlade Raid-5 23841.75 outCluster eng49
vol7fromeng53
NEXSAN_500040200eec040f_64D73F3B
SATABlade Raid-5 23841.75 outCluster eng49 Vol2
NEXSAN_500040200eec040f_64D73F9F
SATABlade Raid-5 23841.75 outCluster eng49 Vol2
NEXSAN_500040200eec040f_64D73C54
SATABlade Raid-5 23841.75 outCluster eng49 eng49-
1
NEXSAN_500040200eec040f_652D6923
SATABlade Raid-5 28610.12 outCluster eng49
eng53vs1
NEXSAN_500040200eec040f_652D6903
SATABlade Raid-5 28610.12
eng46>
This example shows the LUN list with the following information:
• Device Name indicates the name of the storage device, for example the RAID
controller, that is governing the individual LUN.
• Model shows the model number of the disk that is supporting LUNs.
• Raid indicates the level of RAID that a particular LUN is configured to support.
• Size indicates the maximum amount of storage space, in megabytes, for which the
LUN has been configured.This field shows only the configured maximum storage
space on the LUN; not the amount used or the amount that remains free.
• State shows the availability of the LUN. The LUN can be in any one of the
following states:
- Used
- Free
- Foreign
• OutCluster shows whether the LUN has been assigned to a cluster. Values are as
follows:
- n/a indicates that the LUN is not part of a cluster.
- Any value that is not n/a indicates the name of the cluster to which the
LUN belongs.
• Volume shows the name of the volume to which the LUN is assigned.
In the following example, the disk LUNs for a specific controller are displayed.
Device Name
Model
Raid Size (MB) State Cluster
-------------------------------------------------------------------
-------------
-------------------------------------------------------
IBM_KPZ0N698_0
IC35L018
F2D210-0 Raid-0 17501.69 free Andrew'sCluster
Done.
cluster1-4>
In this example, the controller ID is specified as part of the command, so the LUNs
associated with only that controller are displayed. The display contains the same fields
that are documented in the previous example.
Synopsis
lun show port PORT [-n NODE][-P PAGENUMBER [-S PAGESIZE]]
Description
The NAS Gateway sees LUNs as being in one of four states:
• Used, assigned to a NAS Gateway
• Free, unassigned and available for use
• Foreign, discovered but not available to the NAS Gateway
• Out of cluster
After the FC discovery phase, the NAS Gateway has a view of the entire storage
network topology. As part of LUN discovery, the NAS Gateway notes which storage
port a LUN is accessible through. You can view LUNs on each storage port, by
running the lun show port command.
Options
Table 15-6 : Options for the lun show port command
Example
Device Name
Model Raid Size (MB) State Cluster Volume
-------------------------------------------------------------------
-------------------------------------------------------------------
--------------
NEXSAN_5000402002e80be0_6B6BFF8F
Disk Raid-5 1716705.19 outCluster eng49
NEXSAN_5000402002e80be0_6B6BFEB8
Disk Raid-5 1716705.19 outCluster eng15
NEXSAN_5000402002e80be0_6B6BFFE5
Disk Raid-5 1716705.19 outCluster eng49
NEXSAN_5000402002e80be0_69073C37
Disk Raid-5 381469.62 outCluster eng47
NEXSAN_5000402002e80be0_69073C08
Disk Raid-5 381469.62 outCluster eng47
NEXSAN_5000402002e80be0_69073C61
Disk Raid-5 381469.62 outCluster eng47
NEXSAN_5000402002e80be0_6B6BFEA1
Disk Raid-5 1716705.19 outClust
eng46>
This example shows the LUN list with the following information:
• Device Name indicates the name of the storage device, for example the RAID
controller, that is governing the individual LUN.
• Model shows the physical device to which the LUN is assigned. Typical values are
as follows:
- Tape, for all LUNs that are configured on a tape device, such as a tape
drive or a tape library.
- Disk, for LUNs that are configured on a disk device, such as a JBOD or
a RAID
• Raid indicates the level of RAID that a particular LUN is configured to support.
• Size indicates the maximum amount of storage space in megabytes for which the
LUN has been configured. This field shows only the configured maximum storage
space on the LUN; not the amount used or the amount that remains free.
• State shows the availability of the LUN. The LUN can be in any one of the
following states:
- Used
- Free
- Foreign
- Out of cluster
• Cluster shows whether the LUN has been assigned to a cluster. The values are as
follows:
- n/a indicates that the LUN is not part of a cluster.
- Any value that is not n/a indicates the name of the cluster to which the
LUN belongs.
• Volume shows the name of the volume to which the LUN is assigned.
Synopsis
lun show tape [-c CONTROLLER] [-n NODE][-P PAGENUMBER [-S PAGESIZE]]
Description
After the FC discovery phase, the NAS Gateway has a view of the entire storage
network topology. This view includes LUNs that are owned by different devices, for
example, the LUNs owned by tape devices. You can view all LUNs that have been
configured on tape devices by running the lun show tape command.
Options
Table 15-7 : Options for the lun show tape command
Example
This example shows the LUN List with the following information:
• Device Name indicates the name of the tape drive or tape library.
• Model shows the model number of the tape drive or tape library.
• Type shows the value Tape for a tape drive or Stacker for a media changer or tape
library.
LUN Topology
Synopsis
lun topology
Description
After LUN discovery, you can view the LUN topology by running the lun topology
command. This command shows the storage topology report, which provides the
following basic information about the discovered storage devices:
• All the discovered controllers, by name
• The type of physical device each controller governs, tape or disk
• The controller’s presence in or absence from a cluster, and the nodes in the cluster
Example
This example shows the storage topology report with the following information:
• Controllers indicates the names of all the controllers discovered in the SAN.
• Type shows the physical device to which the LUN is assigned. Typical values are:
- Tape, for all LUNs that are configured on a tape device, such as a tape
drive or a tape library.
- Disk, for LUNs that are configured on a disk device, such as a JBOD or
a RAID.
• Nodes shows all the node names in the cluster of the NAS Gateways that have
access to the LUNs.
LUN Unlabel
Synopsis
lun unlabel DEVICENAME
Description
The lun unlabel command removes the label from a previously labeled LUN. When
you unlabel a LUN, it is no longer part of the storage pool. After the label is removed,
the LUN returns to the foreign LUN status, where it can be used by other entities, or
reassigned by adding another label. You can unlabel one LUN at a time, and you can
run this command only on free LUNs.
Note!
This command is useful for correcting labeling mistakes made when running
the lun label command.
Options
The DEVICENAME variable is the device name of the labeled
LUN that you want to unlabel. You can view a list of LUNs by
running the lun show all command.
Example
In this example, the NAS Gateway is unlabeling a specific LUN. The NAS Gateway
prompts you for confirmation before actually performing the unlabeling transaction.
Type Y to accept and perform the unlabeling of the specified LUN. Type N to cancel
the labeling of the specified LUN.
Mirror Create
Synopsis
mirror create MIRRORNAME SRC-VOL TGT-VOL [-R TARGETDEVICE] [-S
STATE] [-m MINUTE] [-h HOUR] [-d DATE] [-M MONTH] [-D DAY][-
l{low|med|high}]
Description
You can create mirrors by running the mirror create command. A mirror consists of
the following elements:
• A name for the mirror
• The source volume that is mirrored onto the target volume
• The target volume that receives the source volume’s file system data
• The target device that houses the mirror volume
When these parameters have been set, the mirror target is configured with a file system
structure and is ready to accept live data from the mirror source whenever a mirror
session becomes active.
Use the mirror create command also to setup a mirror schedule that automatically
starts a mirror session. The mirror schedule contains parameters that govern when a
mirror session starts. The time variables that you can specify with this command
operate on an interval basis. For example, if you set the mirror schedule to activate a
session every hour, the interval is every 60 minutes. However, in some situations, the
actual mirror session might take longer than the configured interval. In such situations,
the ONStor™ data mirror software skips enough intervals to resynchronize the
sessions with the configured session times. For example, if the interval was configured
for every minute, and the mirror session took 1.25 minutes, the first session would
occur at exactly the top of the minute, and would be available again at 2.25 minutes.
However, that time does not occur at the top of the minute, so the schedule would skip
the interval at 2 minutes, and synchronize again at the next valid interval, which is
minute 3.
When mirror schedule parameters have been set, the cron daemon governs the starting
of mirror sessions. You can configure a mirror schedule with or without the optional
time variables for a session as follows:
• If you do not configure the time variables, you need to manually start an on-
demand mirror session by running the mirror start command. This command
starts a mirror session for the volume names and target locations you configured
with the mirror create command.
• If you do configure the time variables, the cron daemon automatically starts a
mirror session. If the mirror schedule is configured, you can still manually invoke
a mirror session by running the mirror start command. But, only one mirror
session can be active at a time. Therefore, when a mirror session is active and
another mirror start request is sent, the ONStor™ NAS Gateway rejects the second
request.
Note!
If a mirror is already created without a mirror schedule, and you want to add a
mirror schedule to it, you can use the mirror schedule command. You can also
use this command to change mirror schedule time parameters.
The source and target volume must be of the same RAIDlevel.
The mirror create command in Data Mirror over IP can be run from the virtual
server associated with source volume but not from the virtual server associated with
target volume.
Options
Table 16-1 : Options for the mirror create command
Example
In the following example, an on-demand mirror is created.
eng31 PUBSTEST> mirror create techpubs pubstest pubsMirror -R IBM_KZSCDFD -m 30 -h 0,12 -D 1,4,6
Mirror: techpubs created successfully
eng31 PUBSTEST>
In this example, the mirror is configured with a scheduled mirror. In this command, the
mirror techpubs is created. The mirror’s source is the volume pubstest and the mirror’s
target volume is pubsMirror on RAID IBM_KZSCDFD. The mirror synchronizes data
from the source to the target on the 30th minute of midnight and noon on Monday,
Thursday, and Saturday of every week.
Related Commands
mirror delete Deletes a mirror.
mirror modify Modifies a mirror.
Mirror Delete
Synopsis
mirror delete MIRRRONAME
Description
You can delete a mirror by name. When you delete a mirror, all its configured
parameters are deleted. The file system data associated with the mirror is not deleted
from the mirror array. If the target mirror is not already promoted, deleting the mirror
will trigger a promote of the target volume to change its type to Standard and make it
available for RW. This can only happen when the target volume is offline. Put it offline
by using the volume offline command.
The mirror delete command can be run from the virtual server associated with
source volume as well as the virtual server associated with target volume.
Options
The MIRRORNAME variable is an alphanumeric character string of
up to 15 characters.
Example
Related Commands
mirror create Creates a mirror.
Mirror Demote
Synopsis
mirror demote VOLNAME
Description
The mirror demote command converts the standard volume into a mirror volume. If
the volume is a target of a mirror, the mirror state will be changed from "promoted" to
"enabled". The schedule associated with the mirror will be enabled if it exists. If the
volume does not currently have a mirror configured, it must have previously been a
source or a target of a mirror.
Note!
For a remote mirror, this command should be run in the context of the virtual
server associated with the remote mirror's target volume.
Options
The VOLNAME variable specifies the name of the volume to
demote. The length of the volume name string can be up to 255
characters.
Example
In the following example, newvol1-m had been a promoted target volume and is now
demoted to a mirror volume.
Related Commands
mirror promote Promotes an existing mirror.
Mirror Disable
Synopsis
mirror disable MIRRORNAME
Description
You can disable mirrors. Typically, you disable a mirror when the disk array that
houses the mirror requires repair or upgrade. A mirror needs to be disabled when the
disk array housing the mirror requires repair or upgrade. When you disable the mirror,
you deactivate the NAS Gateway's mirroring capability for the specified mirror.
Therefore, the NAS Gateway would not perform further mirror function for this mirror
automatically through the mirror schedule or manually through the mirror start
command. When a mirror is disabled, configured parameters in the mirror schedule
are not deleted. Instead, they remain as configured but suspended until the mirror is
enabled.
You need to explicitly disable each mirror by name. When you disable the mirror, the
live file system remains on the mirror array in the state it had before the mirror was
disabled. The source array cannot transmit subsequent updates to the mirror array until
the mirror schedule is re-enabled.
The mirror disable command in Data Mirror over IP can be run from the virtual
server associated with source volume but not from the virtual server associated with
target volume.
Options
The MIRRORNAME variable is an alphanumeric character string of
up to 15 characters.
Example
Related Commands
mirror enable Enables a mirror.
Mirror Enable
Synopsis
mirror enable MIRRORNAME
Description
Mirrors are automatically enabled when they are created. However, for mirrors that
have been manually disabled, you need to explicitly enable each mirror by name, to
reactivate its mirroring capability. When you enable the mirror, one of two situations
occurs:
• The NAS Gateway begins mirroring based on the mirror schedule’s time
parameters that you have previously configured. This situation occurs if the NAS
Gateway is configured for scheduled mirroring. Subsequent updates are sent from
the source array to the target mirror array depending on the parameters that you set
with the mirror create command or the mirror schedule command.
• The mirror schedule is not initialized and the NAS Gateway waits for you to
manually invoke a mirror session through the mirror start command.
Options
The MIRRORNAME variable is an alphanumeric character string of
up to 15 characters.
Example
Related Commands
mirror disable Disables a mirror.
Mirror Kill
Synopsis
mirror kill MIRRORNAME
Description
You can stop a mirror session by name by running the mirror kill command. When
you stop the mirror session, any in-progress mirror sessions are halted regardless of
whether they are on-demand or scheduled. If a scheduled mirror session is stopped,
only the current session is halted. The next mirror session occurs at its regularly
scheduled time. If an on-demand mirror session is stopped, you can start a new mirror
session through the mirror start command.
The mirror kill command in Data Mirror over IP can be run from the virtual server
associated with source volume as well as the virtual server associated with target
volume.
Options
The MIRRORNAME variable is an alphanumeric character string of
up to 15 characters.
Example
Related Commands
mirror start Initiates a mirror session.
Mirror Modify
Synopsis
mirror modify MIRRORNAME [-s SRCFSYS][-t TGTFSYS][-l{low|med|high}]
Description
The NAS Gateway’s asynchronous mirroring causes intervals of traffic between the
source volume and the mirror. While data is mirrored, the Fibre Channel link is
supporting traffic. The NAS Gateway supports setting a relative load on the NAS
Gateway and storage arrays so that you can loosely control how much bandwidth is
used for the mirror session.
By default, the NAS Gateway is configured with the mirror load set to medium.
However, you can control the mirror load by running the mirror modify command.
Use this command to set the mirror load to any of the following values:
• low
• med (the default value)
• high
Note!
Setting a lower value for mirror load can increase the amount of time that the
mirror session takes.
The mirror modify command in Data Mirror over IP can be run from the virtual
server associated with the source volume, but not from the virtual server associated
with the target volume.
The mirror modify command also allows you to modify the following by using the
-t option.
Options
Table 16-2 : Options for the mirror modify command
Example
In this example, the mirror load for the virtual server pubstest is modified to low from
its default setting of high. The default setting of medium is applied when you create the
mirror.
In the previous example, the IP address of the remote virtual server that owns the
target volume is being changed from 10.3.115.20 to 10.3.115.21.
Related Commands
mirror schedule Adds or modifies a mirror session schedule.
Mirror Pause
Synopsis
mirror pause MIRRORNAME
Description
In addition to completely stopping and closing a mirror session, you can pause a
mirror session that is in progress. By pausing the mirror session, you stop the open
disk-to-disk connection of the mirror without stopping the session or deleting the
mirror disk’s copy of the file system. The paused mirror session retains the configured
mirror schedule and all other configured mirror parameters, but the file system and
snapshot updates are suspended while the mirror session is paused.
Note!
While the mirror is paused, the live file system can change without the
mirror reflecting the changes.
When a mirror is paused, the mirror state is indicated to be paused on the source
virtual server only. You can manually resume a paused mirror session by running the
mirror resume command. Paused mirror sessions do not time out or restart. When a
mirror session is paused, it remains paused indefinitely.
Note!
If the virtual server associated with the source or target volume is moved or
fails over due to a NAS Gateway failure or reboot while the mirror is paused,
the mirror cannot be resumed. A new mirror session will have to be initiated
through the schedule or mirror start command.
The mirror pause command for Data Mirror over IP can be run from the virtual
server associated with source volume but not from the virtual server associated with
target volume.
Options
The MIRRORNAME variable is an optional alphanumeric character
string of up to 15 characters.
Example
In this example, the mirror volume techpubs is paused on the NAS Gateway. This
command causes any inprogress mirror session to halt, and remain halted indefinitely.
Paused mirror sessions do not timeout. You can resume the paused mirror session by
running the mirror resume command, or you can stop the paused mirror session by
running the mirror kill command.
Related Commands
mirror resume Resumes a paused mirror session.
mirror kill Stops a mirror session.
Mirror Promote
Synopsis
mirror promote MIRRORNAME
Description
You can activate an idle, target mirror file system to be a live file system. Making a
mirror file system into a live file system is called promoting a mirror. Prior to
promoting the mirror, its target volume must be made offline. After successful
promotion, the newly promoted file system is no longer read-only. It contains the
same data as the source volume as of the last mirror session that was run prior to the
promotion.
You can promote a mirror to the role of live file system by running the mirror
promote command.
The mirror promote command for Data Mirror over IP cannot be run from the virtual
server associated with source volume but it can be run from the virtual server
associated with target volume.
Note!
The mirror promote command does not delete the mirror. The mirror will
show the promoted state once the target volume promotion is complete.
Options
The MIRRORNAME variable is an optional alphanumeric character
string of up to 15 characters.
Example
In this example, the mirror is promoted on the NAS Gateway. After the promotion, the
read-only mirror volume becomes a read-writable file system volume.
Mirror Resume
Synopsis
mirror resume MIRRORNAME
Description
You can restart a paused mirror session by running the mirror resume command.
When a mirror session is paused, it retains all its configured parameters, but changes
to the live file system are not reflected on the mirror file system. When you resume the
mirror session, the configured schedule and mirror parameters are still available, and
the live file system and mirror file system complete the synchronization from where it
was at the time the mirror was paused. You can resume a paused mirror session by
running the mirror resume command.
The mirror resume command for Data Mirror over IP can be run from the virtual
server associated with source volume but not from the virtual server associated with
target volume.
Options
The MIRRORNAME variable is an optional alphanumeric character
string of up to 15 characters.
Example
In this example, the mirror techpubs is resumed on the NAS Gateway. This command
causes any paused mirror sessions to start wherever they were last paused.
Related Commands
mirror pause Pauses an in-progress mirror session.
Mirror Reverse
Synopsis
mirror reverse [MIRRORNAME]
Description
This command reverses the roles of source and target volumes in a mirror. The reverse
operation can be used during disaster recovery, for copying data modifications made
on a promoted target volume back to the source volume.
Prior to running this command, the current target volume must be promoted using the
mirror promote command.
This command must be run from the virtual server context of the mirror source. Upon
successful completion of this command, the mirror source will be demoted to a mirror
volume, and the source volume will be put offline.
Options
Table 16-3 : Option for the mirror show command
Example
eng42 ENG42-VS1> mir show
Mirror Name AdminState Oper State Transferred Source Volume Target Volume
VirtualServer
---------------- ---------- ----------- ----------- ---------------------- ----------------
------ -------------
m8 Enabled Idle 0% vol1 vol2
ENG42-VS1
eng42 ENG42-VS1> vol offline vol2
/
Done.
eng42 ENG42-VS1> mir promote m8
Mirror[m8] promoted.
eng42 ENG42-VS1> mir reverse m8
Mirror[m8] reversed.
eng42 ENG42-VS1> mir show
Mirror Name AdminState Oper State Transferred Source Volume Target Volume
VirtualServer
---------------- ---------- ----------- ----------- ---------------------- ----------------
------ -------------
m8 Enabled Idle 0% vol2 vol1
ENG42-VS1
eng42 ENG42-VS1>
Related Commands
mirror promote Promotes a mirror.
mirror demote Demotes a promoted volume to a mirror target.
Mirror Schedule
Synopsis
mirror schedule MIRRORNAME [-m MINUTE] [-h HOUR] [-D DOW][-M
MONTH][-d DOM]
Description
You can modify or remove a mirror schedule at any time. When you modify the mirror
schedule, the modified parameters become active immediately, but they will not take
effect until the next scheduled update of the mirror. You can perform the following
tasks with the mirror schedule command:
• You can modify the mirror schedule by running the mirror schedule command.
• If no mirror schedule exists yet, you can use this command to configure one.
• You can remove the mirror schedule by running the mirror schedule command,
providing only the mirror name, but no schedule values, such as day, time, or
month.
The mirror schedule command for Data Mirror over IP can be run from the virtual
server associated with source volume but not from the virtual server associated with
target volume.
Options
Table 16-4 : Options for the mirror schedule command
Example
In this example, the mirror techpubs is modified. The new mirror schedule
synchronizes the source and target file systems at midnight of every day of the week.
In this example, the mirror techpubs is modified. No arguments were specified, so the
mirror schedule techpubs is now disabled. The mirror is now an ondemand mirror and
a new session can be started with the mirror start command, until the schedule is
modified with new parameters.
Related Commands
mirror modify Adjusts the relative load that a mirroring session
places on the NAS Gateway.
Mirror Show
Synopsis
mirror show [MIRRORNAME] | [-v SRCVOLNAME]
Description
You can display mirror session information by running the mirror show command.
Use this command to display mirror information in one of two ways:
• General information about all mirror sessions
• Detailed information about a specified mirror session.
The mirror show command for Data Mirror over IP can be run from the virtual server
associated with source volume as well as the virtual server associated with target
volume.
Options
Table 16-5 : Option for the mirror show command
Example
eng31 PUBSTEST> mirror show
eng31 PUBSTEST>
In this example, the NAS Gateway is displaying information about the mirror
“techpubs.” The mirror show command displays the following information:
• Name shows the name given to the mirror when it was created.
• AdminState shows the administrative state of the mirror. Valid values are Enabled
(the mirror is operating) or Disabled (the mirror is not operating).
• Oper State shows the state the mirror actually is in. Valid values include IDLE
(mirror is not replicating), In-Progress (mirror is middle of replicating data), and
Paused (mirror is middle of replication but paused).
• Transferred shows the percentage of data on the source volume that has been
replicated on to the target volume
• Source Vol shows the name of the source volume. The source volume is the name
of the live volume that has its data mirrored to the target volume.
• Target Vol shows the name of the target volume. The target volume is the name of
the read-only mirror volume that is mirroring the live data from the volume
specified in Source Vol. In the case of a DIMP mirror, the IP address or hostname
of the virtual server that is hosting the target volume is displayed.
• Virtual Server is the name of the virtual server in which the source volume, target
volume, and mirror have been created.
Related Commands
mirror create Creates a mirror of a source volume.
mirror modify Modifies a mirror.
Mirror Start
Synopsis
mirror start MIRRORNAME
Description
The data mirror software supports on-demand mirror sessions. In an on-demand mirror
session you manually start the mirror session. You can start a mirror by running the
mirror start command.
When you run the mirror start command, the NAS Gateway reads the file system
information on the source volume, creates a snapshot, and transmits it as either a
baseline transfer or an incremental transfer to the target volume and array. You can
invoke an on-demand mirror session at any time after a mirror has been created and
enabled. On-demand mirror sessions do not interfere with any automatic mirroring
through a mirror schedule, so you can run the mirror start command on a volume
even if that volume has a configured mirror schedule for automatic mirroring.
Note!
You can pause or stop an in-progress on-demand mirror session by running the
mirror pause or mirror kill command.
The mirror start command for Data Mirror over IP can be run from the virtual
server associated with source volume but not from the virtual server associated with
target volume.
Options
The MIRRORNAME variable is an alphanumeric character string of
up to 15 characters.
Example
In this example, the mirror techpubs is started on the NAS Gateway eng31.
Related Commands
mirror kill Stops a mirror session.
mirror pause Pauses a mirror session.
mirror resume Resumes a mirror session.
Mirror Testconnect
Synopsis
mirror testconnect {HOSTNAME|IPADDR}
Description
Firewalls might block the sanm ports used for data mirroring over IP. To check these
ports for accessibility mirror testconnect is run from the source virtual server
context:
Note!
For Data Mirror over IP to work, the following ports must be accessible:
• 48502, the port on which the sanm agent on the target FP port listens.
• 36035, the port used by the sanmd daemon on the SSC.
Options
The HOSTNAME|IPADDR variables specify either a DNS, NIS,
LDAP host name or an IP address of the location to check for port
accessibility across firewalls.
Example
Synopsis
ndmp delete session {-a|-s SESSIONID}
Description
You can delete all NDMP sessions in a virtual server by running the ndmp delete
session command. This command is useful when the TCP/IP session is not closed
completely. Running this command deletes all the current NDMP sessions in the
current virtual server and forces the TCP/IP session to close completely. This
command affects only the current sessions, it does not prevent subsequent sessions
from occurring.
Use this command only if you think the session is hung. To find out whether a session
is hung when a backup session fails, do the following:
1. Query the data management application (DMA) for active
sessions.
• If the DMA responds that no sessions are active, check the
ONStor™ NAS Gateway by running the ndmp show status
-a command.
Options
Table 17-1 : Options for the ndmp delete session command
Example
In the following example, all active NDMP sessions are deleted.
In this example, all NDMP sessions are deleted. All inprogress backup or restore data
streams are halted.
In the following example, a specific NDMP session is deleted.
In this example, only NDMP session number 178912 is deleted. The NAS Gateway
severs contact with the NDMP client for only this NDMP session. All other inprogress
backup or restore data streams remain active.
Related Commands
ndmp show detail Shows detailed information of NDMP sessions.
ndmp show status Shows status of the active NDMP sessions.
NDMP Disable
Synopsis
ndmp disable
Description
When NDMP is disabled, a virtual server does not listen for requests from the NDMP
client. You can disable the NDMP software on each virtual server by running the ndmp
disable command. When you run this command, any inprogress NDMP sessions are
allowed to complete, but all subsequent sessions are prevented from starting.
Use this command cautiously. Many DMAs use multiple sessions to perform a backup
or restore operation. In some cases, if you run this command while a session is active,
you might error out the entire operation. For example, if multiple sessions comprise a
single backup operation, and you run this command while one session in the operation
is active, the entire backup operation error out. Therefore, verify that all sessions in the
virtual server are closed before running the ndmp disable command. You can verify
that all sessions in the current virtual server are closed by running the ndmp show
status -v VSVRNAME command. If you run this command and no sessions are listed,
no sessions are active, and you can safely run the ndmp disable command.
Example
In this example, the NDMP software is disabled on the virtual server pubstest. When
the NDMP software is disabled, the configured NDMP parameters remain intact.
However, the current virtual server does not support any NDMP functionality.
Related Commands
ndmp enable Enables the NDMP feature.
NDMP Enable
Synopsis
ndmp enable
Description
NDMP needs to be enabled on a virtual server for successful backup and restore
operations. When NDMP is enabled, the virtual server is able to respond to NDMP
client requests. You can enable NDMP by running the ndmp enable command. By
default, NDMP is enabled.
Example
In this example, the NDMP software is enabled on the virtual server pubstest. After
enabling the software, the virtual server can begin serving NDMP backup or restore
functions if the remaining NDMP parameters have been set.
Related Commands
ndmp disable Disables the NDMP feature.
NDMP Reset
Synopsis
ndmp reset
Description
If you have configured a virtual server with custom NDMP settings, you can return the
NDMP feature to default state by running the ndmp reset command. Because the
NDMP commands are run from within the context of a virtual server, this command
sets the NDMP parameters to their defaults for the current virtual server. When you
run this command, the NDMP parameters are set to the following defaults:
• NDMP state: Enabled
• NDMP version: 4
• TCP port for NDMP services: 10000
• Tape block size: 0 (variable block mode)
• Tape Alternate Model: false
Note!
You can view the current state of the NDMP software by running the ndmp
show config command.
Example
In this example, the NDMP configuration for the virtual server pubstest is reset to its
default configuration.
Related Commands
ndmp set port Sets the NDMP port variable in the NDMP
server.
ndmp set tape Sets the NDMP tape model and block size.
ndmp set version Sets the NDMP version.
Synopsis
ndmp set tape altmodel (true|false)
Description
You can configure each virtual server to use a specified tape model within an NDMP
v3 environment. The configured tape model determines the behavior of the tape driver
as follows:
• The v4 tape model causes the tape drive to halt at a file mark and not position the
tape at the beginning of the next file mark.
• The standard tape model used in a v3 environment causes the tape driver to
consume the file mark and position the tape at the beginning of the next file mark.
This setting supports compatibility with Veritas Net Backup.
By default, the alternative tape model feature is set to false, which causes the v4 tape
model to be used in an NDMP v3 environment. When set to true, the virtual server
supports the default tape driver functionality within a negotiated NDMP v3
environment.
You can configure the alternative tape model by running the ndmp set tape
altmodel command. This command enables the NAS Gateway to conform to other
vendors’ backup implementations. For information about which version of tape driver
model to set, consult the documentation that accompanied your NDMP backup
solution. Then, set the NAS Gateway to comply with that implementation.
Options
Table 17-2 : Options for the ndmp set tape altmodel command
Example
In this example, the virtual server pubstest is configured to use the Veritas tape model
in the negotiated NDMP v3 environment.
Related Commands
ndmp show config Shows NDMP configuration information.
Synopsis
ndmp set dma
{generic|bakbone|ca|commvault|legato|oracle|tivoli|veritas}
Description
The ndmp set dma command sets the DMA to be used to communicate with the
NDMP server. Setting a specific DMA might provide workarounds to NDMP protocol
conformance issues present in the DMA. Not all DMAs have conformance issues. For
details on which versions of these DMAs are supported, contact the ONStor technical
support department and request the latest run of the Compatibility Matrix.
Options
Table 17-3 : Options for the ndmp set dma command
Example
Related Commands
ndmp show config Shows NDMP configuration information.
Synopsis
ndmp set port PORT
Description
By default, the NAS Gateway listens for services on TCP port 10,000. However, you
can set a different TCP port for NDMP by running the ndmp set port command. If
you set the port to a different value, you disallow any other functionality that is
supported on that port. For example, if you set the port to 80, you will use NDMP on
that port, but disallow world wide web HTTP support, which uses that TCP port by
default.
Options
The PORT variable is the TCP port number on which you want to
configure the NDMP services. By default, port 10,000 is used.
Example
In this example, the TCP port that is supporting NDMP services on the virtual server
pubstest is set to 10100.
Related Commands
ndmp show config Shows NDMP configuration information.
Synopsis
ndmp set tape blksize <-1|0|SIZE>
Description
You can configure the NAS Gateway to support one of the following tape block
modes:
Options
Table 17-4 : Options for the ndmp set tape blksize command
Example
In this example, the virtual server pubstest is configured to use 2048 byte tape blocks.
Related Commands
ndmp show config Shows NDMP configuration information.
Synopsis
ndmp set trace {0|1|2}
Description
The ndmp set trace {0|1|2} command sets the trace level for all NDMP messages
for active NDMP sessions. You use the trace level to activate or deactivate tracing of
NDMP messages. The default value is 0 (tracing deactivated). Level 0 deactivates
traces for NDMP. Level 1 or 2 activates traces.
Options
Table 17-5 : Options for the ndmp set tape blksize command
Example
In this example, there is no current active session, so new sessions will take effect. The
trace message is now set to 2 for all active & new sessions.
Related Commands
ndmp show trace Shows current NDMP log trace level
Synopsis
ndmp set version NUM
Description
Presently, each virtual server supports NDMP v3 and v4. You can select which version
of NDMP that a virtual server can use by running the ndmp set version command.
Options
The NUM variable is a list of version numbers on which the
NDMP client and server agree before sending NDMP messages
or beginning NDMP backup or restore transactions.
Example
In this example, the virtual server pubstest is configured to use NDMP protocol
version 3.
Related Commands
ndmp show config Shows NDMP configuration information.
Synopsis
ndmp show config [VIRTUALSERVER]
Description
You can use the ndmp show config command to display current NDMP
configuration information for a specific virtual server. NDMP configuration
information includes the following:
• Whether NDMP is enabled or disabled.
• The NDMP version that the virtual server supports.
• Port number on which NDMP services are configured. By default, port 10,000 is
used.
• The tape block size.
• The tape alternative model flag.
Options
The optional VIRTUALSERVER variable is a specified virtual server
for which to look up NDMP configuration.
Example
Virtual Server State Version Port Block Size Alt Model DMA
-------------------------------------------------------------------------------------------------------------
VS_MGMT_512 ENABLED 4 10000 0 false Generic
G10V1 ENABLED 4 10000 0 false Generic
G10V2 ENABLED 4 10000 0 false Generic
G10V4 ENABLED 4 10000 0 false Generic
In this example, the virtual server pubstest is configured to use NDMP protocol
version 3, and NDMP is enabled. The tape block size is 2048, and the port number is
10100. The tape alternative model flag is set to true.
Synopsis
ndmp show detail {-a | -v VIRTUALSERVER | -s SESSIONID}
Description
You can display detailed information for NDMP sessions by running the ndmp show
detail command. By default, this command executes in the current virtual server.
Options
Table 17-6 : Options for the ndmp show detail command
Example
The following example shows an example of output from the ndmp show detail
command for a local NDMP session.
The following shows an example output of the ndmp show detail command for a
remote NDMP session.
The output of the ndmp show detail command provides the following information:
Synopsis
ndmp show log [NUMLINES]
Description
The ndmp show log command shows the locally stored NDMP protocol log
messages.
Options
The NUMLINES variable is an optional argument that specifies the
number of lines that you want to display. The number of lines you
specify are counted in most-recent to least-recent order to
facilitate seeing the most recent usage events. Type a 32-bit
number for NUMLINES. By default, the entire NDMP log is
displayed if you do not specify a value for NUMLINES.
Example
In the following example, all locally stored NDMP protocol log messages are
displayed.
In the following example, the two most recently locally stored NDMP protocol log
messages are displayed.
Synopsis
ndmp show status {-a | -v VIRTUALSERVER | -s SESSIONID}
Description
You can display a list of the NDMP sessions and see information about their operation
or performance status by running the ndmp show status command. By default, this
command affects the current virtual server.
Options
Table 17-7 : Options for the ndmp show status command
Example
The following example shows the status of a specific session ID in the active virtual
server.
SessId: 129559
======================
Virtual Server Ver Client Address Start Time Elapsed
Time
Device Mode
Mover State
---------------------------------------------------- ----------
-----------
NRNU15hc Read/Write Active
Path
--------------------------------------
/vol1/big_backup2/Build.orig
This example shows the status information for NDMP session 129459.
The following example shows the status of a local backup NDMP session.
SessId: 1100911384
======================
Virtual Server Ver Client Address Start Time Elapsed Time
------------------ --- --------------- ----------------- -
---------------
VS-ENG5-1 4 10.0.0.147 16:44:43 11-19-04 00
days 00:01:14
Device Mode
---------------------------------------------------- ----------
NRNU24hc Read/Write
Path
--------------------------------------
/vol1/
The following shows an example output of the ndmp show status command for a
local restore NDMP session.
SessId: 1100911385
======================
Virtual Server Ver Client Address Start Time Elapsed Time
------------------ --- --------------- ----------------- -
---------------
VS-ENG5-1 4 10.0.0.147 16:51:43 11-19-04 00
days 00:01:07
Device Mode
---------------------------------------------------- ----------
NRNU24hc Read/Write
Operation Status
--------- ---------
RESTORE Active
The following shows an example output of the ndmp show status command for a
remote backup NDMP session from the mover server view.
SessId: 1098320402
======================
Virtual Server Ver Client Address Start Time Elapsed Time
------------------ --- --------------- ----------------- ---
-------------
VS_MGMT_257 4 10.0.0.147 18:12:40 10-20-04 00
days 00:05:52
Device Mode
---------------------------------------------------- ----------
NRNU23hc Read/Write
The following shows an example output of the ndmp show status command for a
remote backup NDMP session from the data server view.
Session Status:
==============
SessId: 1100911386
======================
Virtual Server Ver Client Address Start Time Elapsed Time
------------------ --- --------------- ----------------- --
--------------
VS-ENG5-1 4 10.0.0.147 16:55:20 11-19-04 00
days 00:06:09
Path
--------------------------------------
/vol2/
The following shows an example output of the ndmp show status command for a
remote restore NDMP session from the mover server view.
Session Status:
==============
SessId: 1098322524
======================
Virtual Server Ver Client Address Start Time Elapsed Time
------------------ --- --------------- ----------------- --
--------------
VS_MGMT_257 4 10.0.0.147 18:37:38 10-20-04 00
days 00:00:11
Device Mode
---------------------------------------------------- ----------
NRNU23hc Read/Write
The following shows an example output of the ndmp show status command for a
remote restore NDMP session from the data server view.
Session Status:
==============
SessId: 1100913521
======================
Virtual Server Ver Client Address Start Time Elapsed Time
------------------ --- --------------- ----------------- --
--------------
VS-ENG5-1 4 10.0.0.147 17:20:11 11-19-04 00
days 00:00:43
Operation Status
--------- ---------
RESTORE Active
Synopsis
ndmp show trace
Description
You can use the ndmp show trace command to display current NDMP log trace
level.
Example
Related Commands
ndmp set trace Sets NDMP log trace level.
Synopsis
nfs cache delete mounts [-s SHARE] [-v VOLNAME]
Description
This command is used to force all NFS clients to go through the NFS mount
processing again by deleting their cached mount entries. When a client next accesses
the affected virtual server, volume, or share, their mount access rights are re-evaluated.
This command is typically used when an external change has been made that would
affect the access rights of one or more clients to shares. Examples include a change to
the membership of an NIS NetGroup or DNS name change.
Note!
Note that you cannot specify both -s and -v. options. If both are omitted, all
shares for the current virtual server are affected.
Options
Table 18-1 : Options for the nfs cache delete mounts command
Example
The following example uses the -v option to delete volume g10-vs1-vol1.
g10r9 G10-VS1>
No Mount information.
g10r9 G10-VS1>
Related Commands
nfs cache show mounts Display the NFS mount entries.
nfs show Display the list of exported NFS filesystems.
Synopsis
nfs cache show mounts [-s SHARE] [-v VOLNAME]
Description
This command is used to display the cached NFS client mount entry information.
Note!
Note that you cannot specify both -s and -v. options. If both are omitted, all
shares for the current virtual server are affected.
Options
Table 18-2 : Options for the nfs cache show mounts command
Example
The following example shows the output of the command without any options.
Related Commands
nfs cache delete mounts Delete the NFS mount entries, forcing clients to
refresh their NFS mount options.
nfs show Display the list of exported NFS filesystems.
Synopsis
nfs share add PATHNAME [-o OPTIONS]
Description
During runtime operation, you can configure file system-related characteristics on
volume space where the file system resides. You need to configure file system
functions directly related to NFS. You can configure an NFS share by running the nfs
share add command.
The ONStor™ NAS Gateway’s NFS shares contain two main components: the options
list and the clients list. The client list is specified in the -o OPTIONS parameter and
takes the following format:
-o OPTIONLIST=CLIENTLIST[;OPTIONLIST=CLIENTLIST]
Options List
In the options list you specify mount permissions for clients. The NAS Gateway
supports the following mount options:
• ro (read-only)
• rw (read-write)
• no root squash
• root squash
• all squash
• secure lock (for requiring network lock manager [NLM] requests)
• no submounts
• secure port
• no set-user-ID bits
• synchronization (for stable writes)
• anonymous user identities (UIDs)
• anonymous group identities (GIDs)
Syntax rules apply when you are specifying multiple options as part of the options list
section of the share. To specify multiple options in the options list, follow these rules
to configure the share configured properly, and enable the NAS Gateway to parse the
share correctly for display when you run the nfs show command:
• Options lists are case sensitive. Specify them in lowercase.
• Always specify -o to indicate that one or more options follow in the options list.
• The default configuration for a share is read-only, root_squash access unless you
configure different options through the -o argument. If you want different mount
permissions, you need to explicitly configure them.
• Comma-separate multiple entries in the options list, for example,
-o ro,no_root_squash,no_suid.
• Use an equal sign (=) to separate the options list from the clients list, for example:
-o ro=192.168.15.21/16.
• The comma is used to create a list of options before the equal sign to assign them
to one or more clients. Here is an example of using commas:
-o rw,no_root_squash,nosub=10.1.2.3.
In this example, the multiple options list of read and write (rw), no root squashing
(no_root_squash), and no access to submounts through the share (no_sub), all apply
to the 10.1.2.3 client. The commas allow EverON™ software to correctly parse the
multiple mount options assigned to a single client.
• The semicolon is used as a delimiter to type another set of exports. Continuing
with the previous example, to keep the share above and add another one, you
would specify the share as follows:
-o rw,no_root_squash,nosub=10.1.2.3;ro,root_squash=10.9.9.9
In this example, the multiple options list is retained for the 10.1.2.3 client, but another
complete export is added for the 10.9.9.9 client. In the share for the 10.9.9.9 client, the
semicolon separates the share lists for each client, and allows EverON software to treat
them as two independent export conditions, one for each client.
Clients List
Use the client list to specify one or more clients that are permitted to access the share.
The client list supports single clients, domains, network groups, or all clients.
Consider the following:
• To specify the clients list for a single client, type the client’s network address and
mask bits, for example: 192.168.15.21/16. By default, if you do not want to
specify the mask bits, the client address defaults to /32 (the same as
255.255.255.255) for the node address of that specific client.
• To specify the clients list for a domain, type the domain name, for example,
onstor.com. In this example, any client in the domain onstor.com can mount the
share unless a specific exclusion is noted in the share.
• To specify the clients list for a network group within a domain, type an “at ” ( @ )
sign followed by the network group name, for example, @pubs. In this example,
any client in the network group @pubs can mount the share unless an exclusion is
noted for the share.
• You can use the asterisk ( * ) character as a wildcard to indicate “all” for all clients
that request to mount the share unless a specific exclusion is configured on the
share.
Note!
The maximum number of clients per client list is 16, and the maximum client
string size is 255 characters.
The client list has syntax rules that ensure a correct configuration and that allow the
NAS Gateway to parse it for display when you un the nfs show command. When you
are configuring the clients list in the NFS share, follow these guidelines:
• Use an equal sign ( = ) to separate the clients list from the options list, for example,
-o ro=192.168.3.4.
• Use a colon to separate multiple entries in the client list, for example,
-o ro=192.168.3.4:192.168.3.19:192.168.3.128.
• Use a hyphen to exclude clients from a share, for example,
-o ro=-192.168.3.128:192.168.3.4:192.168.3.19.
• A client needs to be explicitly configured with read-only or read-write access to be
able to mount the share, for example,
-o ro=192.168.3.128 or -o rw=192.168.3.128.
• If a client is not listed in the read-write or read-only parameter, the client has no
permission to use the share.
• If a client is not listed in the no_root_squash parameter, the client has root_squash
capability.
Exclusions to the Share’s Client List
You can configure a share to all but a few clients. The share’s client list supports
exclusions for this purpose. An exclusion is one or more clients that are not allowed to
access the share that you are configuring to a group of clients. For example, you might
have a subnet where all clients are granted read-write access except one. In this
situation, you can configure the one client as an exclusion within the share that all
other clients use. The excluded client gets no access through the share, and because a
new share to a volume overwrites any existing share, you cannot configure a separate
share just for the excluded client if you wanted to give that client a separate set of
conditions. You can create an exclusion to the client list by doing the following:
• Indicate the excluded clients with a hyphen (-).
• In the clients list, always list excluded clients before the domain or network group
to which they belong, or before the asterisk ( * ). The NAS Gateway scans shares
in a left-to-right order and stops at the first match. For example, -o ro=-
192.168.22.24:* is different than -o ro=*:-192.168.22.24 because the excluded client
will not gain read-only access to the share. If the excluded client appeared after the
asterisk, it would gain read-only access to the share. Therefore, when you are
configuring an exclusion, consider the importance of the exclusion’s position.
For example if you ran the command:
nfs share add /vol1 -o rw,nosub=-192.168.22.24 :192.168.0.0/24 you would
configure read-write access to /vol1 with the no submount operation to any members
of the 192.168.0.0 subnet except for 192.168.22.24, which has been excluded from
using this share. You can configure client 192.168.22.24 with different share
conditions on a different share. If a conflict in mount options exists, the NAS Gateway
chooses the most restrictive option.
Client Authentication Level
Each share can support a file level authentication value that is a range from 0 to 1,
which equates to AUTH_NONE to AUTH_SYS, respectively. AUTH_SYS level is
the same as AUTH_UNIX.
The authentication level is specified as a comma-separated pair of numbers from 0 to 1
that are enclosed in parenthesis, for example (0,0).The authentication levels indicate
what authentication level is supported for clients that mount the share. The following
list shows the supported file authentication levels and explains what each level allows:
• (0,0) means that a client needs to have AUTH_NONE to use the share.
• (0,1) means that a client can have AUTH_NONE or AUTH_SYS to use the share.
This level is the default.
• (1,1) means that a client needs to have AUTH_SYS to use the share.
Note!
Auth level (1,0) is not valid.
If you want the authentication level set to a custom value, append it to the end of a
client in the client options list. For example, if you ran the command:
nfs share add /vol1 -o rw,nosub=192.168.22.24 :192.168.0.0/24(1,1)
you would allow read-write access to /vol1 with the no submount operation to any
members of the 192.168.0.0 subnet. These clients are required to have AUTH_SYS
level to use the share except for client 192.168.22.24 which uses the default
authentication (0,1) because no custom value was specified for it.
Options
Table 18-3 : Options for the nfs share add command
Table 18-3 : Options for the nfs share add command (Continued)
Table 18-3 : Options for the nfs share add command (Continued)
Table 18-3 : Options for the nfs share add command (Continued)
Table 18-3 : Options for the nfs share add command (Continued)
Table 18-3 : Options for the nfs share add command (Continued)
Table 18-3 : Options for the nfs share add command (Continued)
Example
The following are examples adding NFS shares.
In this example, a share is configured that allows read-write access to /vol1 with the no
submount operation to any members of the 192.168.0.0 subnet except for
192.168.22.24, which has been excluded from using this share. Multiple options are
comma-separated. Multiple clients are colon-separated. Client 192.168.22.24 has been
excluded by placing it before the allowed clients, and indicating that its an exclusion by
adding the minus sign ( - ).
In this example, the NFS share is allowing read-only access to /vol1 to all clients
except for 192.168.22.24 which has been excluded from using this share. You can
configure client 192.168.22.24 with different share conditions on a different share. If a
conflict in mount options exists, the NAS Gateway chooses the most restrictive option.
Related Commands
nfs share delete Deletes a specified share or path of NFS users.
nfs share disable Disables a specified share or path.
nfs share enable Enables a specified share or path.
nfs share modify Modifies a specified share or path for NFS users.
nfs show Shows the list of exported NFS file systems.
Synopsis
nfs share delete PATHNAME
Description
Use the nfs share delete command you remove a share definition from the NAS
Gateway. When you run this command, the NAS Gateway stops exporting a specific
directory or resource to a specific client. With the nfs share delete command you
can delete hosts from the share, all hosts from the share, delete the path, or delete all
paths.
Options
The PATHNAME variable is the path, for example, /vol1/test/dir,
that you want to make unavailable.
Example
In the following example, an NFS share is removed from a specific volume.
Related Commands
nfs share add Adds a specified share or path for NFS users.
nfs share disable Disables a specified share or path.
nfs share enable Enables a specified share or path.
nfs share modify Modifies a specified share or path for NFS users.
nfs show Shows the list of exported NFS file systems.
Synopsis
nfs share disable {all | PATHNAME}
Description
Use the nfs share disable command to deactivate a share definition on the NAS
Gateway. When you run this command, the NAS Gateway leaves the specified share
definition configured and intact on the NAS Gateway. The share becomes inactive.
Options
Table 18-4 : Option for the nfs share disable command
Example
In the following example, all shares on the NAS Gateway are disabled.
In the following example shares for the path /pubstest on the current NAS Gateway are
disabled.
Related Commands
nfs share add Adds a specified share or path of NFS users.
nfs share delete Deletes a specified share or path of NFS users.
nfs share enable Enables a specified share or path.
nfs share modify Modifies a specified share or path of NFS users.
nfs show Shows the list of exported NFS file systems.
Synopsis
nfs share enable {all | PATHNAME}
Description
Use the nfs share enable command to activate a configured, disabled share on the
NAS Gateway.
Options
Table 18-5 : Option for the nfs share enable command
Example
In the following example NFS share pubstest is enabled.
Related Commands
nfs share add Adds a specified share or path of NFS users.
nfs share delete Deletes a specified share or path of NFS users.
nfs share disable Disables a specified share or path.
Synopsis
nfs share modify PATHNAME
Description
During runtime operation, you can modify file system-related characteristics on
volume space where the file system resides. You can modify an NFS share by running
the nfs share modify command. This command launches a vi editor, which you can
use to make modifications to the NFS share.
The NAS Gateway’s NFS shares contain two main components: the options list and
the clients list.
Options List
In the options list, you specify mount permissions for clients. The NAS Gateway
supports the following mount options:
• ro (read-only)
• rw (read-write)
• no root squash
• root squash
• all squash
• secure lock (for requiring NLM requests)
• no submounts
• secure port
• no set-user-ID bits
• synchronization (for stable write operations)
• anonymous UIDs
• anonymous GIDs
Syntax rules apply when you are specifying multiple options as part of the options list
section of the share. To specify multiple options in the options list, follow these rules
to configure the share properly, and enable the NAS Gateway to parse the share
correctly for display when you run the nfs share modify command:
• Options lists are case sensitive. Specify them in lowercase.
• The default configuration for a share is to read-only, root_squash access unless you
configure different options. If you want different mount permissions, you need to
explicitly configure them.
• Commas-separate multiple entries in the options list, for example,
ro,no_root_squash,no_suid.
• Use an equal sign (=) to separate the options list from the clients list, for example:
ro=192.168.15.21/16.
• The comma is used to create a list of options before the equal sign to assign them
to one or more clients. Here is an example of using commas:
rw,no_root_squash,nosub=10.1.2.3.
In this example, the multiple options list of read and write (rw), no root squashing
(no_root_squash), and no access to submounts through the share (no_sub), all apply
to the 10.1.2.3 client. The commas allow EverON software to correctly parse the
multiple mount options assigned to a single client.
• The semicolon is used as a delimiter to type another set of exports. Continuing
with the previous example, to keep the share above and add another one, you
would specify the share as follows:
rw,no_root_squash,nosub=10.1.2.3;ro,root_squash=10.9.9.9
In this example, the multiple options list is retained for the 10.1.2.3 client, but another
complete export is added for the 10.9.9.9 client. In the share for the 10.9.9.9 client, the
semicolon separates the share lists for each client, and allows EverON software to treat
them as two independent export conditions, one for each client.
Clients List
Use the client list to specify one or more clients that are permitted to access the share.
The client list supports single clients, domains, network groups, or all clients.
Consider the following:
• To specify the clients list for a single client, type the client’s network address and
mask bits, for example: 192.168.15.21/16. By default, if you do not want to
specify the mask bits, the client address defaults to /32 (the same as
255.255.255.255) for the node address of that specific client.
• To specify the clients list for a domain, type the domain name, for example,
onstor.com. In this example, any client in the domain onstor.com can mount the
share unless a specific exclusion is noted in the share.
• To specify the clients list for a network group within a domain, type an “at” ( @ )
sign followed by the network group name, for example, @pubs. In this example,
any client in the network group @pubs can mount the share unless an exclusion is
noted for the share.
• You can use the asterisk ( * ) character as a wildcard to indicate “all” for all clients
that request to mount the share unless a specific exclusion is configured on the
share.
Note!
The maximum number of clients per client list is 16, and the maximum client
string size is 255 characters.
The client list has syntax rules for correct configuration and for allowing the NAS
Gateway to parse it for display when you run the nfs modify command. When you
are configuring the clients list in the NFS share, follow these guidelines:
• Use an equal sign ( = ) to separate the clients list from the options list, for example,
ro=192.168.3.4.
• Use a colon to separate multiple entries in the client list, for example,
ro=192.168.3.4:192.168.3.19:192.168.3.128.
• Use a hyphen to exclude clients from a share, for example,
ro=-192.168.3.128:192.168.3.4:192.168.3.19.
• (0,0) means that a client needs to have AUTH_NONE to use the share.
• (0,1) means that a client can have AUTH_NONE or AUTH_SYS to use the share.
This level is the default.
• (1,1) means that a client needs to have AUTH_SYS to use the share.
Note!
Authentication level (1,0) is not valid.
If you want the authentication level set to a custom value, append it to the end of a
client in the client options list.
Table 18-6 : Options for the nfs share modify command
Table 18-6 : Options for the nfs share modify command (Continued)
Table 18-6 : Options for the nfs share modify command (Continued)
Table 18-6 : Options for the nfs share modify command (Continued)
Table 18-6 : Options for the nfs share modify command (Continued)
Table 18-6 : Options for the nfs share modify command (Continued)
Table 18-6 : Options for the nfs share modify command (Continued)
Table 18-6 : Options for the nfs share modify command (Continued)
Example
The following are examples of modifying NFS shares.
In this example, a share is modified that allows read-write access to /vol1 with the no
submount operation to any members of the 192.168.0.0 subnet except for
192.168.22.24, which has been excluded from using this share. Multiple options are
comma-separated. Multiple clients are colon-separated. Client 192.168.22.24 has been
excluded by placing it before the allowed clients, and indicating that its an exclusion by
adding the minus sign ( - ).
In this example, the NFS share is allowing read-only access to /vol1 to all clients
except for 192.168.22.24 which has been excluded from using this share. You can
configure client 192.168.22.24 with different share conditions with a different share (if
needed). If a conflict in mount options exists, the NAS Gateway chooses the most
restrictive option.
Related Commands
nfs share add Adds a specified share or path of NFS users.
nfs share delete Deletes a specified share or path of NFS users.
nfs share disable Disables a specified share or path.
nfs share enable Enables a specified share or path.
nfs show Shows the list of exported NFS file systems.
NFS Show
Synopsis
nfs show ([PATHNAME]|[all]|[-v VOLNAME [-P PAGENUMBER] [-S PAGESIZE]]])
Description
The nfs show command displays a list of exported share pathnames along with status
(enabled or disabled) which exists on the current virtual server.
Options
Table 18-7 : Options for the nfs show command
Example
In the following example, the all option is used..
In the following example, the -v option is used to display the shares on volume
krb-vol..
Port Autonegotiation
Synopsis
port autoneg PORT on|off
Description
You can set one of the ONStor™ NAS Gateway’s physical GE ports to support
autonegotiation with the peer device at the far end of the interface by running the port
autoneg command. This command enables the NAS Gateway to receive or initiate
link speed negotiation messages whenever the port becomes active at the network
layer.
The port autonegotiation state needs to be congruent with the peer device. If a port on
the NAS Gateway changes to the DOWN state, it does not transition to the UP state
unless the state of autonegotiation on the NAS Gateway matches the state of
autonegotiation on the peer device on the link. For example, if a port goes offline, and
the port’s autonegotiation state is set to OFF when the peer device on the other end of
the link has autonegotiation set to ON, the NAS Gateway’s port does not come back
online because of this mismatch.
Ensure that the port and peer device are both set to the same autonegotiation state,
either both are set to OFF, or both are set to ON.
Options
Table 19-1 : Options for the port autoneg command
Example
In the following example, the autonegotiation capability is disabled on file processing
port 1.
Port Disable
Synopsis
port disable PORT
Description
You can disable any enabled port by running the port disable command. This
command deactivates the storage port (FC) or the file processing port (GE). When the
port is disabled, it is in the DOWN state, so it cannot support a physical-layer link, and
in turn, cannot carry traffic if a network-layer connection exists.
• A disabled storage port remains connected to the shared storage, but cannot carry
read or write operations to the shared storage.
• A disabled GE port remains connected to the network, but is unable to carry traffic.
This command is helpful for attachment point changes of the shared storage or for
attachment point changes in the IP network. For example, run this command before
disconnecting the FC link to a RAID, or before upgrading the storage with higher
density devices.
Options
The PORT variable is the alphanumeric character string that
identifies the physical port you want to disable. For example,
specifying sp.0 disables the storage processing port 0, or
specifying fp1.0 disables file processing port 0. The maximum
number of file processing ports that you can specify depends on
the model of ONStor 2200 NAS Gateway you have:
• A 2200 model has two GE ports, so the maximum number of
ports you can specify is two.
• A 2240, 2260, or 2280 model has four GE ports, so the
maximum number of ports that you can specify is four.
The maximum number of storage processing ports that you can
specify is two, either sp.0 or sp.1.
Example
In the following example storage processing port 1 is disabled. You cannot use the
storage port while it is disabled.
In the following example file processing port 0 is disabled. You cannot use the file
processing port while it is disabled.
Related Commands
port enable Enables a port or all ports.
Port Enable
Synopsis
port enable PORT
Description
You can enable any disabled storage port or file processing port by running the port
enable command. This command activates the physical storage port or file processing
port. When the port is enabled, it is in the UP state, so it can support a physical-layer
link, and in turn, can carry traffic if a network-layer connection exists.
• When you enable a storage port, the small computer system interface (SCSI)
drivers perform storage area network (SAN) discovery to rediscover the SAN’s
topology in case any attachment points changes. Changes might include that the
upgrade or insertion of a new RAID have not occurred in the FC loop.
• When you enable a file processing port, the GE drivers reestablish network-layer
connectivity with the collision domain.
Options
The PORT variable is the alphanumeric character string that
identifies the physical port you want to enable. For example,
specifying sp.0 enables storage processing port 0, or fp.0 enables
file processing port 0. The maximum number of file processing
ports that you can specify depends on the model of ONStor 2200
NAS Gateway you have:
• A 2200 model has two GE ports, so the maximum number of
ports you can specify is two.
• A 2240, 2260, or 2280 model has four GE ports, so the
maximum number of ports that you can specify is four.
The maximum number of storage processing ports you can
specify is two, either sp.0 or sp.1.
Example
In the following example a storage port is enabled. You cannot use the storage port
unless it is enabled.
In the following example a file processing port is enabled. You cannot use the file
processing port unless it is enabled.
Related Commands
port disable Disables a port or all ports.
Port Modify
Synopsis
port modify PORT [-m MTU]
Description
By default, the maximum transmission unit (MTU) size for the NAS Gateway’s file
processing ports is 1500 bytes. However, the NAS Gateway supports different sizes of
MTU on the each port. You can set the MTU on a file processing port by issuing the
port modify command. This command configures the largest unfragmented packet
size for packets transmitted on the port. Packets that are larger than the MTU size are
fragmented and sent in multiple packets, then subsequently reassembled at their
destination.
Options
Table 19-2 : Options for the port modify command
Example
Here is an example of the port modify command.
In this example, the interface MTU size is being set to 2048 bytes on the file port 1.
Related Commands
port show all Displays general information about storage and
file processing ports.
Port Reset
Synopsis
port reset PORT
Description
You can reset a storage port by running the port reset command. This command
performs a complete restart of the target port. The port is deactivated, then reactivated
as if you ran the port disable and port enable command in succession.
Note!
You cannot reset a file processing port with this command.
When the port is reset, it is put in the DOWN state, then transitions to the UP state.
When you reset a storage port, the SCSI drivers perform SAN discovery to relearn the
SAN’s topology in case any attachment points changes, for example, the upgrade or
insertion of a new RAID, have occurred in the FC loop. The port cannot support SAN
traffic until it has reached the UP state.
Options
The PORT variable is the alphanumeric character string that
identifies the physical port you want to reset. For example,
specifying sp.0 resets storage processing port 0. Specify either
sp.0 or sp.1.
Example
In this command, storage processing port 1 is reset. You cannot use the storage port
until it is enabled and in the UP state.
Related Commands
port disable Disables a port or all ports.
port enable Enables a port or all ports.
Synopsis
port show all
Description
The NAS Gateway tracks general and detailed performance and operation statistics for
each port. The resulting data is contained in the port statistics table. To show general
information about all storage ports and file processing ports on a NAS Gateway, run
the port show all command. You can also view detailed information about the
performance and operation statistics for all ports in the port statistics table. For
detailed statistics that track the performance and usage of traffic on the ports to a much
finer level than general port statistics, run the port show stats command.
Example
• link state is the operational state of the link. Valid values are UP when the link is
active and operating correctly, or DOWN when the link is inactive or not operating
correctly.
• link speed is the operational speed of the link.
• interface type is the interface type supported on the adapter.
• frame size is the largest frame the port can receive or transmit.
• WWN is the world wide name for the particular port:
- For storage ports, this value shows the port WWN.
- For file processing ports, this value shows the MAC address of the port.
Related Commands
port show detail Shows detailed information about a port.
port show stats Shows statistical information about a port.
Synopsis
port show detail PORT
Description
The NAS Gateway tracks general and detailed performance and operation statistics for
each port for storage ports and file processing ports. The resulting data appears in the
port statistics table. To show detailed information about all storage ports and file
processing ports on a NAS Gateway, run the port show detail command.You can
view detailed information about the performance and operation statistics for any port
in the port statistics table. Detailed statistics track the performance and usage of traffic
on the port to a more granular level than general port statistics.
Options
The PORT variable is the alphanumeric character string that
identifies the physical port that you want to enable. For example,
specifying sp.0 shows storage processing port 0, or specifying
fp.0 shows a file processing port. The maximum number of file
processing ports that you can specify depends on the model of
ONStor 2200 NAS Gateway that you have.
• A 2200 model has two GE ports, so the maximum number of
ports you can specify is two.
• A 2240, 2260, or 2280 model has four GE ports, so the
maximum number of ports that you can specify is four.
The maximum number of storage processing ports you can
specify is two, either sp.0 or sp.1.
Example
In the following example, details of a storage processing port are displayed.
• link state shows the operational state of the FC logical layer. Valid values are UP
when the link is active and operating correctly, or DOWN when the link is inactive
or not operating correctly.
• link speed shows the operational speed of the link.
• Max. SCSI tags per device shows the maximum number of SCSI tags that the
interface can support for each device accessible through the storage port.
• Fibre Channel frame size shows the largest FC frame the storage port can receive
or transmit.
• SRAM parity available shows whether the port supports static random access
memory (SRAM) parity bits. Valid values are Yes, parity bits are available, or No,
parity bits are not available.
The following example shows details of a file processing port.
In this example, file processing port 0 is displayed. The detailed information displayed
consists of the following:
• Port Identifier is file processing port name for which details are displayed.
• Admin State shows the state of the port, which can be Enabled or Disabled.
• Operational State shows the operational state of the port. Valid values are UP
when the link is active and operating correctly, or DOWN when the link is inactive
or not operating correctly.
• Frame Size shows the largest frame the file processing port can receive or transmit.
• MAC Address is the hardware address of the device associated with the port.
Related Commands
port show all Shows information about all ports.
port show stats Shows statistical information about a port.
Synopsis
port show loadstats [-i SECONDS]
Description
With the port show loadstats command you can view the amount of traffic that occurs
on all file processing ports. This command applies to the file processing ports only and
gathers the following statistics:
• The speed, measured in packets per second, of transmitted and received traffic.
This statistic uses either K (1024 bytes) or M (1024 ^2 bytes) to indicate a large
value of packets per second.
• The throughput, measured in bytes per second, of transmitted and received traffic.
This statistic uses either K (1024 bytes) or M (1024 ^2 bytes) to indicate a large
value of bytes per second.
The port show loadstats command is run in the NAS Gateway context. The command
tracks the file processing port usage on a port-by-port basis, and displays the output
iteratively for each port. By default, the command runs once per second for 5 seconds,
but with an optional argument you can set the length of the statistics-gathering
interval. While the command is running, you can stop gathering statistics by pressing
Ctrl + Z.
Options
-i SECONDS is an optional argument for specifying the time
interval at which statistics are displayed. During the interval,
statistics are displayed once per second. Type a value from 1 to
1000. The default interval is 5 seconds.
Example
In this example, the file processing port load statistics are displayed once per second
for a total of 4 seconds. The output shows all file processing port usage in packets per
second and bytes per second for ingress and egress traffic on the port.
Related Commands
port show all Shows information about all ports.
port show stats Shows statistical information about a port.
Synopsis
port show stats PORT
Description
As storage ports and file processing ports become active, the NAS Gateway tracks the
performance and operation statistics for each port. Each port’s statistics are entered
into the port statistics table. To view port statistics, run the port show stats
command. The port statistics table contains general statistics about the port and traffic
on it.
Options
The PORT variable is the alphanumeric character string that
identifies the physical port that you want to enable. For example,
specifying sp.0 shows statistics for storage processing port 0, or
specifying fp.0 shows file processing port 0. The number of file
processing ports that you can enter depends on the model of
ONStor 2200 NAS Gateway that you have:
• A 2200 model has two GE ports, so the maximum number of
ports you can specify is two.
• A 2240, 2260, or 2280 model has four GE ports, so the
maximum number of ports that you can specify is four.
The maximum number of storage processing ports you can enter
is two. Type either sp.0 or sp.1.
Example
In the following example, statistics for storage processing port sp.1 are displayed.
SCSI reads : 30
SCSI writes : 0
SCSI reads bytes : 61440
SCSI writes bytes : 0
SCSI Avg tot Read Time : 10983
SCSI Avg FC Read Time : 10952
cluster1-4>
<<display continues...>>
This part of the display contains the following link, frame, and SCSI counters for
operational statistics:
• link failure cnt shows how many link failures have occurred on the link supported
by the port.
• loss-of-sync cnt shows how many loss-of-synchronization failures have occurred
on the link supported by the port.
• loss-of-signal cnt shows the number of loss-of-signal errors that have occurred on
the link supported by the port.
• invalid xmit word cnt shows the number of invalid word errors that have occurred
during transmission on the link supported by the port.
• invalid frame CRC cnt shows the number of invalid CRC errors that have occurred
on the link supported by the port.
• frames out cnt shows the total number of frames transmitted from the port.
• frames in cnt shows the total number of frames received on the port.
• transport error cnt shows the total number of errors that occurred at the link’s
transport layer.
• data underrun cnt shows the number of data underrun errors on the link.
• SCSI read 6 shows the number of SCSI read 6 errors on the storage port.
• SCSI read 10 shows the number of SCSI read 10 errors on the storage port.
• SCSI write 6 shows the number of SCSI write 6 errors on the storage port.
• SCSI write 10 shows the number of SCSI write 10 errors on the storage port.
• SCSI other cnt shows the number of SCSI errors that are not counted in the other
SCSI error counters.
• SCSI reads shows the total number of read operations involving the SCSI layer on
the storage port.
• SCSI writes shows the total number of write operations involving the SCSI layer
on the storage port.
• SCSI read bytes shows the total number of bytes written to the SCSI layer on the
storage port.
• SCSI write bytes shows the total number of bytes read from the SCSI layer on the
storage port.
• SCSI Avg FC Read Time shows the average time of all read operations from the
time the command is taken from the file processor request, as seen at the Fibre
Channel location, to the time the data is sent back to the requester at the file
processing level.
• SCSI Avg FC Read Time shows the average time of all read operations from the
time the command is dispatched from the Fibre Channel location to the time it is
considered as completed by the Fibre Channel location.
Note!
Deducting SCSI Avg FC Read Time from SCSI Avg tot Read Time results in the
average Fibre Channel processing time.
In this part of the port statistics table, the NAS Gateway tracks the performance of
operations on the storage port. The performance statistics show the response time, at
different microseconds, for read and write operations on the FC port.
• Read tot shows the following:
- The number of read operations that took longer than 100000, 300000,
400000, 900000, 1350000, and 3200000 microseconds.
- The maximum time a read operation has taken to complete.
- The average amount of time read operations have taken.
• Read FC shows the following:
- The number of Fibre Channel layer read operations that took longer
than 100000, 300000, 400000, 900000, 1350000, and 3200000
microseconds.
- The maximum time a FC read operation has taken to complete.
- The average amount of time FC read operations have taken.
• Write tot shows the following:
- The number of write operations that took longer than 100000, 300000,
400000, 900000, 1350000, and 3200000 microseconds.
- The maximum time a write operation has taken to complete.
- The average amount of time write operations have taken.
• Write FC shows the following:
- The number of FC layer write operations that took longer than 100000,
300000, 400000, 900000, 1350000, and 3200000 microseconds.
- The maximum time a FC write operation has taken to complete.
- The average amount of time FC write operations have taken.
This part of the display shows the following receive-side statistics for file processing
port 0:
• No packet desc shows the number of packets received that did not contain packet
descriptors.
• No buffer shows the number of packets dropped due to lack of buffer resource.
• Bad packet desc shows the number of packets with of malformed or corrupted
packet descriptors.
• Multicast count shows the number of multicast bits set in the destination address
header of the packet.
• Packet count shows the number of packets received.
• Byte count shows the number of bytes received.
• Slow path count shows the number of packets sent through full transmission
control (TCP/IP) stack.
• Fast path count shows the number of packets sent through user datagram protocol
(UDP) and bypassed full TCP/IP stack.
• Packet verify errors shows the number of packets that failed verification on
receipt.
• Port down errors shows the number of times a packet arrived for that port, while
the port was down.
• No LPort errors shows the number of times a packet arrived when the logical port
was not yet configured.
• Packet across CODs shows the number of packets across CODs.
• H/W Bad IP ver shows the number of bad H/W IP versions.
• H/W Bad IP csum shows the number of bad H/W IP checksums.
• H/W Bad TCP/UDP csum shows the number of bad H/W TCP/UDP checksums.
• H/W Bad IP header len shows the number of H/W packets with corrupted IP
header length.
• H/W Bad TCP header len shows the number of H/W packets with corrupted TCP
header length.
• H/W Unrecognized error shows the number of H/W unrecognized (undefined)
errors on receipt.
• H/W Bad classification shows the number of packets not recognized by field
programmable gate-array (FPGA).
• H/W Bad reassembly csum shows the number of bad H/W reassembly checksums.
• H/W Bad packet length shows the number of times a packet of inappropriate
length, for example too short or too long is received.
• H/W Bad header offsets shows the number of times a badly composed IP/TCP/
UDP header from the hardware is received.
This part of the display shows the following transmit-side statistics for file processing
port 0:
• No packet desc shows the number of packets not transmitted.
• No buffer shows the number of packets dropped due to lack of buffer resource.
• Bad packet desc shows the number of malformed or corrupted packets.
• Multicast count shows the number of multicast bits set in the destination address
header.
• Packet count shows the number of packets received.
• Byte count shows the number of bytes received.
• Slow path count shows the number of packets sent through full TCP/IP stack.
• Fast path count shows the number of packets sent through UDP and bypassed full
TCP/IP stack.
• Packet verify errors shows the number of packets that failed verification on
transmit.
• Port down errors shows the number of times a packet arrived for that port, while
the port was down.
• No LPort errors shows the number of times a packet arrived when the logical port
was not yet configured.
• H/W Bad IP ver shows the number of bad H/W IP versions.
• H/W Bad IP csum shows the number of bad H/W IP checksums.
• H/W Bad TCP/UDP csum shows the number of bad H/W TCP/UDP checksums.
• H/W Bad IP header len shows the number of H/W packets with corrupted IP
header length.
• H/W Bad TCP header len shows the number of H/W packets with corrupted TCP
header length.
• H/W Unrecognized error shows the number of H/W unrecognized (undefined)
errors on receive.
• H/W Bad classification shows the number of packets not recognized by FPGA.
• H/W Bad reassembly csum shows the number of H/W bad reassembly checksums.
Related Commands
port show all Shows information about all ports.
port show detail Shows detailed information about a port.
Synopsis
priv add allow {user|group} IDENTITY PRIVILEGES cluster | vsvr
[VIRTUALSERVER]
Description
Administrative users and privileges are created by associating the administrator levels
shown in Table 20-1 with an existing user or group name. Administrative users
administer the ONStor™ NAS Gateway
Table 20-1 : Admin privileges for NAS Gateway management
When you create the administrative user privilege, you can set it to allow or deny
operations in the file system. You are explicitly setting the privilege that allows an
administrative user to perform operations at a certain scope on the NAS Gateway.
You can create an administrative user and set allow privileges with the priv add
allow command. This command sets the parameters for an administrative user’s
allowed operations at a specific level of control.
In addition to the administrative roles in Table 20-2, you can configure end users with
specific file-level execution permissions with the priv add allow command.
Table 20-2 shows the file permissions that you can assign.
Table 20-2 : Exec privileges for file operations
You can create a user and set allow privileges with the priv add allow command.
This command sets the parameters for a user’s allowed operations at a specific level of
control.
Note!
If you want to start the ONStor VirusScan applet from any user account, you
need to configure that user account with BACKUP and RESTORE privileges
because the VirusScan applet needs to access files in read/write mode in the
virtual server. The scope of the privilege can be either VIRTUAL SERVER or
CLUSTER.
Options
Table 20-3 : Options for the priv add allow command
Table 20-3 : Options for the priv add allow command (Continued)
Example
The following are examples of adding allow privileges
In this example, the user spectrum\paulw is configured with the file-level user rights
backup, restore, traverse, and take-ownership, and the scope of the user’s authority is
the virtual server techpubs. Therefore, the user paulw can work on any file on the
virtual server techpubs for any of the listed purposes.
Synopsis
priv add deny {user|group} IDENTITY PRIVILEGE cluster | vsvr
[VIRTUALSERVER]
Description
Deny privileges are added to the NAS Gateway to enforce a limit on what an
administrative user can do. Deny privileges allow a restrictive scope of authority. For
example, through the use of the deny privilege, you can configure an administrator
who would have access to cluster-level operations, but not have access to a virtual
server.
When the NAS Gateway checks for privileges, it tests for deny rules before checking
for allow rules. If multiple arguments are specified for the same user or group, the
denial is checked first, and the denial is enforced first. Consequently, the NAS
Gateway disallows any listed deny privileges, even if a subsequent allow rule for the
same user or group allows the privileges. Through this sequence, you can configure
control over users, for example by denying privileges for a specific user who belongs
to a group that is allowed the privileges.
Options
Table 20-4 : Options for the priv add deny command
Table 20-4 : Options for the priv add deny command (Continued)
Example
In this example, the user spectrum\paulw is denied the file execution rights backup,
restore, traverse, and take-ownership, on the virtual server techpubs. Therefore, user
paulw cannot work on any file on the virtual server techpubs for any of the listed
purposes. If user paulw was configured as part of a group of administrators, this entry
would in combination with the group entry to define what paulw could do. For
example, if paulw is a member of domain admins and domain admins had cluster-wide
authority, with the entry listed above, paulw would have cluster-wide authority, but not
on the virtual server techpubs where user paulw would be disallowed to perform
admin tasks.
Synopsis
priv delete allow {user|group} IDENTITY PRIVILEGES cluster | vsvr
[VIRTUALSERVER]
Description
After an allow privilege is configured, you can delete it at any time by running the
priv delete allow command. This command allows you to delete any allow
privileges from a specified user or group. By deleting the allow privilege, the user or
group cannot use the allow privilege that you configured. However, if other rules
allow access, those rules are still in effect. For example, deleting a user’s allow vsvr
admin privilege removes the allow privileges for the user specifically. However, if the
user is configured as part of a group that also has the allow vsvr admin privilege, the
user can still perform virtual server tasks as part of the group.
Options
Table 20-5 : Options for the priv delete allow command
Table 20-5 : Options for the priv delete allow command (Continued)
Example
In this example, the user spectrum\paulw is denied the file execution rights backup,
restore, traverse, and take-ownership, on the virtual server techpubs. Therefore, user
paulw cannot work on any file on the virtual server techpubs for any of the listed
purposes. If user paulw was configured as part of a group of administrators, this entry
would in combination with the group entry to define what paulw could do. For
example, if paulw is a member of domain admins and domain admins had cluster-wide
authority, with the entry listed above, paulw would have cluster-wide authority, but not
on the virtual server techpubs where paulw would be disallowed to perform admin
tasks.
Synopsis
priv delete deny {user|group} IDENTITY PRIVILEGES cluster | vsvr
[VIRTUALSERVER]
Description
After a deny privilege is configured, you can delete it at any time by running the priv
delete deny command. This command allows you to delete the deny privilege from a
specified user or group. By deleting the deny privilege, the user or group cannot use
the deny privilege that you configured. However, if other rules deny access, those rules
are still in effect. For example, deleting a user’s deny vsvr admin privilege removes the
deny privileges for the user specifically. However, if the user is configured as part of a
group that also has the deny vsvr admin privilege, the user is still denied from
performing virtual server tasks as part of the group.
Options
Table 20-6 : Options for the priv delete deny command
Table 20-6 : Options for the priv delete deny command (Continued)
Example.
Priv Show
Synopsis
priv show cluster [-P Page Number PAGESIZE ]] Page Size
priv show v Page Size svr [VSVR_NAME] Page Number [-S]
Description
When allow and deny privileges are configured, they are listed in the privileges table.
This table contains the configured privileges and lists information about privileges for
either all virtual servers in the cluster or a specific virtual server.
You can filter the privileges table output by specifying the scope in which you want to
view the configured privileges. For example, you can include a virtual server name
when you specify the priv show command, and you will see all the privileges that are
configured on that virtual server. You can display the contents of the privileges table
by running the priv show command.
Options
Table 20-7 : Option for the priv show command
Example
In this example, the configured administrative users are displayed for the cluster that
contains the virtual server pubstest.
• Identity lists the user or group name that is configured as an administrator.
• Privileges lists the type of privilege the administrator has.
• Scope shows where the administrator has authority to run commands.
Route Add
Synopsis
route add {net|default} [-a IPADDR/MASKLEN] -g IPADDR [-n NODE]
Description
Use the route add command to add static routes to the route table. Static routes are
manually configured so you need to specifically create and delete them. The ONStor™
NAS Gateway does not automatically age static routes out of the route table.
The route add command supports two different types of routes: network and default.
A network route leads to a specific network destination, such as a subnet. A default
route leads to a nonspecific network destination, and usually traverses a network to a
gateway router which, in turn, forwards the route to its next hop.
Options
Table 21-1 : Options for the route add command
Example
In the following example a default route is added.
This route appears in the NAS Gateway’s route table as either 0.0.0.0/0 or default. The
gateway for the default route is added as 10.1.1.1.
In the following example a specific network route is added.
The specific route’s gateway is configured as 10.1.1.32, and the specific route that is
added is for 224.57.0.0 with a 16-bit subnet mask.
Route Delete
Synopsis
route delete {net|default} [-a IPADDR/MASKLEN] -g IPADDR [-n NODE]
Description
Use the route delete command to remove previously created static routes. Static
routes are manually configured, so you need to manually delete them. The NAS
Gateway does not automatically age static routes out of the route table.
The route delete command supports two different types of routes: network and
default. A network route leads to a specific network destination, such as a subnet. A
default route is a route that leads through a network to a gateway router which, in turn,
forwards the route to its next hop. You can delete both types of route with the route
delete command.
Options
Table 21-2 : Options for the route delete command
Example
In the following example a default route is deleted from the NAS Gateway’s local
node.
When the default route is deleted, the local node can no longer route to unknown
destination by forwarding to a default gateway. A specific route to a specific
destination needs to exist in the route table.
In the following example a specific network route is deleted.
In this example, the route to the 224.57.0.0 network is deleted along with the route’s
16-bit mask. The route is deleted from the NAS Gateway’s local node, and the
10.1.1.32 gateway is also being deleted.
Route Show
Synopsis
route show [-a IPADDR/MASKLEN] [-n NODE]
Description
Use the route show command to display the route table for a particular NAS Gateway
or for a virtual server. The route table is the central listing of all static routes
configured on the NAS Gateway or virtual server. With this command you can display
the entire route table, for a particular virtual server, or a single route by destination.
The route table contains two types of routes: network and default. A network route
leads to a specific network destination, such as a subnet or node address. A default
route leads through a network to a gateway router that, in turn, forwards the route to its
next hop.
The output of this command differs depending on the context in which you run
the command. If you are in the NAS Gateway context when you run the
command, the display shows information for the whole NAS Gateway. If you
are in the virtual server context, the display shows only the information for that
specific virtual server.
Options
Table 21-3 : Options for the route show command
Example
The following example shows the entire route table for the NAS Gateway.
The following example shows the entire route table in a virtual server context.
The route table contains information about the known routes on the NAS Gateway. In
this example, the route table shows the following information:
• dest indicates the destination address to which routes exist.
• mask is the subnet mask for the destination route.
• nexthop indicates a gateway or route that is one hop away from the current NAS
Gateway and the next network entity that processes traffic on the route. A next hop
of 0.0.0.0 indicates that the next hop is the default route.
• interface indicates the name of the interface on which the route is supported.
The following example shows a specific route in the route table.
In this example, the route table is displaying the information for a specific route. The
information displayed is the same as listing the entire route table. However, listing one
specific route facilitates viewing the route’s information because you do not need to
scan the entire table.
Related Commands
route add Adds a static route to any node within a cluster.
route delete Deletes a static route from any node within a
cluster.
Synopsis
scsi discover device {all|sp.0|sp.1}
Description
Each storage processing port on the ONStor™ NAS Gateway is its own Fibre Channel
(FC) slice, so each port sees the storage area network (SAN) from a unique
perspective. Although the NAS Gateway automatically starts small computer system
interface (SCSI) functionality when the NAS Gateway’s storage processing controller
is started, you can manually invoke the SAN discovery routine on each port by
running the scsi discover device command. This command causes the storage port
to remain active while the SCSI drivers are restarted. The result is a rediscovery of the
logical unit numbers (LUNs) on the port. The neighbor devices on the NAS Gateway’s
port, and any devices attached to the NAS Gateway’s neighbor’s port are discovered
when discovery completes and the LUNs are reported to the NAS Gateway by its
neighbor (typically an FC switch).
You can use the all option to discover all ports and devices associated with the NAS
Gateway.
Note!
This command does not do a discovery for LUNs on devices that have not
changed state.
Use this command with caution because the discovery will halt I/O for a short
period of time.
Because each of the storage ports is its own FC slice, run the scsi discover
device command for each port on which you want to invoke the SCSI
discovery routine.
Options
Table 22-1 : Options for the scsi discover device command
Example
Related Commands
scsi show Shows a list of discovered devices.
scsi show detail Shows detailed information about the device.
scsi show stats Shows SCSI device statistics.
Synopsis
scsi discover lun {all|WWN}
Description
Each storage port on the NAS Gateway is its own FC slice, so each port sees the SAN
from a unique perspective. Although the NAS Gateway automatically starts SCSI
functionality when the NAS Gateway is started, you can manually invoke the SAN
discovery routine on each port by running the scsi discover lun command. This
command causes the storage port to remain active while the SCSI drivers are restarted.
The result is a rediscovery of the LUNs on the port. The neighbor devices on the NAS
Gateway’s storage processing port, and any devices attached to the NAS Gateway’s
neighbor’s port are discovered when discovery completes and the LUNs are reported
to the NAS Gateway by its neighbor (typically an FC switch).
You can use the all option to discover all ports and devices associated with the NAS
Gateway. You can use the WWN option to discover LUNs on the specified device.
Note!
This command does not do a discovery for LUNs on devices that have not
changed state.
Use this command with caution because the discovery halts I/O for a short
period of time.
Options
Table 22-2 : Options for the scsi discover lun command
Example
In this example, the LUNs for all devices associated with the NAS Gateway are
discovered. Discovery can take some time. When the topology has been discovered,
you can view it by running the lun topology command on the storage processing
port on which you just invoked a discovery.
Related Commands
scsi show Shows a list of discovered devices.
scsi show detail Shows detailed information about the device.
scsi show stats Shows SCSI device statistics.
SCSI Failback
Synopsis
scsi failback {enable|disable}
Description
The NAS Gateway supports device path failback. You can set up any storage device, a
disk volume, or a tape, with multiple paths to the NAS Gateway to enable device path
failback. This feature is useful when a path failure occurs, and it helps to maintain load
balancing across the storage ports managed by the NAS Gateway.
When a device is opened for use, the storage device manager (SDM) selects a primary
path from a list of paths created during the device discovery process. The SDM
automatically saves the primary path to the device’s database record. The primary path
is selected based on port load balancing and array preferences that have been
configured by the array manufacturer.
Note!
You can manually override the automatic primary path selected with the scsi
move command.
If the primary path fails, the SDM automatically selects a new path from a list of
alternate paths and directs device I/O to that path. When the SDM moves the device
I/O to the new path, it attempts to maintain load balancing across the available NAS
Gateway ports.
When the primary path is available again, the SDM automatically detects the restored
primary path and reverts the device back to it. You also can move the device back to
the primary path manually by running the scsi move command.
Note!
Primary and alternate path configurations are lost during restarting of a device.
You can enable or disable the device path failback feature with the scsi failback
enable|disable command. This command enables or disables the device path
failback feature for all devices connected to a single NAS Gateway.
Options
Table 22-3 : Options for the scsi failback command
Example
In the following example, device failback is disabled.
Related Commands
scsi discover device Refresh the list of devices that can be discovered
to the storage services engine.
scsi discover lun Refresh the list of LUNs on a known device to
the storage services engine.
SCSI Move
Synopsis
scsi move DEVNANE {sp.0|sp.1}
Description
Use the scsi move command to move devices to specified storage ports. The NAS
Gateway supports the following operations with this command:
• Path failback in situations such as a link failure and recovery, or an array controller
failure and recovery. For example, assume the NAS Gateway has redundant
connections to a RAID through storage ports sp.0 and sp.1. In the event that the
link on sp.1 should fail, all the I/O would be supported on sp.0 until the error is
cleared. When the error condition is cleared, you can use the scsi move command
to rebalance the I/O among storage ports by explicitly assigning some devices
back to sp.1.
• Manual load balancing of device I/O across multiple ports. For example, if I/O for
configured LUNs is occurring through one storage port (for example, sp.0) you
can run the scsi move command to assign some of the LUNs to a different port
(for example, sp.1) to equalize the load across multiple ports so that the load is
balanced.
Note!
The port setting you assign through the scsi move command is not persistent,
so the port usage situation that you set is affected by a restart.
Options
Table 22-4 : Options for the scsi move command
Example.
Related Commands
scsi discover device Refreshes the list of devices that can be
discovered to the storage services engine.
scsi show Shows a list of discovered devices.
scsi show detail Shows detailed information about a device.
Synopsis
scsi release WWN LUN
Description
The NAS Gateway and other storage devices can reserve a tape device. When a
reservation occurs, the tape device becomes unavailable until the reservation is
cleared. One way to clear the reservation is through a release operation. Although
reservations and releases can occur automatically, the NAS Gateway supports a
manual release operation through software. You can use the manual release whenever
a tape drive becomes hung. You can force a release by running the scsi release
command if you are a cluster administrator.
Note!
You can obtain a device’s WWN and LUN ID by running the scsi show detail
command on a device name, for example: scsi show detail
IBM_ECV3HM0B_0. At the bottom of the resulting output, you will see the
WWN and LUN ID field. Use those values.
Options
Table 22-5 : Options for the scsi release command
Example
Related Commands
scsi discover device Refreshes the list of devices that can be
discovered to the storage services engine.
scsi show Shows a list of discovered devices.
Synopsis
scsi show {all|disk|tape} [-P PAGENUMBER [-S PAGESIZE]]
Description
The scsi show command gives the list of devices discovered and initialized by the
storage services engine. The output of this command will give the following
information about each device:
• Device name
• Device type
• Model number
• Raid level (if available)
Additionally, the state of the device will be displayed indicating whether the device is
OPEN or CLOSED. If the device is in the OPEN state then the storage services engine
port currently being used to access the device is displayed.
Options
Table 22-6 : Option for the scsi show arraywwn command
Example
DEV DEV NAME TYPE MODEL
PORT STATE RAID
---- ------------------------------------------------------- --------- ------
---------- ---- --------- ----
1 ADIC_SG00169000_0 CHANGER Scalar
-24 - CLOSED 0
2 IBM_SG00169001_1 TAPE ULTRIU
M-TD3 - CLOSED 0
3 IBM_SG00169002_2 TAPE ULTRIU
M-TD3 - CLOSED 0
4 STK_SG00169003_3 CHANGER L180
- CLOSED 0
5 IBM_SG00169004_4 TAPE ULTRIU
M-TD2 - CLOSED 0
6 IBM_SG00169005_5 TAPE ULTRIU
M-TD2 - CLOSED 0
7 STK_SG00169006_6 CHANGER L180
- CLOSED 0
This example shows the storage devices list. This storage devices list contains
information for all the SCSI-compliant disk devices that the NAS Gateway has
discovered.
• Dev shows the device ID number which is a numeric identifier for each device in
the list.
• Device Name lists the device name (WWN plus LUN ID) for each device that has
been masked. If a device has not been masked, this field contains the value N/A. If
a device has been masked, this field contains the device name of the device.
• Type shows the type of device that has been discovered. Valid values are DISK or
TAPE.
• Model shows the manufacturer model number for each device.
• Port shows the port number on which the device was discovered. If the device is in
the CLOSED state, no value is displayed. If the device is in the OPEN state, the
port number is displayed.
• State shows the operational state of the device. Valid values are CLOSED or
OPEN.
• RAID shows the configured RAID level for the device. If the device is in the
CLOSED state, no RAID level is displayed. If the device is in the OPEN state, the
configured RAID level is displayed. Valid values are 0, 1, 0+1, 3, and 5.
Related Commands
scsi show detail Shows detailed information about a device.
scsi show stats Shows SCSI device statistics
Synopsis
scsi show arraywwn [-P PAGENUMBER [-S PAGESIZE]]
Description
The scsi show arraywwn [-P PAGENUMBER [-S PAGESIZE]] command
is used to display list of SCSI devices and Controller port WWN through which these
SCSI device was discovered by NAS Gateway.
Options
Table 22-7 : Option for the scsi show arraywwn command
Example
Related Commands
scsi show Displays list of scsi devices.
scsi show configuration Shows SCSI configuration
scsi show detail Shows detailed information about a device.
scsi show stats Shows SCSI device statistics
Synopsis
scsi show config
Description
You can use the scsi show config command to display the current configuration for
the SCSI layer attributes. The display also shows open and discovered devices and
failback mode.
Example
Device Counts
-------------
Devices opened on port sp.0 : 0
Devices opened on port sp.1 : 0
Total number of devices discovered : 85
eng11>
The SCSI configuration output shows information about the status and open devices
accessible through the NAS Gateway’s FC ports:
• In the SCSI Configuration and Status Information section, the Path Fail-back
Mode field indicates the state of the device path failback feature. This setting is
controlled by the scsi failback command. Although the default is enabled, this
example shows the Path Fail-back Mode as being in disabled state.
• The Device Counts section shows the devices opened on the enumerated ports and
the total number of devices discovered.
Related Commands
scsi discover device Refreshes the list of devices that can be
discovered to the storage services engine.
scsi discover lun Refreshes the list of LUNs on a known device to
the storage services engine.
scsi show Shows a list of SCSI devices.
scsi show arraywwn Shows SCSI arraywwn information
scsi show detail Shows detailed information about a SCSI
device.
scsi show stats Shows SCSI device statistics.
Synopsis
scsi show detail DEVNAME
Description
The NAS Gateway supports displaying details about the tape or disk devices it has
discovered. You display device details through the NAS Gateway’s SCSI protocol by
running the scsi show detail command. The detailed display shows product
information about the device, physical device information, and logical device
information.
Options
The DEVNAME variable is the name of the storage device for
which to display detailed information.
Example
In the following example, details of a disk LUN are displayed.
NAME : 3PARdata_0255_0003E0255
VENDOR : 3PARdata
MODEL : INSERV
PRODUCT ID : VV
TYPE : DISK
BLOCK CNT : 20971520
BLOCK SIZE : 512
CAPACITY : 10.737 GB
COMMAND QUEUE : 10
STATE : OPEN
PATH COUNT : 1
PATH LIST : PORT STATE PATH-ID TYPE WWN LUN
0 OPEN 0x80000004 Standard
0x23510002ac000255 0
In this example, the scsi show detail command shows the following information:
• The disk’s device ID.
• The vendor’s name.
• The disk’s model name.
• The disk’s product ID.
• The type of product, which can be a disk, media changer, or tape.
• The LUN’s block count.
• The block size.
NAME : STK_LLC02205345_0
VENDOR : STK
MODEL : L40
PRODUCT ID : L40
TYPE : CHANGER
STATE : CLOSED
PATH COUNT : 1
PATH LIST : PORT STATE PATH-ID WWN LUN
0 CLOSED 0x80000052 0x100000e0020204f7 0
In this example, the scsi show detail command shows the following information:
• The media changer’s device ID.
• The media changer’s manufacturer.
• The media changer’s model number.
• The media changer’s product ID number.
NAME : SEAGATE_HM004Z6_1
VENDOR : SEAGATE
MODEL : ULTRIUM06242-XXX
PRODUCT ID : ULTRIUM06242-XXX
TYPE : TAPE
POSITION : blockno 0, fileno 0
STATE : CLOSED
PATH COUNT : 1
PATH LIST : PORT STATE PATH-ID WWN LUN
0 CLOSED 0x80001058 0x100000e0020204f7 1
In this example, the scsi show detail command shows the following information:
• The tape’s device ID.
• The tape’s manufacturer.
• The tape’s model number.
• The tape’s product ID number.
• The type of product.
• The current file, record, and block location of the tape head.
• The tape’s state, which you can change with NAS Gateway CLI commands.
• The path count.
• The storage topology path list, which shows the NAS Gateway port, port state, and
path ID, and the WWN and LUN ID of the tape.
• The number of open handles.
• The list of handles that have been opened.
Related Commands
scsi show Shows a list of SCSI devices.
scsi show configuration Shows SCSI configuration
scsi show arraywwn Shows SCSI arraywwn information
scsi show stats Shows SCSI device statistics.
Synopsis
scsi show stats DEVNAME
Description
The NAS Gateway tracks the SCSI statistics for each identified SCSI device. The
statistics are counted in the SCSI statistics summary. The SCSI statistics summary
shows port-level frame information, and packet-level and operation-level information
about packets and read and write transactions.
Options
The DEVNAME variable is the device name (the WWN plus LUN
ID) of the device or device controller for which you want to
display SCSI performance statistics.
Example
In this example, the SCSI statistics for a Hitachi disk array are displayed. The top half
of the SCSI statistics table shows the following information about read-write
operations and the I/O queue sizes:
• The Port ID on which transactions are read or written.
• The WWN/LUN ID to which the operations are reading or writing.
• The number of read operations completed for the device listed in WWN/LUN.
• The number of current read operations per second for the device listed in WWN/
LUN.
• The maximum number of read operations per second for the device listed in
WWN/LUN.
• The number of current write operations per second for the device listed in WWN/
LUN.
• The maximum number of write operations per second for the device listed in
WWN/LUN.
• The depth of the general I/O queue for the WWN/LUN.
Related Commands
scsi show Shows a list of SCSI devices.
scsi show detail Shows detailed information about a SCSI
device.
scsi show configuration Shows SCSI configuration
scsi show arraywwn Shows SCSI arraywwn information
Snapshot Create
Synopsis
snapshot create VOLNAME SNAPNAME [-m]
Description
Use the snapshot create command to take snapshots of the file system at any time.
Unscheduled snapshots are called on-demand snapshots, and you can take them and
store them simultaneously with any scheduled snapshots on the ONStor™ NAS
Gateway. On-demand snapshots reside in the /.snapshots directory along with the
scheduled snapshots. When you take an on-demand snapshot, do not name the
snapshot any of the following names, which are reserved for scheduled snapshots:
• Monthly.x
• Weekly.x
• Hourly.x
• Daily.x
Options
Table 23-1 : Options for the snapshot create command
Example
Related Commands
snapshot show Shows a snapshot schedule or the usage of a
volume.
Snapshot Delete
Synopsis
snapshot delete VOLNAME SNAPNAME
Description
Use the snapshot delete command to remove any type of snapshot, either on-
demand or scheduled. When you delete a snapshot, the snapshot file is removed from
the /.snapshots directory. The NAS Gateway supports a maximum of 48 snapshots.
Scheduled snapshot files are numbered sequentially in a cycle from 0 to 47. When the
cycle completes, snapshot numbering starts again at 0. Therefore, if you delete a
snapshot file with a specified snapshot number, for example 21, from one cycle, the
next cycle will contain a snapshot 21, although the content of the snapshot might not
be the same as the content of snapshot 21 you deleted from the previous cycle.
Options
Table 23-2 : Options for the snapshot delete command
Example
In this example, the on-demand snapshot tester1.ss is deleted for volume pubstest.
Related Commands
snapshot show Shows a snapshot schedule or the usage of a
volume.
snapshot unpin Unpins the snapshot so that it can be deleted.
Snapshot Disable
Synopsis
snapshot disable VOLNAME
Description
By default, the snapshot scheduler is active, so when you configure a volume’s
snapshot schedule, the snapshots occur at the configured times. However, you can
disable the snapshot scheduler by running the snapshot disable command. When
the snapshot scheduler is disabled, the configured snapshot schedule remains intact. If
you reenable the snapshot scheduler for a volume, any configured snapshot schedule
becomes active again.
Note!
This command affects scheduled snapshots only. On-demand snapshots are not
affected by this command.
You can check the status of the snapshot scheduler by running the snapshot
show schedule command. If the snapshot scheduler is disabled, the output of
this command shows the following message:
**snapshot scheduling currently disabled for this volume**
If you attempt to modify the current snapshot schedule while the snapshot
scheduler is disabled, the following error message appears:
snapshot operation not allowed
Options
The VOLNAME variable is the name of the volume on which you
are disabling the configured snapshot schedule.
Example
In this example, the snapshot scheduler is disabled on the volume pubstest. While the
scheduler is disabled, you can still take on-demand snapshots. When the snapshot
scheduler is disabled the snapshot schedule for pubstest remains configured.
Therefore, when the snapshot scheduler is reenabled, the previously configured
snapshot schedule becomes active.
Related Commands
snapshot enable Enables the snapshot scheduling feature for a
volume.
Snapshot Enable
Synopsis
snapshot enable VOLNAME
Description
If you create a snapshot schedule the NAS Gateway adds the schedule to the
configuration file, but the schedule does not operate unless the snapshot scheduler has
been enabled. By default, the snapshot scheduler is enabled, so if you create a schedule
the snapshots automatically occur at the configured date and time. However, if the
snapshot scheduler becomes disabled, you can enable the scheduler by running the
snapshot enable command.
Note!
This command affects scheduled snapshots only. On-demand snapshots are not
affected by this command.
You can check the status of the snapshot scheduler by running the snapshot
show schedule command. If the snapshot scheduler is disabled, the output of
this command shows the following message:
**snapshot scheduling currently disabled for this volume**
If you attempt to modify the current snapshot schedule while the snapshot
scheduler is disabled, the following error message appears:
snapshot operation not allowed
Options
The VOLNAME variable is the name of the volume on which you
are enabling the configured snapshot schedule.
Example
Related Commands
snapshot disable Disables the snapshot scheduling feature for a
volume.
Snapshot Pin
Synopsis
snapshot pin VOLNAME SNAPNAME
Description
Some applications on the NAS Gateway can cause deletion and cleanup of snapshots.
In addition, you might want to designate a snapshot that cannot be deleted. To specify
that a snapshot cannot be removed, the NAS Gateway supports pinning the snapshot.
When a snapshot is pinned, you cannot deleted it until you unpin it. You can pin a
snapshot by running the snapshot pin command.
You can pin snapshots regardless of whether they are on-demand or scheduled.
Snapshots are pinned by name. Some scheduled snapshots have reserved names. For
example, any snapshot named hourly, daily, or weekly is using a reserved name. You
cannot pin snapshots that use reserved names, unless you rename it.
Options
Table 23-3 : Options for the snapshot pin command
Example
In this example, the snapshot bootup.ss is pinned on the volume techpubs. When the
snapshot pin command completes, you can not delete the snapshot bootup.ss until it
is manually unpinned.
Related Commands
snapshot unpin Unpins the snapshot so that it can be deleted.
Snapshot Rename
Synopsis
snapshot rename VOLNAME OLDNAME NEWNAME
Description
At any time, you can rename a snapshot regardless of whether it is an on-demand
snapshot or a scheduled snapshot by running the snapshot rename command. When
you rename the snapshot, no copy of that snapshot is created with a new name.
Instead, the existing snapshot is given a new name.
Note!
The NAS Gateway uses reserved names for some of its snapshots. If you are
renaming a snapshot, you cannot use any of the following names or you
command failure:
• hourly.x.ss, where x is a number.
• daily.y.ss, where y is a number.
• weekly.z.ss, where z is a number.
Options
Table 23-4 : Options for the snapshot rename command
Example
Related Commands
snapshot pin Pins a snapshot so that it cannot be removed.
snapshot show Shows a snapshot schedule or usage of a
volume.
snapshot unpin Unpins the snapshot so that it can be deleted.
Snapshot Revert
Synopsis
snapshot revert VOLNAME [-n SNAPNAME]
Description
Use the snapshot revert command to restore the live file system to a specified
snapshot. This command supports reverting the live file system to either a scheduled
snapshot or an on-demand snapshot. For reverting to scheduled snapshots, the
snapshot revert feature supports incremental and complete snapshots.
This command can be helpful for instances when the live file system is no longer
available or is beyond repair. For example, you could use this command if one of the
following occurs:
• Someone accidently deleted the entire live file system.
• Someone damaged the live file system, or an event corrupted the file system so
that even eek or fsck operations cannot fix the live file system.
The snapshot revert command is similar to restoring from network data
management protocol (NDMP). However, in some circumstances, the last NDMP
backup might have occurred so long ago that restore would be of little help. In such
circumstances, the snapshot revert command could be beneficial because the
interval between the file system damage and the last snapshot would be much less than
the difference between the last NDMP backup and the time of the file system damage.
For example, if the NDMP backup schedule causes a backup every other day, and the
snapshot schedule is set to occur every 4 hours, using the snapshot revert
command would reclaim hours of data that would otherwise be lost.
Note!
After the snapshot has been restored as the live file system, the NAS Gateway
retains the target snapshot as a standard snapshot. The snapshot is not deleted
when it has been restored as the new file system, and the NAS Gateway does
not take a duplicate snapshot of the new file system. Snapshots occur as
scheduled after a new file system has been created from a snapshot.
Options
Table 23-5 : Options for the snapshot revert command
Example
In this example, the snapshot hourly.ss is restored as the new file system on the
volume pubstest. The snapshot hourly.ss still exists as a snapshot in addition to
becoming the file system, and the NAS Gateway continues to take snapshots whenever
the configured snapshot schedule requires.
Related Commands
snapshot show Shows a snapshot schedule or usage of a
volume.
Snapshot Schedule
Synopsis
snapshot schedule VOLNAME [-w MAX_WEEKLY] [-d MAXDAILY][-h
MAXHOURLY][-l HOURS]
Description
Use the snapshot schedule command to schedule automatic creation and deletion of
snapshots for a volume. Weekly snapshots are taken Sunday at midnight. Daily
snapshots are taken at midnight. Total number of snapshots for a volume is limited to
48.
Note!
You must first enable snapshots before you can change the snapshot schedule.
Options
Table 23-6 : Options for the snapshot schedule command
Example.
In this example, a snapshot schedule is configured for volume pubstest. The snapshot
schedule is for:
• A maximum of 6 weekly snapshots to be retained.
• A maximum of 12 daily snapshots to be retained.
• A maximum of 12 hourly snapshots to be retained.
• Hourly snapshots are schedule to occur at the listed times: 4 a.m., 12 p.m., 4 p.m.,
and 8 p.m.
Related Commands
snapshot enable Enables the snapshot scheduling feature for a
volume.
snapshot show Shows a snapshot schedule or usage of a
volume.
Snapshot Show
Synopsis
snapshot show VOLNAME {schedule|list|usage}
Description
Use the snapshot show command to display all the snapshots that have been taken for
a specific volume and the disk usage of snapshots. Through the disk usage, you can
determine whether the snapshot schedule is too frequent by the amount of disk space
that is consumed.
Options
Table 23-7 : Options for the snapshot show command
Example
The following example shows the current snapshot schedule.
This example shows the snapshot schedule for the volume vol1. If the snapshot
software is disabled for a volume, a message indicates that snapshot scheduling is
disabled. If no message appears, the snapshot software is enabled and the snapshot
schedule is active.
The snapshot schedule shows the following information:
• 0 (no) weekly snapshots are retained.
• 2 daily snapshots are retained.
• 4 hourly snapshots are retained.
• Snapshots are scheduled to be taken a the listed hours: 8 a.m., 12 p.m., 4 p.m., and
8 p.m.
The following example shows the disk usage consumed by snapshots.
The snapshot show command shows the following information for the volume vol1:
• snapshot is the list of every snapshot that is on the volume.
• % (percentage) is equal to the value in the snapshot field multiplied by 100%, then
divided by (this snapshot + file system space).
• Snap usage is the number of disk blocks in Mib used only by this snapshot. This
value does not include the blocks that are also used by other snapshots or by the
file system.
• Freed is the number of disk blocks in Mib that have been made available by the
snapshot.
• Reclaimable is the number of disk blocks in Mib that can be reclaimed for other
usage.
• create time is the date and time stamp of when the snapshot was taken.
Note!
In this display you can determine which snapshots are scheduled and which
snapshots are on-demand:
• The scheduled snapshots use their default names, for example, hourly.0
(the most recent snapshot) or hourly.1 (the next most recent snapshot).
• The on-demand snapshots do not have a default name, and use the .ss
extension. Use the .ss extension to indicate on-demand snapshot files.
• Total Blocks shows the aggregate number of 8k file system blocks in the file
system.
• Blocks Used shows the number of 8k file system blocks in the file system used for
snapshots.
• Available shows the number of 8k file system blocks in the file system that are
available for snapshots.
• The NOTES: section provides details about the statistics and calculations used in
the display.
The following example shows a list of snapshots for the specified volume.
Related Commands
volume show Shows volume information.
Snapshot Unpin
Synopsis
snapshot unpin VOLNAME SNAPNAME
Description
When a snapshot has been pinned, it is no longer eligible for deletion. You can unpin a
snapshot by running the snapshot unpin command. This command removes the pin
from a snapshot and allows you to delete it. You need to explicitly unpin a snapshot
before deleting it.
Options
Table 23-8 : Options for the snapshot unpin command
Example
In this example, the snapshot bootup.ss is unpinned on the volume techpubs. When the
snapshot unpin command completes, you can delete the snapshot bootup.ss.
Related Commands
snapshot pin Pins a snapshot so that it cannot be removed.
Synopsis
snmp add cluster|VIRTUALSERVER community COMMUNITYSTRING [-w]
Description
Adds a read-only or read-write community string to the SNMP configuration of the
cluster entity or a virtual server. Community strings are utilized for SNMPv1 and
SNMPv2c protocols. Each configuration supports a maximum of 10 community
strings per string type. The community string type is assumed to be read-only unless
the -w option is specified making it read-write. Once a community string is added, the
configuration change becomes effective immediately. By default, SNMP service is
disabled since no community strings are initially defined.
Options
Table 24-1 : Options for the snmp add community command
Example
The following example adds the read-only community string teststring.
Related Commands
snmp delete community Deletes an SNMP community string.
Synopsis
snmp add cluster|VIRTUALSERVER trap HOST[:PORT] [-s SEVERITY] [-c
COMMUNITYSTRING] [-t TRAPSPEC]
Description
Adds a trap host recipient to the SNMP configuration of the cluster entity or a virtual
server. The trap host defines a client that is notified when an event (trap) of interest
occurs within the cluster or virtual server. Each configuration supports a maximum of
10 trap host recipients. If no trap specification is referenced, only generic and elog
system event traps of a severity that is equal to or greater than the severity threshold
level are sent to the trap host recipient. When one is referenced, it identifies specific
traps of interest to be sent by type rather than severity. Once a trap is added, the
configuration change becomes effective immediately.
Options
Table 24-2 : Options for the snmp add trap command
Example
The following example adds a trap for host 10.2.1.15 with the severity set to error and
a community string value of errorstring.
Related Commands
elog level Sets the priority level of messages to be
processed.
snmp add trapspec Adds a trap specification for trap recipient.
snmp delete trap Deletes a trap host recipient.
Synopsis
snmp add cluster|VIRTUALSERVER trapspec TRAPSPEC TSLIST
Description
Adds a trap specification to the SNMP configuration of the cluster entity or a virtual
server. The trap specification defines specific traps of interest by type that may be sent
to a trap recipient. It consists of a list of trap numbers or range of trap numbers. The
traps may also be referenced by keywords that map to a group of traps related by
function. When a trap spec by the same name is already defined, the new trap spec
entries are appended to the existing list.
Each trap message includes various object parameters which provide additional
information for the trap event. The defined traps are listed in Table 24-5 on page 24-7
with their corresponding trap group and trap number.
Options
Table 24-3 : Options for snmp add trapspec command
gen Generic 0
elog Elog 1
env Environmental 2-7
node Node 8-9
port Port 10-11
vsvr Virtual Server 12-17
vol Volume 18-24
Trap Group/
Trap Name Trap Object Parameters
Number
Trap Group/
Trap Name Trap Object Parameters
Number
Example
The following example adds trap spec txsp for trap groups vsvr and vol.
Related Commands
snmp add trap Adds a trap recipient.
snmp delete trapspec Deletes a trap spec for a trap recipient.
Synopsis
snmp delete cluster|VIRTUALSERVER all
Description
Deletes the entire SNMP configuration for the cluster entity or a virtual server. Once
the SNMP configuration is deleted, the configuration change becomes effective
immediately.
Example
The following example deletes the entire SNMP configuration for the cluster.
Related Commands
snmp delete community Deletes and SNMP community string.
snmp delete trap Deletes a trap host recipient.
Synopsis
snmp delete cluster|VIRTUALSERVER community COMMUNITYSTRING
Description
Deletes a community string from the SNMP configuration for the cluster entity or a
virtual server. Once a community string is deleted, the configuration change becomes
effective immediately.
Options
The COMMUNITYSTRING variable specifies a community string.
It is a printable non-white space character string from 1 to 31
characters in length.
Example
The following example deletes the community string teststring.
Related Commands
snmp add community Adds an SNMP community string.
Synopsis
snmp delete cluster|VIRTUALSERVER trap HOST[:PORT]
Description
Deletes a trap host recipient from the SNMP configuration of the cluster entity or a
virtual server. Once a trap host is deleted, the configuration change becomes effective
immediately.
Options
Table 24-6 : Options for the snmp delete trap command
Example
The following example deletes the trap recipient for IP address 10.2.1.15.
Related Commands
snmp add trap Adds a trap host recipient.
Synopsis
snmp delete cluster|VIRTUALSERVER trapspec TRAPSPEC [TSLIST]
Description
Deletes a trap specification or specified entries within a trap specification from the
SNMP configuration for the cluster entity or a virtual server.
Options
Table 24-7 : Options for the snmp delete trapspec command
Example
In the following example, trap specification txsp is deleted.
Related Commands
snmp add trapspec Adds a trap specfication for a trap recipient.
snmp delete trap Deletes a trap recipient.
Synopsis
snmp modify cluster|VIRTUALSERVER syslocation|syscontact STRING
Description
Changes the system contact or system location information that is reported by the
cluster entity or a virtual server when the corresponding MIB-II object is retrieved.
The NAS Gateway supports writing two specific variables, the system contact and
system location information, by setting the following MIB objects:
sysContact The name, email, or other contact
information for the administrator of
the NAS Gateway
sysLocation The physical location of the NAS
Gateway
By default, the sysContact object is set to support@onstor, and the sysLocation
object is set to ONStor for the cluster entity. However, through the snmp modify
command, you can set a more appropriate value for either object.
Note!
The default values are set for the cluster, not the virtual servers.
Options
Table 24-8 : Options for the snmp modify system command
Example
In the following example, the system location MIB object is updated.
Related Commands
snmp add community Adds an SNMP community string.
Synopsis
snmp show cluster|VIRTUALSERVER
Description
Displays the SNMP configuration for the cluster entity or a virtual server. It includes
the read-only and read-write community strings used for SNMPv1 and SNMPv2c, trap
host recipients, trap specifications, and configurable MIB objects syscontact and
syslocation.
You can display the current SNMP configuration at any time by running the snmp
show command.
Example
This example shows the current SNMP configuration for the cluster with the following
information:
• The name of the SNMP read-only community string
• The name of the SNMP read-write community string
• The trap host recipients
• The trap specifications
• The NAS Gateway’s system contact information.
• The NAS Gateway’s physical location.
Synopsis
stats show ldavg
Description
Use the stats show ldavg command to see the amount of load on each CPU in the
main data path. The stats show ldavg command tracks information for the amount of
load on each of the following processors:
• The NCPU, which processes transport traffic
• The ACPU, which processes most of the CIFS and NFS traffic
• The FP1 and FP2 CPUs, which process file system traffic
• The FC CPU, which processes SCSI traffic
Note!
The SSC is not in the main data path, so the load on SSC CPUs is not
displayed.
For these processors, the load average displays a value between zero (0) and one (1)
that indicates how much loaded is on each processor. Zero indicates that the processors
has no load; one indicates that the processor is at full load; and a decimal value
between 0 and 1 indicates the percentage of load on the processors. For example, a
value of .60 indicates a 60% load.
The stats show ldavg command gathers the processor loads by using a polling model.
Each polling interval is approximately 1 to 2 seconds long. The stats show ldavg
command is useful for determining which CPUs are more busy or less busy for any
given user load.
Example
Synopsis
symlink add VOLUME REDIRECTEDPATH LINKTARGETTEXT
Description
Symbolic links can facilitate file access. A symbolic link is a mapping between a
representative path and an actual path to a volume or directory. For example, a
symbolic link for /pubs/projects/users/paulw/filter could be created as /filter.
However, in a mixed common Internet file services (CIFS) and network file services
(NFS) environment, problems can arise because NFS can process a file system path
that uses an absolute symbolic link, but CIFS cannot.
Note!
Symbolic link mappings are configured per volume, and the target of the
symbolic link always needs to lead to the same volume. You cannot create a
symbolic link whose target is on a different volume.
To allow CIFS clients to process absolute symbolic links, create a rule for mapping an
absolute symbolic link so that every CIFS client’s access request for that target can be
processed. When the client follows the symbolic link, security settings are applied to
the directory and target in the symbolic link as if the client was following a standard
path.
EverON™ software supports wide links on CIFS shares. This feature allows CIFS
clients access to shares on multiple volumes on multiple virtual servers or NAS
Gateways. The wide link feature operates similar to Microsoft’s distributed file system
(DFS). For more information regarding DFS, see www.microsoft.com. Wide links
combine multiple CIFS file systems into a single share across NAS Gateways and
virtual servers. By default, wide links are enabled.
Note!
Before you can use the wide link feature, you need to set up domain trusts. For
information on how to setup domain trusts, see www.microsoft.com. Wide
links can allow clients to follow shares to different domains only if the
domains are trusted.
The ONStor™ NAS Gateway does not support absolute symbolic links without a
symbolic link mapping. The mapping allows a CIFS client to follow a symbolic link to
a target that is supported on the same share only. Without a symbolic link mapping, a
target volume or directory is still available through the actual path.
If a symbolic link is configured to a target, the NAS Gateway always follows that link.
However, based on permissions, a user might not be able to open or change the target
of the symbolic link. In such cases, the NAS Gateway allows the client to traverse the
directory, but shows an empty directory if the permissions disallow the manipulation
of the object at the target of the symbolic link.
If multiple links are configured, the NAS Gateway matches to the longest path. By
default, a symbolic link is active when it is added to the NAS Gateway. The NAS
Gateway can support a total of 32 symbolic links in one path.
Note!
The symlink add command creates a symbolic link mapping rule for absolute
symbolic links only. Symbolic links are always available through NFS, and you
can create them through NFS without using this command. However, NFS-
created symbolic links might not be accessible through CIFS unless you map
the symbolic link with the symlink add command.
Options
Table 26-1 : Options for the symlink add command
Example
Related Commands
symlink delete Removes a symbolic link mapping rule from a
volume.
symlink show Shows the symbolic link mapping rules on a
volume.
Synopsis
symlink delete VOLUME LINKTARGETTEXT
Description
You can remove a symbolic link mapping rule any time by running the symlink
delete command. This command deletes a mapping rule for CIFS when it accesses
an absolute NFS symbolic link. The rule to delete is identified by the symbolic link
target text.
When you remove a symbolic link mapping rule, the mapping and rule is deleted from
a specified volume. You need to remove symbolic link mapping rules individually.
Therefore, you need to run the symlink delete command once for each symbolic
link mapping rule you want to remove, and once on each volume. After a symbolic
link mapping rule is removed, you can still access the previously linked volume or
directory by navigating through the actual path.
EverON software supports wide links on CIFS shares. This feature allows CIFS clients
access to shares on multiple volumes on multiple virtual servers or NAS Gateways.
The wide link feature operates similar to Microsoft’s distributed file system (DFS).
For more information regarding DFS, see www.microsoft.com. Wide links combine
multiple CIFS file systems into a single share across NAS Gateways and virtual
servers. By default, wide links are enabled.
Note!
Before you can use the wide link feature, you need to set up domain trusts. For
information on how to setup domain trusts, see www.microsoft.com. Wide
links can allow clients to follow shares to different domains only if the
domains are trusted.
Options
Table 26-2 : Options for the symlink delete command
Example
In this example, the symbolic link is deleted from the volume techpubs.
Related Commands
symlink add Removes a symbolic link mapping rule from a
volume.
Synopsis
symlink show VOLNAME
Description
You can display the symbolic link mappings configured on a volume by running the
symlink show command. This command shows the mapping rules for CIFS when it
accesses an absolute NFS symbolic link on a volume. This command displays
symbolic link information for each volume, so run this command on each volume if
you want to see all symbolic links configured.
EverON software supports wide links on CIFS shares. This feature allows CIFS clients
access to shares on multiple volumes on multiple virtual servers or NAS Gateways.
The wide link feature operates similar to Microsoft’s distributed file system (DFS).
For more information regarding DFS, see www.microsoft.com. Wide links combine
multiple CIFS file systems into a single share across NAS Gateways and virtual
servers. By default, wide links are enabled.
Note!
Before you can use the wide link feature, you need to set up domain trusts. For
information on how to setup domain trusts, see www.microsoft.com. Wide
links can allow clients to follow shares to different domains only if the
domains are trusted.
Options
VOLUME is the name of the volume on which the symbolic link
mapping rule applies.
Example
Related Commands
symlink add Adds a symbolic link mapping rule on a volume.
symlink delete Removes a symbolic link mapping rule from a
volume.
System Compare
Synopsis
system compare LOCATION [-s]
Description
With the system compare command, you can compare the contents of the current
system software on the ONStor™ NAS Gateway’s active compact flash module to the
system software that resides on another location, for example a network file services
(NFS) or file transfer protocol (FTP) download server.
Options
Table 27-1 : Options for the system compare command
Example
Synopsis
system config copy
Description
At any time, you can copy the ONStor NAS Gateway’s existing configuration which
resides in the cluster database. Use the system config copy command to make a
backup copy of the cluster database.
The NAS Gateway supports the cluster database on one of two compact flash modules.
When you run the system config copy command, the cluster database is copied
from the presently active compact flash to the presently standby compact flash. The
cluster database copy has a unique name so that the copy is not mistaken for the
original.
Note!
This command is closely associated with the system config restore command,
which you use to restore the secondary system configuration that has been
saved through the system config copy command.
Example
In this example, the current configuration supported in the NAS Gateway’s cluster
database is copied to the NAS Gateway’s standby compact flash.
Related Commands
system config reset Loads the default system configuration
parameters for the NAS Gateway.
system config restore Loads the configuration from the secondary disk
that was most recently saved.
system copy all Makes a backup copy of all the current file
systems.
system copy init Initializes the secondary compact flash and
duplicates the file system from the primary to
the secondary compact flash.
Synopsis
system config reset
Description
You can reset the NAS Gateway’s system configuration to an initial configuration by
running the system config reset. This command removes the existing cluster
database from compact flash so that you can reconfigure the NAS Gateway.
Note!
To reconfigure the NAS Gateway after deleting the cluster database, restart the
NAS Gateway. When the NAS Gateway restarts, it proceeds through the start
script as if it is configured for the first time. To configure the NAS Gateway,
follow the start script. It prompts you for required information. When you
finish the start script, the NAS Gateway is online and operating with a default
configuration that you can customize to your needs. You access this menu from
the ssc_console.
Warning!
You cannot change the node name of a NAS Gateway during
runtime. If you need to change the node name, you can run the
system config reset command to return to the start script where
you can reset or change the node name. This clears all
configuration and delete the cluster database.
Example
In this example, the NAS Gateway is reset to the default system configuration. When
this command completes, the current cluster database is deleted. After the NAS
Gateway restarts, you can configure the NAS Gateway as if this was the initial
configuration. Following the start script facilitates the configuration of the NAS
Gateway.
Related Commands
system config copy Copies the entire system configuration from the
primary disk to the secondary disk.
system config restore Loads the configuration from the secondary disk
that was most recently saved.
system copy all Makes a backup copy of all the current file
systems.
system copy init Initializes the secondary compact flash and
duplicates the file system from the primary to
the secondary compact flash.
Synopsis
system config restore
Description
If you have a backup copy of the NAS Gateway’s system configuration, you can load
it into runtime by running the system config restore command. Use this command
from the secondary flash to restore the NAS Gateway from the most recently saved
cluster database.
After you restore the configuration, you can modify the active configuration to your
needs without affecting the saved backup copy of the system configuration.When you
restore the configuration, you do not delete the secondary copy of the cluster database.
It still resides on compact flash.
Note!
This command is closely associated with the system config copy command,
which you use to create a backup copy of the system configuration that can
then be restored through the system config restore command.
Example
In this example, the last saved configuration is restored on the NAS Gateway. When
this command completes, any backup copy of the cluster database on the standby
compact flash is copied to the active compact flash.
Related Commands
system config copy Copies the entire system configuration from the
primary disk to the secondary disk.
system config reset Loads the default system configuration
parameters for the NAS Gateway.
system copy all Makes a backup copy of all the current file
systems.
system copy init Initializes the secondary compact flash and
duplicates the file system from primary to
secondary compact flash.
Synopsis
system copy all [-i]
Description
The NAS Gateway contains all the runtime, configuration, and ROM files it needs on
the compact flash module that is installed on the system switch and controller (SSC).
The NAS Gateway supports copying all files, including the default configuration file
and custom configuration files on the NAS Gateway’s compact flash. You can copy all
configuration files to the standby compact flash by running the system copy all
command. You might experience a slight delay as the files are copied, but the system
remains online and serves read and write requests during any delay from the copying.
Options
-i is the option that initializes the secondary compact flash before
copying the contents of the primary compact flash to the
secondary compact flash.
Example
In this example, all files on the NAS Gateway’s compact flash are copied.
Related Commands
system config copy Copies the entire system configuration from the
primary disk to the secondary disk.
system config reset Loads the default system configuration
parameters for the NAS Gateway.
system config restore Loads the configuration from the secondary disk
that was most recently saved.
system copy init Initializes the secondary compact flash and
duplicates the file system from primary to
secondary compact flash.
Synopsis
system copy init
Description
Use the system copy init command to initialize the secondary compact flash to
prepare it for duplicating the file system from the primary compact flash onto the
secondary disk. Initializing the standby compact flash module is analogous to
formatting a disk. It clears the compact flash of any contents and formats the disk with
file system structure.
Example
In this example, the standby compact flash module is initialized and file system
structure is added.
Related Commands
system config copy Copies the entire system configuration from the
primary disk to the secondary disk
system config reset Loads the default system configuration
parameters for the NAS Gateway.
system config restore Loads the configuration from the secondary disk
that was most recently saved.
system copy all Makes a backup copy of all the current file
systems.
Synopsis
system create corevolume VOLNAME [LUN]
Description
The core volume is the administrator-assigned space on disk for the NAS Gateway
memory core. If the NAS Gateway encounters an error, the core memory can be
flushed to the core volume. You can create a core volume by running the system
create corevolume command.
Note!
You can create only one corevolume per NAS Gateway and it must be created
under the management virtual server.
Options
Table 27-2 : Options for the system create corevolume command
Example
In this example, the logical volume pubstest is created as the core volume.
Related Commands
system delete corevolume Deletes the coredump volume of the NAS
Gateway.
system show coredump Shows the core dump's configuration.
lun show disk Shows the list of devices in the cluster.
Synopsis
system create mgmtVolume [-q HARDQUOTA][-s SOFTQUOTA][-g
MINAUTOGROW]
[-h HIGHWATERMARK][-l MINLUNSIZE][-u MAXLUNSIZE][-r RAIDLEVEL]
[-L LANGUAGE]
Description
The management volume exists in the management virtual server, which manages
specific NAS Gateway operations.
The management volume operates like any other volume, it can contain user data, and
is subject to volume-level usage conditions for volume AutoGrow™. You can create
the management volume through the system create mgmtVolume command.
When creating the management volume, consider the following:
• You need to configure the management volume within the context of the
management virtual server.
• The management volume always has the name string vol_mgmt_XXXX where XXXX
is the same numerical identifier as the management virtual server in which it is
configured. For example, in management virtual server vs_mgmt_4353, you would
expect to see management volume vol_mgmt_4353.
• You need to configure the management volume on an array, and you can configure
it with volume AutoGrow parameters at creation time.
• After you have created the management volume, you can modify it and its
AutoGrow parameters through the volume modify command. The management
volume operates like any other volume with regard to AutoGrow and usage
parameters, but it contains management data for the NAS Gateway as well as user
data.
Options
Table 27-3 : Options for the system create mgmtVolume command
Example
In the following example, a management volume is created with default values on the
virtual server..
Related Commands
volume create Creates a new volume in the current virtual
server.
volume show Shows one or more volumes.
volume delete Deletes a volume from a virtual server.
Synopsis
system delete corevolume VOLNAME [force]
Description
The core volume is the administrator-assigned space on disk for the NAS Gateway
memory core. You can delete the core volume from file system space by running the
system delete corevolume command.
Note!
While the core volume is deleted, the NAS Gateway cannot write core dump
information to disk.
Options
Table 27-4 : Options for the system delete corevolume command
Example
In this example, the core volume for the logical volume pubstest is deleted. When the
core volume is deleted, all core dumps that have been written to that volume are
deleted, and the disk space that was owned by the core volume is reclaimed for use by
the logical volume manager or the file system.
Related Commands
system create corevolume Creates a core dump volume for the NAS
Gateway.
system show coredump Shows the core dump's configuration.
Synopsis
system disable readahead
Description
When read ahead caching is enabled, it can optimize the read ahead of data blocks into
the NAS Gateway data cache if the NAS Gateway is reading from an application that
uses sequential file reads. However, some applications perform random file reads, and
if the NAS Gateway’s read ahead caching is enabled, data cache thrashing can occur.
If read ahead caching has been enabled on the NAS Gateway, you can disable it by
running the system disable readahead command. By default, read ahead caching is
disabled.
Note!
You can determine whether read ahead caching needs to be enabled or disabled
by running the system show readahead state performance command. If an
excessive amount of cache misses is occurring, you can try enabling read ahead
caching for more optimized use of the cache. If the amount of cache misses is
acceptable, you can leave read ahead caching in its present state.
Example
In this example, the readahead caching for the NAS Gateway’s user data cache is
disabled.
Related Commands
system enable readahead Enables the data cache read ahead policy.
system show readahead performanceShows read ahead performance statistics.
system show readahead state Shows the current read ahead policy.
Synopsis
system dnsconfigure hosts
Description
The NAS Gateway supports domain name service (DNS) name resolution for virtual
servers through a hosts database specific to each virtual server. You can configure a
mapping of IP addresses to symbolic device names by running the system
dnsconfigure hosts command.
Items in each line are separated by any number of blanks or tab characters. A hash
mark (#) indicates the beginning of a comment. In comment text, characters up to the
end of the line are not interpreted. Lines are limited to 1024 characters. Lines that
exceed the 1024 character limit are ignored.
Network addresses are specified in the dotted decimal notation. Host names may
contain any printable character other than a field delimiter, new line, or comment
character.
Example
eng31>
Related Commands
system dnsconfigure resolver Configures the host name resolver.
vsvr set Sets the current virtual server context for all
future commands.
vsvr clear Clears the current virtual server context for all
future commands.
Synopsis
system dnsconfigure resolver
Description
The NAS Gateway supports a DNS resolver configuration file that allows you to
configure different types of DNS-supported information. You can edit the resolver
configuration file for the DNS-supported information with the system dnsconfigure
resolver command. When you run this command from within the context of the
virtual server, it applies to the resolver configuration file of that virtual server. When
you run this command from outside the context of the virtual server, it applies to the
resolver configuration file of the NAS Gateway.
The system dnsconfigure resolver command starts a text editor and allows you
to type one or more mappings. When the text editor is closed, the mapping you created
is saved.
The resolver configuration file contains a list of keyword/value pairs that provides
various types of resolver information. Valid keywords for editing the resolver
configuration file are:
• nameserver — Specifies the IP address, in dotted decimal notation, of a name
server for the resolver to query. When the name server is found, the IP address of
that name server is displayed.
You can specify up to three name servers, one per keyword. The resolver queries them
in the order listed. If a query times out, the query algorithm continues to query each
subsequent name server until the list of specified name servers is completed. The
query algorithm then repeats the query of the name servers on the list for a maximum
number of times.
• domain — Specifies the local domain name. Most queries for names within the
domain accept short names relative to the local domain.
• lookup — Specifies which database to search and in which order to search. Valid
keywords are: bind and file.
- If you specify bind only, the resolver search uses the domain server to
search IP address-to-DNS name bindings.
- If you specify file only, the resolver searches the hosts database.
Note!
When you are resolving a host name within a virtual server context, the NAS
Gateway always checks the network information services ( NIS) domain for
that virtual server first. This is done automatically; you do not have to
explicitly specify this in your query.
If you specify neither the bind nor the file keyword with the lookup keyword, the
resolver searches both databases, first the bind database, then the hosts database.
• search — Specifies a search list for host-name lookup. The search list contains a
domain search path following the search keyword with spaces or tabs separating
the names. The search list function supports a maximum of six domains and a total
of 1024 characters. Most resolver queries search each component of the search
path in turn until a match is found.
Note!
The search process can take some time if the servers for the listed domains are
not local. Queries time out if no server is available for one of the domains.
You can use the system ping command with a host name to check whether you
configured the resolver correctly. When given a host name, the ping tool attempts to
resolve the name and prints the IP address of the host in dotted decimal notation if the
resolution is successful.
Example
nameserver 192.168.192.34
domain PUBSTEST3
lookup file bind
search SAMOA BALI FIJI
eng11>
Related Commands
system dnsconfigure hosts Configures the host name database.
vsvr set Sets the current virtual server context for all
future commands.
vsvr clear Clears the current virtual server context for all
future commands.
Synopsis
system dnsconfigure show
Description
When executed inside a virtual server context, the system dnsconfigure show
command displays the hosts file and resolver for that virtual server. When executed
outside a virtual server context, it displays the hosts file and resolver of the NAS
Gateway.
Example
The previous example displays the hosts file and resolver for virtual server VS99.
Related Commands
system dnsconfigure hosts Configures the host name database.
system dnsconfigure resolver Configures the host name resolver.
vsvr clear Clears the current virtual server context for all
future commands.
vsvr set Sets the current virtual server context for all
future commands.
Synopsis
system enable readahead
Description
You can enable or disable read ahead data caching. Enabling read ahead data caching
increases the NAS Gateway’s read ahead throughput of data blocks for applications
that require sequential file readings. By default, the NAS Gateway’s read ahead
caching is disabled. You can enable it by running the system enable readahead
command.
Note!
You can determine whether read ahead caching needs to be enabled or disabled
by running the system show readahead state performance command. If an
excessive amount of cache misses is occurring, you can try enabling read ahead
caching for more optimized use of the cache. If the amount of cache misses is
acceptable, you can leave read ahead caching in its current state.
Example
In this example, the readahead caching for the NAS Gateway’s user data cache is
enabled.
Related Commands
system disable readahead Disables the data cache readahead policy.
system show readahead state Shows the current readahead policy.
system show readahead performanceShows readahead performance statistics.
Synopsis
system get all [-n NUMBER] [-i INTERVAL] [-a] [-V VSVRNAME]
[-v VOLNAME] [-d DIRECTORY] [-c CASENUM]
Description
You can gather all system health information and log files into one file through the
system get all command. The system information gathered includes the following:
For example, all_ONStor1 indicates a symbolic link to the most recent instance of the
system get all information on the NAS Gateway ONStor1.
Options
Table 27-5 : Options for the system get all command
Table 27-5 : Options for the system get all command (Continued)
Table 27-5 : Options for the system get all command (Continued)
Example
Related Commands
system get config Gets configuration and basic statistics for this
NAS Gateway, an sfinfo.xml file that you can
print to the screen.
system get logs Collects and saves log files. This is a subset of
the information generated by the system get
tse command.
system get stats Collects and saves system and volume statistics
that you can print to the screen.
system get tse Gathers log and crash files that ONStor
Technical Support may need to diagnose a
problem. This is a subset of the information
generated by the system get all command.
Synopsis
system get config [-s | [-V VSVRNAME] [-v VOLNAME] [-d DIRECTORY]
[-c CASENUM]]
Description
You can gather system configuration information with the system get config
command. The output of this command is an XML file that is sent to a directory on a
target location, which can be either the management volume or a volume that you
specify through the command’s arguments. You need to create the target directory
before any information can be written to it.
Note!
Gathering configuration information from the entire NAS Gateway can take
some time.
No limit exists for how many copies of the system get config output you can keep.
As long as the directory has available space to write the output, the system get
config command posts output to the directory.
The NAS Gateway creates unique names so that you can keep all iterations of the
system get config commands. If multiple copies of the information exist for the
same date, a number is appended to the end of the new file name to prevent
overwriting of the existing file. For example, if system_get_config already exists, and a
new iteration of system_get_config occurs on the same date, the new file is named
system_get_config.1.
When the system get config command completes, a symbolic link is created to the
most recent system_get_config information. This symbolic link always points to the
latest iteration of configuration information. Therefore, no matter how many iterations
of configuration information exist in the target directory, you can always find the most
recent information by following the symbolic link. The symbolic link takes the format
of TYPE_NASGATEWAY, where TYPE is the type of system get command that was run,
and NASGATEWAY is the name of the NAS Gateway on which the command was run.
For example, config_ONStor1 indicates a symbolic link to the most recent instance of
the system get config information on the ONStor1 NAS Gateway.
Options
Table 27-6 : Options for the system get config command
Table 27-6 : Options for the system get config command (Continued)
Example
In this example the configuration information was written to an XML file in the
directory /tmp/sfinfo.xml to vol_mgmt_520:/system_get_config,eng93, 2007-01-14/
sfinfo.xml on the management volume. To view the information open the XML file.
Related Commands
system get all Gets all health, configuration, and statistical
information for this NAS Gateway, an sfinfo.xml
file that you can print to the screen.
system get logs Collects and saves log files. This is a subset of
the information generated by the system get
tse command.
system get stats Collects and saves system and volume statistics
that you can print to the screen.
system get tse Gathers log and crash files that ONStor
Technical Support may need to diagnose a
problem. This is a subset of the information
generated by the system get all command.
Synopsis
system get logs [-V VSVRNAME] [-v VOLNAME] [-d DIRECTORY] [-c
CASENUM]
Description
You can get NAS Gateway log files by running the system get logs command. These
log files contain system messages or error messages, which help to analyze
performance issues or debugging problems. The log files are gathered and made
available through a target directory, which can be either the management volume
default location or through a specified volume. You need to create the target directory
before any information can be written to it
No limit exists for how many copies of the system get logs output you can keep. As
long as the directory has available space to write the output, the system get logs
command will post output to the directory.
The NAS Gateway creates unique names so that you can keep all iterations of the
system get logs commands. If multiple copies of the information exist for the same
date, a number is appended to the end of the new file name to prevent overwriting of
the existing file. For example, if system_get_logs already exists, and a new iteration of
system_get_logs occurs on the same date, the new file is named system_get_logs.1.
When the system get logs command completes, a symbolic link is created to the
most recent system_get_logs information. This symbolic link always points to the latest
iteration of logs. Therefore, no matter how many iterations of logs exist in the target
directory, you can always find the most recent information by following the symbolic
link. The symbolic link takes the format of TYPE_NASGATEWAY, where TYPE is the
type of system get command that was run, and NASGATEWAY is the name of the NAS
Gateway on which the command was run. For example, logs_ONStor1 indicates a
symbolic link to the most recent instance of the system get logs information on the
ONStor1 NAS Gateway.
Options
Table 27-7 : Options for the system get logs command
Table 27-7 : Options for the system get logs command (Continued)
Example
In this example directories for the system logs were created on the management
volume. Open the logs to view the information.
Related Commands
system get all Get all health, configuration, and statistical
information for this NAS Gateway, an sfinfo.xml
file that you can print to the screen.
Synopsis
system get stats [-k] [-n NUMBER] [-i INTERVAL] [-a]
[-s | [-V VSVRNAME] [-v VOLNAME] [-d DIRECTORY] [-c CASENUM]]
Description
You can gather and save system and volume statistics by running the system get
stats command. This command gathers statistics for one or all volumes on a NAS
Gateway. The statistics are posted to a target directory, which can be the management
volume default location or a specified volume in the file system. You need to create
the target directory before information can be written to it.
No limit exists for how many copies of the system get stats output you can keep. As
long as the directory has available space to write the output, the system get stats
command will post output to the directory.
The NAS Gateway creates unique names so that you can keep all iterations of the
system get stats commands. If multiple copies of the information exist for the same
date, a number is appended to the end of the new file name to prevent the existing file
from being overwritten. For example, if system_get_stats already exists, and a new
iteration of system_get_stats occurs on the same date, the new system_get_stats file is
named system_get_stats.1.
When the system get stats iteration stops, a symbolic link is created to the most
recent system_get_stats information. This symbolic link always points to the latest
iteration of statistics. Therefore, no matter how many iterations of statistics exist in the
target directory, you can always find the most recent information by following the
symbolic link. The symbolic link takes the format of TYPE_NASGATEWAY, where TYPE
is the type of system get command that was run, and NASGATEWAY is the name of the
NAS Gateway on which the command was run. For example, stats_ONStor1 indicates a
symbolic link to the most recent instance of the system get stats information on the
ONStor1 NAS Gateway.
You can stop statistics gathering intervals in either of the following ways:
• If the previously configured statistics gathering interval is in progress, you can
stop it by running the system get stats command. For example, if you configure
statistics to run every hour, and an hourly interval is running, it stops when you run
the system get stats command again.
• If the current statistics gathering interval is in progress, you can stop it by using the
optional -k argument. This option is useful if you have started the statistics
gathering interval, but need to stop it before it completes. Each interval of statistics
is gathered into one file and put in the target location or displayed on the
management console. If you stop an iteration early, the system health information
already gathered has associated files in the target location, but those files contain
only the information that was gathered before the iteration was stopped. No
additional files are put in the target location after the iteration is stopped.
Options
Table 27-8 : Options for the system get stats command
Table 27-8 : Options for the system get stats command (Continued)
Table 27-8 : Options for the system get stats command (Continued)
Example
Related Commands
system get all Get all health, configuration, and statistical
information for this NAS Gateway, sfinfo.xml
file that you can print to the screen.
system get config Get configuration and basic statistical
information for this NAS Gateway, an sfinfo.xml
file that you can print to the screen.
system get tse Gather log and crash files that technical support
may need to diagnose a problem. This is a subset
of the information generated by the system get
tse command.
Synopsis
system get tse [-V VSVRNAME] [-v VOLNAME] [-d DIRECTORY] [-c
CASENUM]
Description
With the system get tse command you can gather of a subset of technical support
information that ONStor Technical Support engineers can use for troubleshooting. The
technical support engineering (TSE) information helps ONStor staff to gather
information on demand, without having to wait for an information gathering interval
to complete.
Note!
You need this command only if significant parts of the NAS Gateway are not
operating and you cannot run the system get config or system get
all commands.
The system get tse command obtains system information and places it in a directory
on the target location, which can be the management volume default location or a
specified volume in the file system. You need to create the directory before any
information can be written to it.
No limit exists for how many copies of the system get tse output you can keep. As
long as the directory has available space to write the output, the system get tse
command will post output to the directory.
The NAS Gateway creates unique names so that you can keep all iterations of the
system get tse commands. If multiple copies of the information exist for the same
date, a number is appended to the end of the new file name to prevent the existing file
from being overwritten. For example, if system_get_tse already exists, and a new
iteration of system_get_tse occurs on the same date, the new file is named
system_get_tse.1.
When the system get tse iteration stops, a symbolic link is created to the most recent
system_get_tse information. This symbolic link always points to the latest iteration of
the TSE information. Therefore, no matter how many iterations of TSE information
exist in the target directory, you can always find the most recent information by
following the symbolic link. The symbolic link takes the format of
TYPE_NASGATEWAY, where TYPE is the type of system get command that was run,
and NASGATEWAY is the name of the NAS Gateway on which the command was run.
For example, tse_ONStor1 indicates a symbolic link to the most recent instance of the
system get tse information on the ONStor1 NAS Gateway.
Options
Table 27-9 : Options for the system get tse command
Table 27-9 : Options for the system get tse command (Continued)
Example
In this example TSE information was gathered and written to a directory on the
management volume.
Related Commands
system get all Get all health, configuration, and statistical
information for this NAS Gateway, sfinfo.xml
file that you can print to the screen.
system get config Get configuration and basic statistical
information for this NAS Gateway, an sfinfo.xml
file that you can print to the screen.
system get logs Collects and saves log files. This is a subset of
the information generated by the system get
tse command.
system get stats Collect and save system and volume statistics
that you can print to the screen.
System Halt
Synopsis
system halt
Description
Use the system halt command to stop all active internal processes on the NAS
Gateway without having to power cycle the system or initiate a restart. When you halt
the system, you can expect the following occurrences:
• All user transactions stop.
• All internal processes halt, with the exception of a few management functions.
• The system remains online, but inactive.
• The system remains powered on.
• The configuration file does not change.
To reactivate the NAS Gateway, you need to power cycle or restart.
Example
In this example, the NAS Gateway is halted. When the system is halted, the running
configuration is not saved or changed, no new disk read or write transactions can
occur, and the modules remain in the state they were in before the system was halted.
The system halt stops the active processes without restarting the NAS Gateway.
Related Commands
system reboot Restarts the NAS Gateway from the specified
compact flash module.
Synopsis
system modify coredumpmaxsavedfiles MAX
Description
By default, the NAS Gateway saves one core dump file on the management volume.
However, you can set the maximum number of core dump files to save on the
management volume by running the system modify coredumpmaxsavedfiles
command.
Options
The MAX variable is the maximum number of files to be saved.
The default value of MAX is 8. The values can be between 0-99.
Example.
In this example, the number of core dumps saved to the management virtual server is
set to 5.
Synopsis
system modify coredump off
Description
The NAS Gateway supports an automatic core dumping feature that flushes the NAS
Gateway’s memory core to disk whenever the NAS Gateway encounters a system
event that causes it to reset. By default, the core dump feature is enabled. However,
you can disable automatic core dumping at any time by running the system modify
coredump off command. This command disables the automatic core dump feature so
that the memory core is not written to disk if the NAS Gateway fails.
Example
In this example, the automatic core dump feature is disabled. Therefore, if the NAS
Gateway encounters a system event that causes it to reset, the NAS Gateway’s
memory core is not sent to disk.
Related Commands
system create corevolume Creates a core dump volume for the NAS
Gateway.
system modify coremaxsavedfiles Specifies the maximum number of core files.
system show coredump Shows the core dump's configuration.
Synopsis
system modify coredump on
Description
The NAS Gateway core dump is a global memory core at the time of a serious system
event. The NAS Gateway’s core dump contains much of the data from the file
processing controller and the storage device manager (SDM).
The NAS Gateway supports an automatic core dumping feature flushes the memory
core to disk if the NAS Gateway encounters a system event that causes it to reset.
However, if the core dumping feature is disabled, you can enable the feature at any
time by running the system modify coredump on command. The core dump feature
is enabled by default.
Example
In this example, the automatic core dump feature is enabled. Therefore, if the NAS
Gateway encounters a system event that causes it to reset, the NAS Gateway’s
memory core is written to the core volume on the management virtual server if it has
been created.
Related Commands
system create corevolume Creates a core dump volume for the NAS
Gateway.
system modify coremaxsavedfiles Specifies the maximum number of core files.
system show coredump Shows the core dump's configuration.
Synopsis
system modify volumeexceptiondump [-m on|off] [-a DATATYPE]
[-d DATATYPE] [-r]
Description
This command modifies the volume exception dump state when a volume goes offline.
When the volume exception dump is enabled, the subset of memory and program state
relevant to the volume that went offline is saved to a file on the management volume.
The file name takes the following format:
volume-name.uniqueID
You can include the following data types in the volume exception type:
Table 27-10 : Data Types
Options
Table 27-11 : Options for the system modify volumeexceptiondump command
Example
In the following example the volume exception core dump is turned on.
In the following example the volume exception core dump is turned off.
In the following example the CONTEXTS data type is deleted from the volume
exception core dump.
To display the configuration of the volume exception core dump feature run the
system show coredump command.
Related Commands
system show coredump Shows the core dump's configuration.
System Ping
Synopsis
system ping [HOSTNAME | IPADDR] [-n COUNT]
Description
Use the system ping command to test network-layer connectivity to devices through
the use of standard ping packets. This command uses the Internet control message
protocol’s (ICMP) mandatory ECHO_REQUEST datagram to elicit an ICMP
ECHO_REPLY from a network-connected host or gateway. The NAS Gateway
supports pings to IP address or hosts or gateways. To resolve a ping by host name, you
need to have name resolution services, either NIS or DNS, configured on the NAS
Gateway.
Note!
The NAS Gateway’s ping function continues until you manually stop it by
typing CTRL + C.
For a host name to be resolved you need to have previously configured NIS or
DNS name resolution services in the network.
Options
Table 27-12 : Options for the system ping command
Example
In the following example, a host is pinged by IP address.
In this example, the system ping command is used to test network connectivity to the
device whose IP address is 10.1.1.189. Because the NAS Gateway received a response
and no time out occurred, this device is reachable.
In this example, the system ping is run to the device test1. This device name can be
resolved due to name resolution services, in this case NIS, being enabled on the NAS
Gateway. Because the ping function succeeded, the device is reachable.
Related Commands
int add Assigns an IP address to an interface.
int show Shows the interface table for the virtual server.
system traceroute Allows the printing of an Internet route to
another system or gateway.
System Reboot
Synopsis
system reboot [-f] [-s] [-y]
Description
Use the system reboot command to perform a soft restart. A soft restart provides the
NAS Gateway with turn off notification so that its component parts and any active
software processes can perform a graceful turn off. During some software procedures,
you might be required to start from the standby compact flash module first. If you are
required to start from the standby compact flash module before the active compact
flash, accompanying documentation explicitly mentions that requirement.
Options
Table 27-13 : Option for the system reboot command
Optio
Object Description
n
Example
In the following example the NAS Gateway is restarted.
The command causes the graceful turn off and restart of the system. The system
restarts with the last saved configuration.
In the following example the NAS Gateway is restarted with the -s option.
The command causes the graceful turn off and restart of the system but with the other
compact flash module’s contents. The system restarts with the last saved configuration
on the compact flash module that was not used last to start the NAS Gateway.
Related Commands
system halt Halts the NAS Gateway.
Synopsis
system show chassis
Description
Use the system show chassis command to display information about the hardware
that is installed in the NAS Gateway. This command lists the following information:
• The functional elements that the runtime software recognizes.
• Each type of functional element in the unit.
• The type of control processor governing the operation of the each functional
element.
• The operational state of the listed processor. Valid states are as follows:
- UP for components that have successfully started and are operating
correctly.
- DOWN for components that have not started.
- UNKNOWN for components that have an undetermined operational
state.
- PROM for components that are in programmable read-only memory
(PROM) mode.
Example
• The cpu field indicates the processors that control the listed element of the NAS
Gateway:
- SSC indicates the processor that controls and coordinates the operation
of the entire NAS Gateway.
- TXRX0 and TXRX1 indicate the processors that control the file
processing functionality, and FP0 and FP1 indicate file processing
cores associated with the Gigabit Ethernet functionality.
- FC0 indicates the processor that controls the NAS Gateway’s Fibre
Channel and SCSI functionality.
• The state field indicates whether each listed processor component is either UP
(started and operating), or DOWN (not started).
Related Commands
show temperature Shows the temperature of the NAS Gateway.
Synopsis
system show coredump
Description
During runtime, you can check the state of the automatic core dump feature by running
the system show coredump command. This command shows the following
information:
• The current state, either ON or OFF, of the NAS Gateway’s automatic core dump
feature. By default automatic core dump is enabled.
• The maximum number of saved coredump files.
• The configuration status of the core dump volume.
• The volume exception core dump status.
Example
In this example, the NAS Gateway’s automatic core dump feature is enabled. One
saved coredump file exists. The core dump volume is vol_core_520. The volume
exception core dump feature is on.
Related Commands
system create corevolume Creates a core dump volume for the NAS
Gateway.
system delete corevolume Deletes the core dump volume.
system modify coredump Specifies the core dump state.
system modify coremaxsavedfiles Specifies the maximum number of core files.
Synopsis
system show nodename
Use the system show nodename command to view the unique node name assigned to
each NAS Gateway at start time. The node name is used to uniquely identify each
NAS Gateway.
Example
In this example, the NAS Gateway’s node name is skywalker-ssc. You can run this
command on any local node to view the node’s name.
Related Commands
system show chassis Shows information about the hardware installed
on the NAS Gateway.
Synopsis
system show readahead performance
Description
You can view the statistics for read ahead caching at any time by running the system
show readahead performance command. Read ahead cache performance statistics
include:
• The number of read ahead requests the NAS Gateway has received
• The number of data blocks read
• The percentage of read ahead hits in the NAS Gateway’s data cache
• The percentage of read ahead misses in the NAS Gateway’s data cache
Through this command you can see how effectively read ahead caching is operating
with user data applications. If cache thrashing is occurring, you can change the state of
the read ahead caching to improve the usage of the NAS Gateway’s data cache.
Example
In this example, the read ahead cache performance is displayed. The cache-hit-to-miss
ratio is 89/11, which indicates an efficient usage of the cache. If the hit-to-miss ratio
was excessive, for example, a hit-to-miss ratio approaching 50/50, you could change
the state of the read ahead feature, in attempt to reduce cache thrashing.
Related Commands
system enable readahead Enables data cache read ahead policy.
system disable readahead Disables data cache read ahead policy.
Synopsis
system show readahead state
Description
You can display the state of read ahead caching at any time by running the system
show readahead command. By default, this feature is enabled.
Example
In this example, the current state of readahead caching for the NAS Gateway’s user
data cache is enabled.
Related Commands
system enable readahead Enables data cache read ahead policy.
system disable readahead Disables data cache read ahead policy.
Synopsis
system show summary
Description
Use the system show summary command to view summary information about
the current NAS Gateway, such as gateway name, current date & time, timezone,
system uptime, system temperature, primary flash software version, chassis
information, NTP configuration, sc1 & sc2 ip addresses and total number of virtual
servers.
Example
eng57> system show summary
Name: eng57
Date & Time : Tue Nov 7 16:58:03 2006
Time zone : US/Pacific
System Uptime : 01:01:46
System temperature (celsius): 40
Software Version: 2.1.0.0
chassis
--------
Model number: ONS-SYS-2240
System revision: A2
System serial number: 0508040006
MAC addr: 00:07:34:01:C5:00
BMFPGA : Version 4
Board revision: A1
Board serial number: 0506010562
Boot Dev: wd1a (cf2)
SSC
PROM_R9000 : prom-2.0.3 : Thu Apr 13 16:44:49 2006
FC0
PROM_R9000 : prom-2.0.3 : Thu Apr 13 16:44:49 2006
FCNIM : R2.1.0.0BC-103006 : Mon Oct 30 22:19:06 2006
NTP Configuration :
remote refid st t when poll reach delay offset jitter
==============================================================================
*127.127.1.0 127.127.1.0 10 l 17 64 377 0.000 0.000 0.031
SC1 IP : 10.2.1.15
SC2 IP :
No of Virtual server(s) : 3
eng57>
Related Commands
cluster show cluster Displays the cluster configuration.
cluster show summary Displays the cluster configuration summary.
Synopsis
system show temperature
Description
Use the system show temperature command to display the temperature readings for
the interior of the NAS Gateway. The NAS Gateway contains a temperature sensor
that checks the ambient temperature inside the chassis and reports the temperature in
realtime. When you run the system show temperature command, the last gathered
temperature readings are displayed in number of degrees centigrade (ºC).
Note!
The formula for converting ºC to ºF is [(ºC * 1.8) + 32].
If the temperature sensor is not able to determine the temperature inside the
chassis, the NAS Gateway shows a zero (0).
Example
In this example, the NAS Gateway is displaying the temperature inside the chassis,
which is 36º C.
Related Commands
system show chassis Shows chassis hardware information of the NAS
Gateway.
Synopsis
system show uptime
Description
Use the system show uptime command to display the current time and how long the
system has been running.
Example:
Related Commands
system show chassis Show chassis information.
system show coredump Show core dump information.
system show nodename Show this node's name.
system show readahead Show data cache readahead status.
system show temperature Show the chassis temperature.
system show version Show the system version information.
Synopsis
system show username
Description
Displays the user name used to log in to the NAS Gateway. For example, admin.
Also displays the NIS/LDAP/Windows domain name as username@domain. If the
user account is local to the NAS Gateway, the domain name is not displayed.
Example
Synopsis
system show version
Description
Use the system show version command to display system-wide information about
the hardware and software that is installed in the NAS Gateway. This command lists,
the following information:
• The type of hardware component installed, and the version of firmware or software
loaded onto each component
• The date each version of firmware/software was created.
• The version numbers of selected hardware components
Example
bobcat-pl> system show version
chassis
--------
Model number: 2260
System revision: 01
System serial number: 505-0025-0001
MAC addr: 000734004900
BMFPGA : Version 1
Board revision:
Board serial number: 3010232
Boot Dev: wd0a (cf1)
SSC
PROM_R9000 : prom-1.0.2 : Mon Jan 10 11:29:24 2005
FC0
PROM_R9000 : prom-1.0.2 : Mon Jan 10 11:29:24 2005
FCNIM : R1.3.0.0BCDBG-013106 : Tue Jan 31 14:59:54 2006
bobcat-pl> system show version
chassis
--------
Serial number: 0433010229
MAC addr: 000734004800
slot 0
-------
BMFPGA : Version 1
Board Revision: 1
Boot Dev: wd0a (cf1)
slot 0, SSC
----------------------
PROM_R9000 : prom-2.0.7 : Tue Nov 2 10:45:48 2004
slot 1
-------
LUC revision: 3.2.10
slot 1, TXRX0
----------------------
PROM_SIBYTE_BC : prom-2.0.7 : Thu Sep 23 15:25:47 2004
NFP_TXRX_BC : R1.2.1.0BCDBG-110204 : Tue Nov 2 13:39:09 2004
slot 1, TXRX1
----------------------
PROM_SIBYTE_BC : prom-2.0.7 : Thu Sep 23 15:25:47 2004
NFP_TXRX_BC : R1.2.1.0BCDBG-110204 : Tue Nov 2 13:39:09 2004
slot 1, FP0
----------------------
PROM_SIBYTE_BC : prom-2.0.7 : Thu Sep 23 15:25:47 2004
NFP_FP_BC : R1.2.1.0BCDBG-110204 : Tue Nov 2 13:34:52 2004
slot 1, FP1
----------------------
PROM_SIBYTE_BC : prom-2.0.7 : Thu Sep 23 15:25:47 2004
NFP_FP_BC : R1.2.1.0BCDBG-110204 : Tue Nov 2 13:34:52 2004
slot 2, FC0
----------------------
PROM_R9000 : prom-2.0.7 : Tue Nov 2 10:45:48 2004
FCNIM_BC : R1.2.1.0BCDBG-110204 : Tue Nov 2 13:39:42 2004
slot 2, FC1
----------------------
PROM_R9000 : prom-2.0.7 : Tue Nov 2 10:45:48 2004
FCNIM_BC : R1.2.1.0BCDBG-110204 : Tue Nov 2 13:39:42 2004
slot 2, FC2
----------------------
PROM_R9000 : prom-2.0.7 : Tue Nov 2 10:45:48 2004
FCNIM_BC : R1.2.1.0BCDBG-110204 : Tue Nov 2 13:39:42 2004
slot 2, FC3
----------------------
PROM_R9000 : prom-2.0.7 : Tue Nov 2 10:45:48 2004
FCNIM_BC : R1.2.1.0BCDBG-110204 : Tue Nov 2 13:39:42 2004
bobcat-pl>
This example shows the NAS Gateway’s hardware. The hardware is listed for each of
the functional areas of the NAS Gateway, for example, the SSC components, file
processing components, or storage processing components. For each type of
functionality, the software recognizes relevant hardware components, such as
controllers and field-programmable gate arrays (FPGAs), and lists them along with the
version of software or firmware running on the components. In addition to the
hardware components and the version of installed software, the date that the software
was created is displayed.
Related Commands
system version Shows the installed software version of the NAS
Gateway.
Synopsis
system time ntp disable
Description
The NAS Gateway has the ability to use network time protocol (NTP) servers or NTP
broadcast messages to maintain time synchronization. When the NAS Gateway has
been enabled to listen for NTP broadcasts, you can stop the NAS Gateway from
listening to the broadcasts by running the system time ntp disable command.
When you run this command, the NAS Gateway stops synchronizing with any NTP
servers, and maintains the latest synchronized time on its own through the realtime
clock chip.
Note!
If NTP was active on the NAS Gateway and you disable NTP, you need to
restart the NAS Gateway before it can begin resynchronizing with a specific
server or a broadcast time signal on TCP port 123.
Example
In this example, the NAS Gateway’s NTP software is disabled. After being disabled,
the NAS Gateway’s realtime clock chip continues to maintain time based on the last
time programmed into the clock chip. However, if you want to synchronize the NAS
Gateway with an NTP signal, you need to restart the NAS Gateway and run the
system time ntp server command to reorient the NAS Gateway to a specific time
server.
Related Commands
system time set Sets the current system time to the specified
time.
system time show Shows the current system time.
system time zone Controls the local system time zone.
Synopsis
system time ntp server {-a|-d} IPADDR
Description
The NAS Gateway has the ability to synchronize with a specific NTP server instead of
listening for time signals broadcast on TCP port 123. For example, if you have a time
server for a specific network, that time server can be the one listening for broadcasts,
and the NAS Gateways in the subnet can synchronize with that dedicated time server.
Use the system time ntp server command to create a list of NTP servers to which
the NAS Gateway listens explicitly. With this command you can add or delete one or
more servers from the list.
Options
Table 27-14 : Options for the system time ntp server command
Example
In the following example, an NTP sever is added to the NAS Gateway’s NTP servers
list.
In this example, the NTP time server 101.68.98.7 is added to the NAS Gateway’s NTP
servers list.
In the following example an NTP server is deleted from the NAS Gateway’s NTP
servers list.
In this example, the NTP time server 101.68.98.7 is deleted from the NAS Gateway’s
NTP servers list.
Related Commands
system time set Sets the current system time to the specified
time.
Synopsis
system time set [[[[[[cc]yy]mm]dd]HH]MM[.SS]]
Description
The NAS Gateway’s real time clock can support either of two sources: a manually
programmed time from the system administrator, or an automatically programmed
time from an NTP server. Use the system time set command to manually program
the time into the NAS Gateway.
Note!
To avoid discrepancies always run the system time set command on all
NAS Gateways in the cluster, and run this command before configuring the
NTP server.
Options
Table 27-15 : Option for the system time set command
Table 27-15 : Option for the system time set command (Continued)
• MM is a mandatory argument
for specifying two digits for the
current minutes, for example,
30 for the 30th minute of the
hour.
• .SS is an optional argument for
specifying two digits for the
current seconds, for
example,.45 for the 45th
second of the minute. Make
sure to separate minutes (MM)
and seconds (.SS) with a
period.
Example
In this example the date and time that is programmed into the realtime clock chip is
2004, 09/30, 18:35:45, or September 30th, 2002 at 6:35 and 45 seconds p.m.
Related Commands
system time show Shows the current system time.
system time zone Controls the local system time zone.
Synopsis
system time show [-v]
Description
The NAS Gateway’s realtime clock can support either of two sources: a manually
programmed time from the system administrator, or an automatically programmed
time from a NTP server. Use the system time show command to list the system time
that has been programmed into the NAS Gateway’s realtime clock chip. This
command supports both manually programmed time values and time values scanned
from synchronizing with an NTP server.
The NAS Gateway’s time is maintained in Greenwich mean time (GMT). You can use
the system time set command to program the NAS Gateway’s time in local time.
Note!
The NTP implementation in use on the NAS Gateway has been created by the
University of Delaware. For detailed information about NTP, consult the
University of Delaware’s iteration of NTP.
Options
-v is the option for setting optional verbose mode if the NAS
Gateway is receiving its time information from an NTP server.
Verbose mode shows the system time, and NTP server
information, such as stratum, and the amount of time lost as time
signals traverse servers and stratum. If the NAS Gateway has not
been configured with and NTP time source, do not specify -v.
Example
In the following example, the system time show command is run in standard mode
with time programmed into the realtime clock by the system administrator.
In this example, the system time show command shows the system time as tracked
by the realtime clock chip.
In the following example system time is displayed in verbose mode with time
information scanned from synchronizing with an NTP server.
If NTP is enabled, the verbose mode of the system time show command displays the
following information:
• The NAS Gateway’s date and time stamp.
• The status of NTP, including whether NTP is synchronized, the number of NTP-
defined protocol events, and the last event encountered.
• The version of NTP and when it was last updated. NAS Gateway system
information about the processor type, the operating system (OS) kernel, the
distance from the root time server, and the stratum on which the NAS Gateway
resides.
• NTP accuracy metrics determined by calculations such as signal delay, signal
dispersion, and the location of the reference clock.
• The calculated reference time value, the date and time stamp of that reference time
value, and the number of times the NAS Gateway has polled the time server.
• The clock value, date and time stamp on the clock, and the clock status metric.
• Time signal compensation metrics, such as the signal offset and frequency, and the
jitter and stability metrics.
The NAS Gateway’s NTP table shows the following information:
• The name of the remote clock
• The reference ID of the remote clock
Related Commands
system time set Sets the current system time to the specified
time.
system time zone Controls the local system time zone.
Synopsis
system time zone [-l] [TIMEZONE]
Description
You can program the NAS Gateway’s realtime clock automatically with time from a
NTP server. Because NTP uses GMT, the NAS Gateway uses the local time zone and
converts it to GMT. Use the system time zone command to pick one of 500 time
zones that the NAS Gateway prompts you with. Use the page up (u) or page down (d)
function to locate the correct time zone. As an alternative, you can search by typing a
forward slash (/), then the name of the time zone you want. You can also use the Enter
key to scroll line-by line through the display, or use the up or down arrows to scroll
line-by-line through the display in the corresponding direction. After selecting the
time zone, you can stop the page up or down function by typing q.
Options
Table 27-16 : Options for the system time zone command
Example
The following example shows the current time zone.
In this example a time zone has been set already for the NAS Gateway. Therefore,
when you run this command, the configured time zone is displayed.
The following example shows the list of supported time zones.
In this example, the NAS Gateway shows the list of supported time zones in
alphabetical order. Scroll through the list to find the time zone that you want, make a
note of it exactly as it appears in the list. To configure the NAS Gateway’s time zone,
type the time zone string exactly as it appears on the list. For illustrative purposes, this
example only shows the first part of the list.
In the following example, the NAS Gateway’s time zone is set.
In this example, the NAS Gateway’s time zone is set to the time zone for the US state
of Hawaii. Use the system time show command to display the local time of Hawaii.
Related Commands
system time set Sets the current system time to the specified
time.
system time show Shows the current system time.
System Traceroute
Synopsis
system traceroute {HOSTNAME | IPADDR}
Description
Use the system traceroute command to display the Internet route to another host or
gateway. The NAS Gateway supports trace route functions to destination IP addresses
or hosts or gateways.
Note!
For a host name to be resolved you need to have previously configured NIS or
DNS name resolution services in the network.
Options
HOSTNAME | IPADDR are the variables used to identify the device
whose route you want to trace. If you are tracing the rout to an IP
address, type the IP address in dotted decimal format. If you are
tracing the route to a host or gateway name, the name needs to be
a DNS or NIS resolvable name.
Example
In this example, the trace route is performed on an IP address. The results of the trace
route are shown:
• The number of allowable hops on the route
• The size of packets used
• The transmission delay on the route
Related Commands
int add Assigns an IP address to an interface.
int show Shows the interface table for the virtual server.
system ping Pings the specified host name or IP address.
System Upgrade
Synopsis
system upgrade [-f] [-s] {ftp://USER@IPADDR/PATHNAME | ftp://
USER:PASSWORD@IPADDR/PATHNAME}
Description
Use the system upgrade command to upgrade the NAS Gateway. You can upgrade
by downloading the archived upgrade file from an FTP server.
Downloads software from the specified location to one of the NAS Gateway's compact
flash modules. The password for the FTP user account can be optionally specified in
the command line. If not specified in the command line, the system prompts for the
password. PATHNAME is the name of an archive file to be downloaded from the FTP
server IPADDR. The NAS Gateway has two compact flash modules that can receive the
downloaded software. One of the compact flash modules is considered the active flash
and the other is considered the standby flash. The terms active and standby refer to
which flash module the NAS Gateway booted from last. It is important to understand
that the term active and standby are relative. If the NAS Gateway boots from a
different compact flash than it did the last time, there is a new active flash. By default,
software is downloaded to the active flash, but you can specify that the standby flash
receives the software.
Options
Table 27-17 : Options for the system upgrade command
Example
In the following example a NAS Gateway is upgraded through an FTP server.
In this example, the NAS Gateway is upgraded to the R1.2.1 version of the software.
In this example, the active compact flash module (the one that was most recently used
to start from) is upgraded. Because the upgrade is occurring through an FTP server
with the IP address 11.12.13.14, the user and password for logging on to the FTP
server are provided in the command. Because the R1.2.1 software doesn’t reside in the
root directory on the FTP server, the full path to software version R1.2.1 is specified in
the system upgrade command.
When the ftp server is located, a background process pulls the software to the active
compact flash on the SSC. When the upgrade is complete, the SSC begins an internal
TFTP process to load the start and runtime images. When the images are loaded, the
NAS Gateway restarts and resumes operation with newly upgraded runtime software
image.
In the following example a NAS Gateway is upgraded with the -s option.
In this example, the NAS Gateway is upgraded to the R1.2.1 version of the software.
In this example, the -s argument upgrades the standby compact flash module first (the
one that was not most recently used to start from). Because the upgrade is occurring
through an FTP server with the IP address 11.12.13.14, the user and password for
logging on to the FTP server are provided in the command. Because the R1.2.1
software doesn’t reside in the root directory on the FTP server, the full path to software
version R1.2.1 is specified in the system upgrade command.
Related Commands
system reboot Restarts the NAS Gateway from the specified
compact flash module.
System Version
Synopsis
system version [-s]
Description
Use the system version command to display a version string that identifies the system
software that currently installed on the NAS Gateway.
Options
-s is the option used to display the software version running on
the secondary compact flash module.
Example
Related Commands
system halt Halts the NAS Gateway.
system show chassis Show chassis information.
system show cifs Show cifs parallel commits.
system show coredump Show core dump information.
system show ipstat Show IP statistics.
system show nodename Show this node's name.
system show readahead Show data cache readahead status.
system show temperature Show the chassis temperature.
system show version Show the system version information.
Synopsis
tape alias clear ALIAS
Description
When a tape device alias is configured, you can remove it at any time by running the
tape alias clear command. When you run this command, the alias associated with
the tape device is removed, and you can manage the tape device through the device
name or the logical device.
Options
The ALIAS variable is the name of the alias that you are removing.
Example
eng43>
In this example, the alias tapedev11 is cleared from the media changer. When this
command completes, the tape device is addressable only by a device name, not the
alias.
Related Commands
tape alias set Sets the tape aliases.
tape alias show Shows the tape aliases.
tape devlist Lists all available tape devices.
Synopsis
tape alias set DEVNAME LOGICALNAME ALIAS [-f]
Description
You can assign an alias to a tape device to facilitate identification of the device. When
you assign an alias, you associate a text string with the tape device’s actual device
name. For example, you could create an alias called tapedrive22 to identify a single
tape drive instead of referring to it as QUANTUM_PMC01P3145_0. You can create an
alias for a tape device by running the tape alias set command.
Options
Table 28-1 : Options for the tape alias set command
Example
eng43>
In this example, the alias tapedev11 is set for the physical device
QUANTUM_PMC01P3145_0 and logical device NRNU1l. When this command
completes, the logical tape device is addressable by either logical device name or alias.
Related Commands
tape alias clear Clears the tape aliases.
tape alias show Shows the tape aliases.
tape devlist Lists all available tape devices.
Synopsis
tape alias show [DEVICE_NAME]
Description
Tape devices that have been given aliases are kept in the tape devices alias list. You
use the tape alias show command to display the list of tape aliases and logical
names for a physical device. DEVICE_NAME specifies the name of the device. This
command lists all user defined aliases for tape devices. An alias can be set for a logical
tape device. Once an alias is set, one can manipulate the tape using that alias. Alias is
useful since one can give a meaningful name to a tape device.
This list contains the following information for tape devices that have been aliased:
• The device name
• The alias that has been assigned
Options
The DEVICE_NAME variable identifies the specific tape device
whose logical name and alias name you want to display.
Example
Related Commands
tape alias clear Clears the tape aliases.
Tape Close
Synopsis
tape close DEVNAME [-f]
Description
Use the tape close command to manually set a tape to the closed state. You can
specify one tape device by name and close it to reading and writing. This command is
helpful if the tape device is stalled in a busy open state, which occurs when the tape
device is in open state with no activity and is not closed by the client. While a tape
device is open, it cannot be used by another device. So, by running the tape close
command, you can force a tape device to close if it is stalled in open state.
Options
Table 28-2 : Options for the tape close command
Example
In this example, the tape close command is run on the tape device
QUANTUM_PMC29Y0613. This command closes the tape device to management or
administration commands.
Related Commands
tape devlist Lists all available tape devices.
Synopsis
tape devlist [-v [DEVNAME]]
Description
When the NAS Gateway completes its storage area network (SAN) discovery, the tape
resources are virtualized and posted to a list. Use the tape devlist command to
view the tape devices list. The tape device list contains all discovered tape devices,
and provides operation and performance information about each device. The tape
devices are listed by their physical or logical device name. Tape devices contained in
the tape devices list are displayed regardless of their state. Therefore, if a tape device
is discovered and online, but has encountered an error condition that prevents it from
operating properly, the tape device still appears in the display.
Example
The following example shows all available tape devices in the SAN.
The following example shows the logical device information for each physical device
with an option to page down or stop. Each physical device can have up to 12 logical
device names.
ITY
NRNU1hc CLOSED N/A NO-REWIND/NO-UNLOAD/HIGH-
DENS
ITY/COMPRESSED
RNU1l CLOSED N/A REWIND/NO-UNLOAD/LOW-
DENSITY
RNU1lc CLOSED N/A REWIND/NO-UNLOAD/LOW-
DENSITY/
COMPRESSED
RNU1h CLOSED N/A REWIND/NO-UNLOAD/HIGH-
DENSITY
RNU1hc CLOSED N/A REWIND/NO-UNLOAD/HIGH-
DENSITY
/COMPRESSED
RU1l CLOSED N/A REWIND/UNLOAD/LOW-DENSITY
RU1lc CLOSED N/A REWIND/UNLOAD/LOW-DENSITY/
COM
PRESSED
RU1h CLOSED N/A REWIND/UNLOAD/HIGH-DENSITY
RU1hc CLOSED N/A REWIND/UNLOAD/HIGH-DENSITY/
CO
MPRESSED
---more---[q:Quit][Enter]
Related Commands
tape close Closes the specified tape device.
tape mc Lists all available media changer devices.
Synopsis
tape devstate DEVNAME
Description
The tape device state contains information about the tape device’s operational
parameters. If a tape device is open, you can query the tape device for its operational
parameters by running the tape devstate command.
The tape needs to be open for the tape devstate command to complete, otherwise,
the NAS Gateway shows an error message indicating that the device is not open.
Options
The DEVNAME variable is the unique name of the tape drive on
which you are checking state information. The DEVNAME string
can be a physical device name or a logical device name.
Example
This command shows the following information about a specific tape device:
• Flags, such as rewind state, unload state, or density.
• The current file number on which the tape head is located.
• The current block number on which the tape head is located.
• The tape device’s fixed block size, if the tape device is configured for fixed block
size. If the tape device is configured for variable block size, this field shows a zero
(0).
• The total space, in bytes, that the tape device supports.
• The amount of available space that remains on the tape device. If this value shows
INVALID, the NAS Gateway does not support calculating available space.
• A list of the soft errors on the tape device. If this value shows INVALID, the NAS
Gateway does not support soft error detection.
Related Commands
tape close Closes the specified tape device.
tape devlist Lists all available tape devices.
Synopsis
tape mc devlist
Description
You can display the Media Changers List that the NAS Gateway has discovered by
running the tape mc devlist command. The media changers are listed by their
physical or logical device name, and the media changers displayed are listed
regardless of their state. Therefore, if a media changer is discovered and online, but
has encountered an error condition that prevents it from operating properly, the
changer still appears in the display.
Example
This example shows the available media changers in the SAN. The media changer list
shows the following information:
• The physical device name for the tape
• The tape device’s vendor
• The tape device’s product or model number
• The tape device’s alias (if configured)
Related Commands
tape devlist Lists all available tape devices.
Synopsis
tape mc alias clear ALIAS
Description
When a media changer alias is configured, you can remove it at any time by running
the tape mc alias clear command. When you run this command, the alias
associated with the media changer is removed, and you can manage the media changer
through the device name or the logical device.
Options
The ALIAS variable is the name of the alias you are removing.
Example
eng43>
In this example, the alias mediachanger1 is cleared from the media changer. When this
command completes, the tape device is addressable only by a device name, not the
alias.
Related Commands
tape mc alias set Sets the alias for a media changer.
tape mc alias show Lists all user defined aliases for media changers.
Synopsis
tape mc alias set DEVNAME ALIAS [-f]
Description
You can assign media changers an alias to facilitate identification of the device. When
you assign an alias device, you associate a text string with the media changer’s actual
device name. For example, you could create an alias called mediachanger2 to identify
Options
Table 28-4 : Options for the tape mc alias set command
Example
eng43>
In this example, the alias mediachanger1 is set for the media changer ATL_PART_2_1.
When this command completes, the tape device is addressable by either device name
or alias.
Related Commands
tape mc alias clear Clears the specified media changer alias.
tape mc alias show Lists all user-defined aliases for media changers.
Synopsis
tape mc alias show
Description
Media changers that have been given aliases are kept in the media changers alias list.
You can display the media changers alias list by running the tape mc alias show
command.
This list contains the following information for media changers that have been aliased:
• The physical device name
• The alias that has been assigned
Example
Related Commands
tape mc alias clear Clears the specified media changer alias.
tape mc alias set Sets the alias for a media changer.
Tape Release
Synopsis
tape release DEVNAME
Description
Use the tape release command to release a reserved tape device.
Note!
Use this command with caution, because you could inadvertently release a tape
device that was reserved by someone else or another NAS Gateway.
Options
The DEVNAME variable is the name of the reserved tape device to
be released.
Example
Related Commands
tape close Closes the specified tape device.
Useraccount Add
Synopsis
useraccount add USERNAME [-k “PUBKEY”]
Description
You can add a local user account by running the useraccount add command. This
command creates a new user account on the ONStor™ NAS Gateway. As part of the
account creation, you are required to specify a password for the user account you are
configuring.
When you type the user name, the NAS Gateway prompts you for the user account's
password. The password for the user account is an alphanumeric character string from
6 to 63 characters. For security purposes, the password is not displayed when you
configure it with this command.
Local user accounts are a method for adding user name and password information to
the NAS Gateway for purposes such as the following:
• Creating logon accounts that are stored on the NAS Gateway.
• Creating a challenge string or constructing an MD5 has for NDMP client and
server authentication.
Note!
If you want to start the ONStor VirusScan applet from any user account, you
need to configure that user account with BACKUP and RESTORE privileges
because the VirusScan applet needs to access files in read/write mode in the
virtual server. The scope of the privilege can be either VIRTUAL SERVER or
CLUSTER. For details on how to set privileges, see “Privilege Commands” on
page 20-1.
Options
Table 29-1 : Options for the useraccount add command
Example
In this example, the local user account pubstest is added to the NAS Gateway. As part
of the account creation, the NAS Gateway prompts you for the accounts password.
The password is not displayed while it is being configured.
Related Commands
useraccount delete Deletes a local user account.
useraccount modify Modifies the password for specified user
account.
useraccount show Shows all configured user accounts.
Useraccount Delete
Synopsis
useraccount delete USERNAME
Description
You can remove a local user account at any time by running the useraccount delete
command. When the local user account is deleted, the following occurs:
• The owner of the local user account cannot log on to the NAS Gateway through
that user account.
• NDMP authentication between the client and server is no longer possible through
that local user account.
Options
The USERNAME variable is the name of the user account. The user
account name is an alphanumeric character string from 6 to 63
characters.
Example
In this example, the local user account pubstest and its password are deleted.
Related Commands
useraccount add Adds a new useraccount to the system.
useraccount modify Modifies the password for user account.
useraccount show Shows all configured user accounts.
Synopsis
useraccount modify USERNAME [-k “PUBKEY”]
Description
You can modify the password for the local user account at any time by running the
useraccount modify command. This command changes the password associated
with a local user account, but does not allow changing the account itself. Therefore, if
you want to change the user account, you need to delete and recreate the user account
and supply a new password.
When you run the useraccount modify command, the NAS Gateway prompts you to
type the new password for a specified user account. The new password for the user
account is an alphanumeric character string from 6 to 63 characters. The new
password is immediately active. For security reasons, the password is not displayed
when you type it.
Options
Table 29-2 : Options for the useraccount modify password command
Example
In this example, the local user account pubstest is given a new password. When the
new password is configured, it is available for immediate use.
Related Commands
useraccount add Adds a new user account to the system.
useraccount delete Deletes a local user account.
useraccount show Shows all configured user accounts.
Useraccount Show
Synopsis
useraccount show
Description
When a local user account is created, it is added to the local user account list. This list
contains all the currently defined local user accounts on the NAS Gateway. You can
display the configured local user accounts by running the useraccount show
command.
Example
This example shows the local user account table. The local user account table shows
all the configured user accounts on the current NAS Gateway.
Related Commands
useraccount add Adds a new user account to the system.
useraccount delete Deletes a local user account.
useraccount modify Modifies the password for specified user
account.
Synopsis
vsvr clear
Description
You can exit a specific virtual server by clearing its context. To do so, run the vsvr
clear command. This command does not delete a virtual server or release any
resources configured within a virtual server. Instead, when you run this command, you
return to the ONStor™ NAS Gateway context.
Example
In this example, the context for virtual server pubstest3 is cleared. When the virtual
server context is cleared, you return to the NAS Gateway context.
Related Commands
vsvr set Sets the current virtual server for all future
commands.
Synopsis
vsvr clear autocreate
Description
At any time, you can delete the autocreate facility by running the vsvr clear
autocreate command. Users no longer have a share to their home directory
automatically available when they log on. After deleting the autocreate facility, all
users need to manually navigate the file system to their home directories through the
virtual server.
Note!
To delete the autocreate facility, the virtual server needs to be in the disabled
state.
Example
In this example, the autocreate facility is deleted from the virtual server pubstest3.
When the vsvr clear autocreate command completes, the home share directories
are not exported automatically to logged in users. However, users can still connect to
shares explicitly.
Related Commands
vsvr set Sets the current virtual server for all future
commands
vsvr disable Disables the current virtual server
Synopsis
vsvr clear domain ldap|nis|windows [DOMAINNAME]
Description
You can remove a domain from a virtual server by running the vsvr clear domain
command. This command removes the association of a domain and a virtual server as
long as the virtual server is in the disabled state. You can put the virtual server into
disabled state by running the vsvr disable command. When you delete the
association of a domain and a virtual server, the virtual server still exists, but it can no
longer use the domain’s services.
Options
Table 30-1 : Options for the vsvr clear domain command
Example
In the following example, the LDAP domain domain1 is deleted from pubstest3.
In the following example, the NIS domain spectrum is deleted from the virtual server
pubstest3
Related Commands
vsvr set Sets the current virtual server for all future
commands.
Synopsis
vsvr set unprotected
Description
This command clears the protected state for the current virtual server. A virtual server
that is not protected does not failover to another NAS Gateway in case of a failure. The
management virtual server does not support failover, therefore you cannot run this
command on the management virtual server.
Example
In this example, the protected state for virtual server pubstest3 is cleared.
Related Commands
vsvr set Sets the current virtual server for all future
commands.
Synopsis
vsvr clear wins
Description
You can delete the Windows Internet naming service (WINS) server address from a
domain at any time by running the vsvr clear wins command. Use this command to
delete the IP address of the primary and secondary WINS server, if your network is
configured with redundant WINS servers. When you delete the WINS server, the
name to IP address resolution does not occur for the virtual server.
You can delete the WINS server IP addresses from a virtual server only if the virtual
server is in the disabled state. You can put the virtual server into disabled state by
running the vsvr disable command.
Example
In this example, the WINS servers for virtual server pubstest3 are deleted.
Related Commands
vsvr set Sets the current virtual server for all future
commands.
vsvr disable Disables the current virtual server.
Synopsis
vsvr create VIRTUALSERVER [-n NODE] [-u]
Description
Use the vsvr create command to create a virtual server on the NAS Gateway. By
default, the vsvr create command creates the virtual server on the current NAS
Gateway, but you can use the -n NODE argument to specify another NAS Gateway in
the cluster as the target of the vsvr create command. When you run this command,
the NAS Gateway is added in its default state of disabled.
Options
Table 30-2 : Options for the vsvr create command
Example
In the following example a virtual server is created.
In this example, the virtual server pubstest3 is created. The command prompt contains
only the NAS Gateway’s node name when you run this command to indicate that you
are in the NAS Gateway context when you run the vsvr create command. While you
are in the NAS Gateway context, all commands you run apply to the NAS Gateway.
However, at the completion of the vsvr create command, you are in the context of
the virtual server that you just created, in this example pubstest3. The command
prompt changes to indicate that you are now in the context of pubstest3. When you are
in the context of a virtual server, all subsequent virtual server commands apply to that
virtual server.
In the following example a virtual server is created on a different NAS Gateway.
In this example the command vsvr create is run from the eng31 NAS Gateway to
create the virtual server pubstest3 on the MadMax NAS Gateway.
In the following example a virtual server is created in unprotected mode.
Related Commands
interface create Assigns an IP address to a physical interface.
route add default Adds a default static route.
route add net Adds a network static route.
volume create Creates a new volume in the current virtual
server.
Synopsis
vsvr delete [VIRTUALSERVER]
Description
At any time, you can delete a virtual server by running the vsvr delete command. It
will fail if the virtual server still owns some volumes. You have to delete the volumes
first before deleting the virtual server. When you run this command, the NAS Gateway
automatically removes IP interfaces that are assigned to the virtual server although
you can also delete these resources individually through their corresponding
commands. When a virtual server has been deleted, domain bindings are removed, and
export interfaces no longer exist, so client connectivity to the virtual server no longer
exists.
The vsvr delete command deletes the virtual server configuration and removes it
from memory and all databases. This command is different than the vsvr disable
command, which keeps the virtual server configuration, but deactivates it. Because the
vsvr delete command deletes the virtual server configuration, it is the last step in
deleting the virtual server.
After you delete a virtual server, you automatically revert to the NAS Gateway
context, and the resources that were associated with the deleted virtual server are now
available for assignment to another virtual server.
Note!
The vsvr delete command is available through the NAS Gateway context and a
virtual server context. The context you are in when you run this command
affects whether you need to specify an argument in one of the following ways.
• If you run the vsvr delete command through the NAS Gateway context,
you need to specify the virtual server to delete.
• If you run the vsvr delete command from the context of a specific virtual
server, you do not need to specify the virtual server name. The virtual
server that has the current context is deleted.
When you run the vsvr delete command, the NAS Gateway prompts you for
confirmation with the following prompt:
Are you sure? [y|n]
Type Y to confirm the deletion, or type N to cancel the deletion of the virtual server. If
you accept the deletion, the virtual server is removed from the configuration and
deleted from runtime.
Note!
The NAS Gateway requires at least one virtual server for processing client I/O.
Do not delete the only virtual server in a cluster, otherwise, you will isolate
clients from storage area network (SAN) resources.
Options
The VIRTUALSERVER variable is an alphanumeric character string
of up to 15 characters.
Example
In this example, the virtual server pubstest3 is deleted. When the virtual server is
deleted, you return to the NAS Gateway context.
Related Commands
volume delete Deletes the volume
volume show Shows one or more volumes.
vsvr enable Enables the current virtual server.
vsvr set Sets the virtual server for all future commands.
vsvr show Shows one or more virtual servers.
Synopsis
vsvr disable
Description
When a virtual server is in the disabled state, it has no runtime resources allocated to
support IP interfaces or shares, and it is not active in runtime. Resources are still
configured in the virtual server, but the resources are not active in runtime. Therefore,
the virtual server does not process client input, participate in a domain, or support load
balancing functionality. The virtual server is disabled by default, but you can enable it
with the vsvr enable command.
You can disable virtual servers by running the vsvr disable command. When you
disable a virtual server, any runtime resources used by IP is deleted, and the NAS
Gateway refuses any new clients or requests. Running the vsvr disable command
changes the virtual server’s state in runtime, but it does not delete any configuration.
Disabling a virtual server is required before you can do the following:
• Adding the virtual server to a domain, through the vsvr set domain command,
which can only be done when the virtual server is disabled. As an alternative to
disabling the server to set the domain, you can leave the virtual server in its default
state of disabled when you are initially configuring the virtual server. After all the
virtual server’s parameters are configured, including the domain, you can run the
vsvr enable command to activate the virtual server.
• Changing the configuration of a previously enabled virtual server. You can change
the configuration of a virtual server that has previously been enabled only by
disabling the virtual server, then making the required configuration changes, then
reenabling the virtual server.
You can disable a virtual server by running the vsvr disable command. However, at
least one virtual server needs to remain enabled in each cluster to support client file
access. Do not disable the last virtual server unless you want to halt file access through
the NAS Gateway.
Example
In this example, the virtual server pubstest3 is disabled. Disabling a virtual server
discontinues IP connectivity and file services to the clients. The disable function
prompts you for confirmation before disabling the virtual server.
Related Commands
vsvr set Sets the virtual server for all future commands.
vsvr show Shows one or more virtual servers.
Synopsis
vsvr enable
Description
When you have created a virtual server with the vsvr create command, the virtual
server is in disabled state by default.
To enable a virtual server, it is not required that the virtual server have any configured
resources, for example, IP interfaces, volumes, or shares. Therefore, you can create the
virtual server, and immediately run the vsvr enable command to enable it in
runtime. When the virtual server is active in runtime, you can switch to the virtual
server by running the vsvr set command and continue configuring volumes and
shares. However, to configure most of the virtual server parameters within the context
of that virtual server, the virtual server needs to be in the disabled state.
You can configure some virtual server parameters regardless of whether the virtual
server disabled or enabled. However, the virtual server needs to be enabled for it to
operate.
The vsvr enable command does not write parameters into the configuration because
the NAS Gateway adds parameters to the configuration as soon as they are configured.
Instead, this command makes the virtual server available in runtime by setting up
internal sockets and bind points for IP interfaces, and activating the virtual server so
that you can configure and use shares.
You can activate the virtual server by running the vsvr enable command. Any new
or changed virtual server parameters become active when you run this command.
Example
In this example, the virtual server pubstest3 is enabled. The enable function only
brings the virtual server online in runtime. Enable has no relation to whether a virtual
server has been correctly configured. Therefore, a virtual server can be incorrectly
configured but still enabled.
Related Commands
vsvr set Sets the virtual server for all future commands.
vsvr show Shows one or more virtual servers.
Synopsis
vsvr move [-f DSTNASGATEWAY | -g DSTGROUP]
Description
In certain circumstances, you might need to move a virtual server to a different single
NAS Gateway or NAS Gateway group. For example, if you are upgrading an NAS
Gateway in a multinode cluster, you can switch the virtual servers from one NAS
Gateway to another NAS Gateway, or another NAS Gateway group in the cluster,
while you are performing the upgrade on an NAS Gateway. You can move a virtual
server by running the vsvr move command. This command causes a graceful failover
of the virtual server to a different NAS Gateway. When the vsvr move command
completes, the virtual server configuration, the IP interfaces, volumes, and shares
configured on the virtual server are retained and relocated to a NAS Gateway or NAS
Gateway group that you name. After the move completes, the virtual server is in
disabled state.
Note!
Unprotected servers do not automatically fail over in case of a failure. Use the
vsvr move command to explicitly move them.
Moving a virtual server is beneficial for several usages:
• Load Balancing.
• If a hot swap procedure is required on the NAS Gateway.
• If an event causes a protected mode virtual server to switch to a NAS Gateway, and
you want to switch the virtual server back to its original NAS Gateway after the
event has been remedied.
Note!
When moving virtual servers, make sure that the IP subnets for the virtual
servers you are moving are accessible from the destination NAS Gateway. The
destination gateway, or one of the gateways within the destination group also
needs to have the same lport names as the ones used by the interfaces of the
virtual server, since lport configuration is local to each Gateway.
Options
Table 30-3 : Options for the vsvr move command
Example
In this example, virtual server pubstest3 is moved to the NAS Gateway pubstest1 of
the NAS Gateway group MadMax.
Related Commands
cluster show group Shows cluster group configuration.
Synopsis
vsvr set autocreate VOLNAME PATHNAME
Description
Each virtual server can contain an autocreate volume, which supports home directories
for users. The autocreate volume feature has been implemented for use by common
Internet file services (CIFS) clients only. You can configure the autocreate volume
through the vsvr set autocreate command. With this command you can configure
the volume and path to users’ home directories.
When the autocreate volume and path are created, they are listed as part of the virtual
server’s configuration. When the virtual server is enabled, the volume and path are
exported along with any specific shares that are configured in the virtual server. If you
are using the autocreate feature, you do not need to configure individual shares for
each user. Instead, you can specify the autocreate volume and path only once. The
NAS Gateway then creates the share to each user’s home directory.
Part of the vsvr set autocreate command is a path. For a share with the user’s
name to appear in the shares list, a directory with the same name has to exist in the
path. For example, assume the path is \users\local\homes on the volume pubstest. For
a share called paulw pointing to that directory to appear in the shares list, the directory
\users\local\homes\paulw needs to exist on the volume pubstest. If the directory has a
different name than the path you specify, the share named for the user is not listed in
the shares list. For example, if the actual directory in the network is
\users\local\homes\paulw and the path specified in the vsvr set autocreate
command is specified as \user\local\homes, the homes directory share for paulw is not
displayed in the shares list because of the difference in the word “users.”
Consider the following when using the autocreate volume feature:
• You can run vsvr set autocreate only when the virtual server is in the disabled
state.
• The volume you specify as the autocreate volume needs to be read-writable.
• The volume containing home directories need to exist.
• The path to the home directories needs to exist in the file system on the home
directories volume.
• Have a home directory for each user.
• The user’s home directory name needs to be the same as the user’s windows logon.
• If a user logs in with a different name, the user can directly connect to the home
directories of other users. For example, user paulw can connect to the home
directory of johndoe even though this share is not listed by default for paulw. After
a user has connected to another user’s home directory share, this share is listed in
the connected user’s shares list as long as the user remains connected to that share.
For example, paulw will see a share johndoe while listing the shares in the same
virtual server, but only for as long as paulw is connected to the johndoe share.
Options
Table 30-4 : Options for the vsvr set autocreate command
Example
In this example, the autocreate volume and path are specified for the virtual server
pubstest. When users log on to this virtual server, their home share directories are
automatically exported to them. All other shares are available to users if the shares are
configured to export to them, and if the users have the proper share level privileges.
Related Commands
volume show Shows one or more volumes.
vsvr disable Disables the current virtual server.
vsvr set Sets the virtual server for all future commands.
Synopsis
vsvr set VIRTUALSERVER
Description
Each NAS Gateway can contain more than one virtual server. By running the vsvr
set command, you can switch the context of a virtual server. From within that context
you can configure the virtual server’s resources.
Note!
This command is cluster aware, so when you run it you can change context to
any virtual server in the cluster regardless of NAS Gateway on which it resides.
To switch a server’s context, the virtual server needs to exist. You can switch between
virtual servers regardless of a virtual server’s state as long as the virtual server exists.
Each time you switch the context of a virtual server, the NAS Gateway posts a
confirmation message to the command line. In addition, you can tell the vsvr set
command has completed by looking at the command prompt after you run the
command:
• If the command completes on an existing virtual server, the command prompt
contains the name of the new virtual server, and you are in the context of the new
virtual server.
• If the command does not complete, the command prompt shows the name of the
same virtual server that you were in before running the command. You are in the
context of the same virtual server because you have not changed.
Note!
Even though virtual server names are displayed in uppercase, they are case
insensitive when entered at the command prompt. Therefore, you can specify a
virtual server name in uppercase or lowercase when you run any of the vsvr
commands.
Options
The VIRTUALSERVER variable is an alphanumeric character string
of up to 15 characters.
Example
In this example, the virtual server pubstest3 is switched to the context of the virtual
server vs1-production. When the vsvr set command completes, the command
prompt changes to indicate the new virtual server to which you have changed. When
you are in the new virtual server’s context, all subsequent commands apply to that
virtual server.
Related Commands
vsvr clear Clears the virtual server for all future
commands.
Synopsis
vsvr set domain ldap|nis|windows DOMAINNAME [ADMINUSER] [-o
ORGUNIT]
Description
For a virtual server to participate in services provided by a domain, you need to
associate the virtual server with the domain. For example, to enable authentication of
users, you can configure the domain servers for each virtual server. The incoming NFS
clients would be authenticated by LDAP or NIS domains and the CIFS clients would
be authenticated by the Windows domain. You can associate the following types of
domains with a virtual server:
• LDAP domain
• Windows domain (DNS)
• UNIX domain (NIS)
Note!
To support name authentication services, the domains need to exist on the NAS
Gateway. You can add domains with the domain add command. The domain
add command does not require a specific virtual server context, so you can run
the domain add commands from the NAS Gateway context.
You can add a virtual server to a domain only if the virtual server is in the disabled
state. You can put the virtual server into disabled state by running the vsvr disable
command.
Note!
• With this command, you need to also specify a password for the windows
domains. This is the password of the ADMINUSER that you specified.
With the Windows domain passwords, the software imposes a minimum
length of six characters. Make sure that you specify a password of six
characters or more when entering a password on EverON™ software.
Options
Table 30-5 : Options for the vsvr set domain command
Example
In the following example, the virtual server pubstest3 is configured with the LDAP
domain domain1.
In the following example, the virtual server pubstest3 is configured with the NIS
domain spectrum.
In the following example, the virtual server pubstest3 is configured in the Windows
domain chromatis. Because the virtual server is added to a Windows domain, the
command also contains a valid Windows administrator name to allow the virtual
server to join the domain..
In the following example, the organizational unit is muddy and the domain is
smallpond.lab.
Related Commands
domain show windows Shows the list of windows domains configured.
vsvr disable Disables the current virtual server.
vsvr set Sets the virtual server for all future commands.
Synopsis
vsvr set name generic NAME
Description
You can rename an existing virtual server, with the vsvr set name generic command.
Use this command to change name of an existing virtual server. Changing the generic
name of a virtual server will not change its NetBIOS name. The virtual server ID does
not change when you change the virtual server name. Consider the following when
using the virtual server set name generic command:
• The command works only in the context of the virtual server whose name you
want to change.
• You need to disable the virtual server who’s name you want to change. Use the
vsvr disable and vsvr enable commands to disable, then reenable, the virtual
server.
• You cannot rename the management virtual server.
• The new name for the virtual server has the same restrictions as the original name
you used when you created the virtual server with the vsvr create command.
Restrictions are as follows:
- The new virtual server name needs to start with an alphanumeric
character, or with a dash ( - ) or an underscore ( _ ).
- The new virtual server name can have up to 15 characters.
- The new virtual server name cannot use a name starting with
“VS_MGMT”, which is reserved for the management virtual server.
- The new virtual server name cannot be the reserved word “all”.
Note!
Virtual server names are case insensitive, so the name “vs1” is the same as the
name “VS1”.
Options
The NAME variable is the new name you are giving to the virtual
server.
Example
In this example, assuming the virtual server SALES is disabled, the virtual server name
is changed from SALES to CHANNELSALES. After the name change is complete,
reenable to bring the virtual server back online.
Related Commands
vsvr disable Disables the current virtual server.
vsvr set Sets the context of the current virtual server.
vsvr enable Enables the virtual server.
Synopsis
vsvr set name netbios NAME
Description
The vsvr set name netbios NAME command sets the NetBIOS name used by
CIFS on a specified virtual server. By default, the NetBIOS name is the same as the
virtual server name, as long as it does not exceed 15 bytes. This command overrides
that rule. The virtual server must be disabled before you can run this command.
Options
The NAME variable is the NetBIOS name you are giving to the
Example
Related Commands
vsvr disable Disables the current virtual server.
vsvr set Sets the context of the current virtual server.
vsvr name generic Changes the name of the virtual server.
Synopsis
vsvr set protected
Description
This command sets the protected state for the current virtual server. A virtual server
that is protected fails over to another NAS Gateway in case of a failure.
Example
In this example, virtual server pubstest3 is set to protected state. Therefore, if a failure
occurs on NAS Gateway eng31, the virtual server can fail over to another NAS
Gateway.
Related Commands
vsvr set Sets the virtual server for all future commands.
Synopsis
vsvr set wins PRIMARYIPADDR [SECONDARYIPADDR]
Description
Each CIFS network can contain one or more WINS server. The WINS server functions
as a name server that governs the translation of NETBIOS or domain names to IP
addresses.
Each virtual server needs to be active in a domain. If the NAS Gateway cannot locate a
domain, the NAS Gateway queries the WINS server at the specified IP address. The
WINS server, in turn, locates the domain and reports the IP address of the domain’s
domain controller to the NAS Gateway. With the vsvr set wins command, you can
specify the IP address of the WINS server that a virtual server should use. Some
networks operate with redundant WINS servers, so as an option, you can specify the
primary and secondary WINS server’s IP addresses with the vsvr set wins
command.
You can specify the WINS server addresses for a virtual server only if the virtual
server is in the disabled state. You can put the virtual server into disabled state by
running the vsvr disable command.
Note!
This command is required if the WINS server is on a different subnet than the
virtual server. The WINS server can be integrated into the Windows domain
controller. If that is the case, you can use the domain controller’s IP address. If
the WINS server is configured on a different server than the domain controller,
type the IP address of the standalone WINS server.
Options
Table 30-6 : Options for the vsvr set wins command
Example
In this example, the virtual server pubstest3 is configured with the primary WINS
server 33.44.55.66, and the secondary WINS server at 33.44.128.11.
Related Commands
vsvr disable Disables the current virtual server.
vsvr set Sets the virtual server for all future commands.
Synopsis
vsvr show ([VIRTUALSERVER] [-v] | all ([-n NODE] | [-v])))
Description
When you run the vsvr create command, a virtual server is created and added to the
cluster database. At any time, you can view the state of a virtual server by running the
vsvr show command. This command shows all virtual servers by their virtual server
ID, and it shows the runtime state of the virtual server. If the state is enabled, the
virtual server can provide IP connectivity and file system mount points to clients. If
the state is disabled, the virtual server has no IP connectivity and mount points are not
exported. You can enable a disabled virtual server with the vsvr enable command.
In addition to listing all virtual servers, the vsvr show command retrieves different
types of information about a configured virtual server. At any time, you can filter the
output of the vsvr show command in the following ways:
• Use the vsvr show command with the keyword all to display the information
about all virtual servers in the cluster. You can specify this option from any NAS
Gateway in the cluster.
• You display the information about a specific virtual server by running the vsvr
show command and specifying the virtual server name. you can This option shows
detailed information about the specified virtual server, such as the following:
- The server’s ID number, and its mode as a protected server if that mode
is configured.
- The Windows or NIS domain in which the server is registered.
- The server’s mode
Options
Table 30-7 : Options for the vsvr show command
Note!
If you do not enter either of these optional arguments, the virtual server
show command shows all virtual servers configured on the current NAS
Gateway.
Example
The following example lists all virtual servers on the current the NAS Gateway.
ID State Name
=================================
1 Enabled VS1-PRODUCTION
2 Disabled PUBSTEST2
3 Enabled PUBSTEST3
eng31 PUBSTEST3>
Synopsis
vsvr stats [all | agg] [-i SECONDS] [-C. COUNT]
Description
Use the vsvr stats command to display virtual server statistics. You can configure
this command to show a scrolling display of performance statistics at regular intervals
for either all virtual servers on a NAS Gateway or for a particular virtual server. To
stop scrolling of the display, type Ctrl+Z. The vsvr stats command provides
statistics on two types of operations: speed and throughput. Speed is measured in the
number of operations per second, and throughput is measured in bytes, kilobytes, or
megabytes per second. Speed operations on which the vsvr stats command
provides statistics include the following:
• NFS request operations received from clients
• NFS responses successfully sent to clients
• CIFS requests received from clients
• CIFS responses successfully sent to clients
Throughput operations on which the vsvr stat command provides statistics include
the following:
• Number of NFS bytes, kilobytes, or megabytes per second received from clients
• Number of NFS bytes, kilobytes, or megabytes per second sent to clients
• Number of CIFS bytes, kilobytes, or megabytes per second received from clients
• Number of CIFS bytes, kilobytes, or megabytes per second sent to clients
Options
Table 30-8 : Options for the vsvr stats command
Example
eng40 VS_ENG40_1> vsvr stats all -i 6
------------------------------------------------------------------------------------------------
--
| ENG49-2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| ENG49-7 | 0 | 26209 | 0 | 26209 | 0 | 1.55M | 0 | 1.65M |
| ENG49-5 | 0 | 794 | 0 | 791 | 0 | 6.93M | 0 | 10.10M |
| ENG49-ONSTORL | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| ENG49HELIX | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| ENG49-6 | 143 | 0 | 143 | 0 | 23.00K | 0 | 23.86K | 0 |
| ENG49-4 | 2649 | 0 | 2648 | 0 | 654.11K | 0 | 1.11M | 0 |
| VS-NGM-TEST | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| VS-ERIK1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| VS_MGMT_379 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
------------------------------------------------------------------------------------------------
In this example, statistics for all enabled virtual servers on a NAS Gateway are
displayed consecutively every 6 seconds.
Synopsis
vscan disable incoming PROTOCOL [,PROTOCOL]
Description
For each virtual server, you can configure the ONStor™ NAS Gateway’s virus-
scanning capability to scan incoming traffic, outgoing traffic, or both. To disable virus
scanning on a virtual server for incoming traffic, run the vscan disable incoming
command. You need to be in a virtual server context to use this command. The NAS
Gateway presents a yes/no confirmation prompt that you need to respond to by typing
either Y or N before the NAS Gateway acts on this command.
Options
The PROTOCOL[,PROTOCOL] variable has a value of either
Common Internet File System (CIFS) or Network File System
(NFS). You can specify one or both protocols. If you specify both
protocols, separate them with a comma. For example, cifs,nfs.
Example
In this example, the incoming CIFS and the incoming NFS have been disabled. You
can verify this new configuration by running the vscan server show command,
which shows the virus-scanning status of the CIFS and NFS.
Related Commands
vscan disable outgoing Disables virus scanning on outgoing CIFS or
NFS reads.
Synopsis
vscan disable outgoing PROTOCOL [,PROTOCOL]
Description
For each virtual server, you can configure the NAS Gateway’s virus-scanning
capability to scan incoming traffic, outgoing traffic, or both. To disable virus scanning
on a virtual server for outgoing traffic, run the vscan disable outgoing command.
You need to be in a virtual server context to use this command. The NAS Gateway
presents a yes/no confirmation prompt that you need to respond to by typing either Y
or N before the NAS Gateway acts on this command.
Options
The PROTOCOL[,PROTOCOL] variable has a value of either
Common Internet File System (CIFS) or Network File System
(NFS). You can specify one or both protocols. If you specify both
protocols, separate them with a comma. For example, cifs,nfs.
Example
In this example, the outgoing CIFS has been disabled. You can verify this new
configuration by running the vscan server show command, which shows the virus-
scanning status of the CIFS and NFS.
Related Commands
vscan disable incoming Disables virus scanning on incoming CIFS or
NFS writes.
vscan enable incoming Enables virus scanning on incoming CIFS or
NFS writes.
vscan enable outgoing Enables virus scanning on outgoing CIFS or
NFS reads.
vscan extension add Adds the specified extension to the set to be
scanned.
vscan log show Shows locally stored virus scan log messages.
vscan server add Adds a virus scan server for the virtual server.
Synopsis
vscan enable incoming PROTOCOL [,PROTOCOL]
Description
For each virtual server, you can configure the NAS Gateway’s virus-scanning
capability to scan incoming traffic, outgoing traffic, or both. To enable virus scanning
on a virtual server for incoming traffic, run the vscan enable incoming command.
You need to be in a virtual-server context to use this command. You need to have
already added one or more scan servers to the virtual server. The NAS Gateway
presents a yes/no confirmation prompt that you need to respond to by typing either Y
or N before the NAS Gateway acts on this command.
Options
The PROTOCOL[,PROTOCOL] variable has a value of either
Common Internet File System (CIFS) or Network File System
(NFS). You can specify one or both protocols. If you specify both
protocols, separate them with a comma. For example, cifs,nfs.
Example
In this example, the incoming CIFS and the incoming NFS have been enabled. You
can verify this new configuration by running the vscan server show command,
which shows the virus-scanning status of the CIFS and NFS.
Related Commands
vscan disable outgoing Disables virus scanning on outgoing CIFS or
NFS reads.
vscan disable incoming Disables virus scanning on incoming CIFS or
NFS writes.
vscan enable outgoing Enables virus scanning on outgoing CIFS or
NFS reads.
vscan extension add Adds the specified extension to the set to be
scanned.
vscan log show Shows locally stored virus scan log messages.
vscan server add Adds a virus scan server for the virtual server.
Synopsis
vscan enable outgoing PROTOCOL [,PROTOCOL] [-scanfailureok]
Description
For each virtual server, you can configure the NAS Gateway’s virus-scanning
capability to scan incoming traffic, outgoing traffic, or both. To enable virus scanning
on a virtual server for outgoing traffic, run the vscan enable outgoing command.
You need to be in a virtual server context to use this command. One or more scan
servers need to have been added to the virtual server. The optional parameter
-scanFailureOK indicates that if a virus scan cannot be completed, the traffic is
allowed to proceed; the default is that it fails. If a virus is detected and cannot be
cleaned, the file is deleted when possible. There is no quarantine facility.
Options
Table 31-1 : Options for the vscan enable outgoing command
Example
In this example, the outgoing CIFS has been enabled. You can verify this new
configuration by running the vscan server show command, which shows the virus-
scanning status of the CIFS and NFS.
Related Commands
vscan disable incoming Disables virus scanning on incoming CIFS or
NFS writes.
vscan disable outgoing Disables virus scanning on outgoing CIFS or
NFS reads.
vscan enable incoming Enables virus scanning on incoming CIFS or
NFS writes.
Synopsis
vscan extension add EXTENSION [,EXTENSION]
Description
For each virtual server, you can configure the NAS Gateway’s virus-scanning
capability to scan incoming traffic, outgoing traffic, or both. Although the default list
of extensions that you can use to scan for known viruses is extensive, new malicious
code in the form of worms and viruses may use different file extensions. You may
need to add these new extensions to your NAS Gateway virus-scan configuration
extension list to enable screening for these new threats.
To add file extensions for the NAS Gateway to scan, run the vscan extension add
command. You need to be in a virtual server context to use this command. To use the
default list of extensions searched by the ONStor™ VirusScan applet, you do not need
to use this command. The following list shows the default extensions scanned by the
NAS Gateway’s virus-scan feature.
Options
EXTENSION [,EXTENSION] are variables which are alphanumeric
character strings of up to 4 characters. The string can also include
a period (.) that matches any single character. Case is ignored.
Chose an extension from the list of defaults, or, if you have a
specific extension not mentioned in the following list, specify it
in this command with this string.
You can add multiple extensions by separating them with
commas.
Example
In this example, the extensions IRS, KFC, and EXE have been added to be filtered and
scanned by the virus-scanning feature on the virtual server VSTEST-ENG6 on NAS
Gateway eng6.
Related Commands
vscan enable incoming Enables virus scanning on incoming CIFS or
NFS writes.
vscan enable outgoing Enables virus scanning on outgoing CIFS or
NFS reads.
Synopsis
vscan extension delete EXTENSION [,EXTENSION]
Description
For each virtual server, you can configure the NAS Gateway’s virus-scanning
capability to scan incoming traffic, outgoing traffic, or both. When you configure virus
scanning, a default list of extensions is provided. You can delete any of the default
extensions listed in the following list or any custom extensions, by running the vscan
extension delete command. You need to be in a virtual server context to use this
command. The following list shows the default extensions scanned by the NAS
Gateway’s virus-scan feature.
Options
EXTENSION [,EXTENSION] are variables which are alphanumeric
character strings of up to 4 characters. The string can also include
a period (.) that matches any single character. Case is ignored.
Chose an extension from the list of defaults, or, if you have a
specific extension not mentioned in the following list, specify it
in this command with this string.
You can add multiple extensions by separating them with
commas.
Example
In this example, the extensions IRS and KFC have been deleted from the list that the
virus-scanning feature scans for viruses on virtual server VSTEST-ENG6 on NAS
Gateway eng6.
Related Commands
vscan disable incoming Disables virus scanning on incoming CIFS or
NFS writes.
vscan disable outgoing Disables virus scanning on outgoing CIFS or
NFS reads.
Synopsis
vscan extension reset
Description
Use the vscan extension reset command to reset a customized list of extension to
the system default. The following list shows the file extensions that are supported by
default.
Example
Related Commands
vscan enable incoming Enables virus scanning on incoming CIFS or
NFS writes.
vscan enable outgoing Enables virus scanning on outgoing CIFS or
NFS reads.
vscan extension delete Deletes a specified extension from the list of
virus scan extensions.
vscan extension set Sets a specified extension to the list of virus scan
extensions.
vscan extension show Shows a list of existing virus scan extensions.
vscan log show Shows locally stored virus scan log messages.
vscan server add Adds a virus scan server for the virtual
Synopsis
vscan extension set EXTENSION [,EXTENSION]
Description
For each virtual server, you can configure the NAS Gateway’s virus-scanning
capability to scan incoming traffic, outgoing traffic, or both. As part of this feature, the
NAS Gateway supports a number of default file extensions to be scanned. The
following list shows the file extensions that are supported by default.
You can replace the list of extensions with a new one. To replace the list of extensions,
run the vscan extension set command. You need to be in a virtual-server context to
use this command.
Options
EXTENSION [,EXTENSION] are variables which are alphanumeric
character strings of up to 4 characters. The string can also include
a period (.) that matches any single character. Case is ignored.
Chose an extension from the list of defaults, or, if you have a
specific extension not mentioned in the following list, specify it
in this command with this string.
You can add multiple extensions by separating them with
commas.
Example
In this example, the extensions IRS, KFC, PBS, and MTV have been configured to be
the list that the NAS Gateway supports for virus scanning.
Related Commands
vscan enable incoming Enables virus scanning on incoming CIFS or
NFS writes.
vscan enable outgoing Enables virus scanning on outgoing CIFS or
NFS reads.
vscan extension delete Deletes a specified extension from the list of
virus scan extensions.
vscan extension add Adds a specified extension to the list of virus
scan extensions.
vscan extension show Shows a list of existing virus scan extensions.
vscan log show Shows locally stored virus scan log messages.
vscan server add Adds a virus scan server for the virtual
Synopsis
vscan extension show
Description
For each virtual server, you can configure the NAS Gateway’s virus-scanning
capability to scan incoming traffic, outgoing traffic, or both. Although the default list
of extensions that you can use to scan for known viruses is extensive, new malicious
code in the form of worms and viruses may use different file extensions. You may
need to add these new extensions to your NAS Gateway virus-scan configuration
extension list to enable screening for these new threats.
To list the file extensions to be scanned, run the vscan extension show command.
You need to be in a virtual-server context to use this command. Depending on the
number of virus scan extensions you have chosen to scan, the list can include the
whole default list, or only the extensions you have chosen specifically to scan.
Example
This example shows the current list of file extensions that the NAS Gateway supports
for virus scanning.
Related Commands
vscan enable incoming Enables virus scanning on incoming CIFS or
NFS writes.
vscan enable outgoing Enables virus scanning on outgoing CIFS or
NFS reads.
vscan extension delete Deletes a specified extension from the list of
virus scan extensions.
Synopsis
vscan log clear
Description
For each virtual server, you can configure the NAS Gateway’s virus-scanning
capability to scan incoming traffic, outgoing traffic, or both. When virus scan feature
finds a file that needs to be cleaned, it logs it in the virus scan log so that you have a
viewable record of what scanning and cleaning has occurred.
One virus scan log exists for all virtual servers, but after the date-time stamp, the
records are prefixed with the virtual server name ID for filtering. The log is maintained
in /var/log/vscan, and you can access it from the command-line interface (CLI) by
running the vscan log show command. To clear the virus scan log, run the vscan
log clear command. You do not need to be in virtual server context to use this
command.
Example
In this example, the virus scan log is cleared. When the virus scan log is cleared, all
existing entries are deleted. New entries are added as the NAS Gateway encounters
files for scanning.
Related Commands
vscan enable incoming Enables virus scanning on incoming CIFS or
NFS writes.
vscan enable outgoing Enables virus scanning on outgoing CIFS or
NFS reads.
vscan log show Shows locally stored virus scan log messages.
vscan server add Adds a virus scan server for the virtual
Synopsis
vscan log facility {local0|local1|local2|local3|local4|
local5|local6|local7}
Description
The virus scan log facility interfaces with the standard syslogd capability to provide
logging of system information at the specified level of priority. By using this facility,
you can locally save system messages, forward them to a remote host, or display them
on the system console. Virus scan log messages use the same user-level facility codes
as the standard UNIX syslog program. You can use these facility levels to filter
messages from different NAS Gateways at a common syslog host.
Options
local0|local1|local2|local3|local4|local5|local6|loc
al7 are facility codes. The default value is local0.
Example
Related Commands
vscan log show config Shows the current log configuration.
Synopsis
vscan log host IPADDR
Description
The virus scan log facility interfaces with the standard syslogd capability to provide
logging of system information at the specified level of priority. By using this facility,
you can locally save system messages, forward them to a remote host, or display them
on the system console.
You can forward the virus scan log messages to syslog daemons running on a specified
host. If the host address is set to 0 all virus scan log messages are forwarded to the
local syslog daemon. Virus scan log messages for priority less than info are not saved
in the local log. If a nonzero syslog host is specified, all messages are forwarded to the
specified host using the currently configured facility code. In this case, make sure that
the remote syslog host is configured to receive syslog messages from other hosts
because some implementations, by default, are configured to not receive syslog
messages forwarded by other hosts. Remote logon is disabled by default, so all
messages are sent to the local host.
You can specify the syslogd host for sending virus scan log messages with the vscan
log host command.
Options
The IPADDR variable is the IP address of a remote host that runs
syslogd and is capable of receiving virus scan log messages from
this NAS Gateway.
Example
In this example, 192.168.172.1 is specified as the syslogd host for sending virus scan
log messages.
Related Commands
vscan log show config Shows the current log configuration.
Synopsis
vscan log show [NUMLINES]
Description
For each virtual server, you can configure the NAS Gateway’s virus-scanning
capability to scan incoming traffic, outgoing traffic, or both. When files are scanned
they are written to the virus scan log file. This log file contains virus scanning events,
which are logged with the most recent event at the top, in chronological order. Each
event contains the following information:
• Month, day, time (hh:mm:ss)
• NAS Gateway name ID.
• Scanner (the ONStor virus-scan applet service)
• Status of the scanner
• Applet restarts
• Volume name and file name with complete path for infected files
• Communication errors between the NAS Gateway and applet
You do not need to be in virtual-server context to use this command.
There is one log for all virtual servers, but after the date-time stamp, the records are
prefixed with the virtual server name ID for filtering. The log is maintained in /var/
log/vscan, and you can access it from the CLI by running the vscan log show
command.
Options
The NUMLINES variable is an optional argument that determines
the number of lines you want to display. The virus scan log is
listed in a top-down order, so the most recent events are displayed
from the top. The number you type is the number of lines from
the top.
Example
If there are any recorded events in the log, they display when the vscan log show
command is run. If there are no event records in the log, nothing shows when the
vscan log show command is run.
Related Commands
vscan enable incoming Enables virus scanning on incoming CIFS or
NFS writes.
Synopsis
vscan log show config
Description
You can use the vscan log show config command to view the current virus scan
log configuration and general event log configuration that applies to the virus scan log.
Displaying the virus scan log configuration shows the following information:
• The event log state, either enabled or disabled
• The event log level
• The event log display setting, either enabled or disabled
• The virus scan log host address
• The virus scan log facility level
Note!
If the virus scan log is on a remote host, this command does not display any
virus scan log messages. You can specify the virus scan log to be located on a
remote host by the vscan log host command.
Example
eng57>
Related Commands
elog show config Shows the current event log configuration.
Synopsis
vscan server add IPADDR
Description
For each virtual server, you can configure the NAS Gateway’s virus-scanning
capability to scan incoming traffic, outgoing traffic, or both. The ONStor VirusScan
applet that is installed on the virus-scan server provides the necessary connectivity
between the NAS Gateway and the third-party virus-scan software. The VirusScan
applet supports the Symantec™ AntiVirus™ Scan Engine and the McAfee® Anti-
Virus Engine API 4.3.20 of the McAfee VirusScan Enterprise 8.0i package. The virus-
scan server is connected to your network and communicates with the NAS Gateway
through the Gigabit Ethernet (GE) ports to provide the virus scanning.
To use this feature on each virtual server, you need to add a virus-scan server to the
virtual server configuration by running the vscan server add command within the
virtual server context. The virtual server can be in enabled or disabled state when you
run the vscan server add command. This command does not support adding
multiple virus-scan servers through a comma-separated server list. If you want to add
more than one virus-scan server to your virtual server, for instance, for load balancing
of virus-scanning tasks, you need to add each virus-scan server individually with the
vscan server add command in the specified virtual-server context. Have the IP
addresses of available virus-scan servers ready for entering into the appropriate
commands.
Note!
• Be sure you have your third-party equipment with the Symantec™
AntiVirus™ Scan Engine set up, powered on, connected, installed, and
configured before you run the vscan server add command.
• Be sure you have your VirusScan applet installed and properly configured
on the server. See the section “Installing the Virus-Scan Applet” in the
System Administrator’s Guide.
Options
The IPADDR variable is the IP address of the selected virus-scan
server. If the NAS Gateway is configured to support name
resolution, you can specify the virus scan server’s name.
Example
In this example, the server 10.1.1.13 is added to the virtual server VSTEST-ENG6 on
NAS Gateway eng6 to act as the virus-scan server. For this command to work, it is
assumed that the designated server already has the VirusScan applet installed,
configured, and running on it.
Related Commands
vscan enable incoming Enables virus scanning on incoming CIFS or
NFS writes.
Synopsis
vscan server delete IPADDR
Description
You can remove virus scan servers from the NAS Gateway’s list of virus scan servers
by running the vscan server delete command. To remove the last virus-scan server
from a virtual server, you need to first disable virus scanning on that virtual server. To
remove a virus-scan server from your NAS Gateway configuration, you need to be in a
virtual-server context.
Options
The IPADDR variable is the IP address of the selected virus-scan
server. If the NAS Gateway is configured to support name
resolution, you can specify the virus scan server’s name.
Example
In this example, the virus scan server 10.1.1.13 is deleted from the virtual server
VSTEST-ENG6 on NAS Gateway eng6. To verify that this action has taken place, run
the vscan server show command.
Related Commands
vscan disable incoming Disables virus scanning on incoming CIFS or
NFS writes.
vscan disable outgoing Disables virus scanning on outgoing CIFS or
NFS reads.
vscan extension add Adds a specified extension to the list of virus
scan extensions.
vscan extension delete Deletes a specified extension from the list of
virus scan extensions.
vscan extension set Sets the specified list of extensions to be the list
to be scanned.
vscan log show Shows locally stored virus scan log messages.
vscan server add Adds a virus scan server to the virtual server.
vscan server show Shows the list of virus scan servers for the
virtual server.
Synopsis
vscan server show
Description
Use the vscan server show command to display a list of all virus scan servers on the
current virtual server.
Example
This example shows virus scan configuration information, such as whether the virus
scan server is set to delete and quarantine infected files and the IP address of the NAS
Gateway on which the virus scan server runs.
Related Commands
vscan server add Adds a virus scan server for the virtual server.
vscan server delete Deletes a virus scan server for the virtual server.
Synopsis
volume add vsvr VOLNAME VIRTUALSERVER
Description
Use the volume add vsvr command to reassign a volume that has been disconnected
from its virtual server. The resulting reassignment of the volume allows clients to
access to the volume’s data.
Assign a volume to a virtual server only if the volume is not already associated with a
virtual server. For example, if the NAS Gateway configuration is lost or becomes
corrupted, you can use this command as part of the recovery process for the NAS
Gateway. Restart the NAS Gateway after the recovery process.
Note!
You can determine if a volume is currently owned by a virtual server, by
running the volume show command. If the Virtual Server column is
empty, use this command to assign it to a new virtual server.
Options
Table 32-1 : Options for the volume add vsvr command
Example
In this example, the volume pubstest is added to the virtual server techpubs. When you
reassign a volume to a new virtual server, the volume becomes available to clients
only after the file processing ports are reset to refresh the export interfaces. The
resetting of the file processing ports is not shown in this example.
Related Commands
volume show Shows one or more volumes.
vsvr clear Clears the current virtual server for all future
commands.
vsvr set Sets the current virtual server for all future
commands.
Synopsis
volume add array VOLNAME ARRAY
Description
As part of the volume create command, you need to specify one array from which a
volume obtains it logical unit numbers (LUNs). After this initial configuration, you
can add more arrays to a volume to allow for additional volume space. Each volume
can have a maximum of 8 additional arrays plus the initial array configured for the
volume, for a total of 9 arrays.
You can add arrays to a volume by running the volume add array command. This
command adds up to 8 arrays by name to a volume. The volume needs to exist for the
volume array command to complete. Arrays need to be added manually. The
ONStor™ NAS Gateway has no method for picking arrays and automatically adding
them to the correct volume.
Options
Table 32-2 : Options for the volume array add command
Example
In this example, the volume pubstest is configured with array IBM_KPZ0P941. When
the volume is created, it exists on this RAID only. However, after the volume is
created and brought online, you can specify up to eight additional arrays where the
data for pubstest can reside or where additional volume space can be assigned for
pubstest.
Related Commands
lun show disk Shows the list of disk devices.
volume modify Modifies the attributes of the volume.
volume show Shows one or more volumes.
vsvr set Sets the current virtual server for all future
commands.
Volume Create
Synopsis
volume create VOLNAME ARRAY [-A ATIMEUPDATES] [-c CHARSUBST] [-e
SHAREDREAD] [-g MINAUTOGROW][ [-h HIGHWATERMARK] [-l
MINLUNSIZE] [-L LANGUAGE] [-m] [-o OPLOCKS] [-q HARDQUOTA] [-r
RAIDLEVEL][-s SOFTQUOTA] [-S STABILITY] [-t CHARSUBSTTABLE] [-u
MAXLUNSIZE]
Description
The NAS Gateway supports logical volumes. Logical volumes can have different
applications, for example, volumes for mirroring or volumes for core dumps. But,
regardless of the applications for which logical volumes are used, the NAS Gateway’s
Volume Manager software only manages one type of volume, the logical volume.
Use the volume create command to create and manage the NAS Gateway’s logical
volumes, and assign parameters for its operation. The parameters you assign facilitate
the allocation of additional volume space when specified usage thresholds are
exceeded and more volume space is needed.
The volume create command automatically:
• Allocates disk space for the volume
• Makes disk space accessible to the operating system by bringing the volume online
• Creates a file system on the volume.
To create a volume with default parameters assigned, run the volume create
command and supply volume and array name.
As an alternative, you can create a volume with custom parameters. Use these
parameters to specify usage conditions for the volume’s automatic growth, and LUN
conditions for creating and growing the volume with compatible LUNs. For a detailed
description of each volume parameter, see Table 32-3 on page 32-8.
The volume create command executes different depending on whether you use an
array name or a device name:
When you run the volume create command, you can specify an array name or device
name. If you specify a device name, the following options are ignored during creation,
but used during automatic growth:
• -g MINAUTOGROW
• -l MINLUNSIZE
• -u MAXLUNSIZE
When you are creating a volume on a specific device or array, the -r RAIDLEVEL
argument of volume create is not supported because the volume inherits the RAID
level of the device.
After the volume is created, it resides in a virtual server. End users can access the
volume through network file service (NFS) or common Internet file service (CIFS)
shares that have been configured in the same virtual server as the volume. After a
volume is created, it remains on disk, and is visible during restarting and power
cycling.
Options
Table 32-3 : Options for the volume create command
Note!
If the high watermark is 0 and the hard quota is not equal to the minimum
automatic growth variable, the volume does not reach the hard quota size.
Example
In the following example, a volume is created with default values.
In this example, the command is creating a volume publitech on the RAID array
IBM_ECV5TSHB_0. Because no specific AutoGrow™ parameters are configured, the
volume is configured with all default settings.
In the following example, a volume is created with custom values.
In this example, a volume pubstest is created on the RAID array HDS_00000011. This
volume has custom usage quotas:
• The hard quota for automatic resizing of the volume is set to 12901 megabytes.
• The soft quota for automatic resizing of the volume is set to 75 percent of usage.
• The minimum AutoGrow parameter allows allocation of any amount of LUN
space.
• The high watermark is set to 95 megabytes.
• The minimum LUN size can use any amount of disk space.
• The maximum LUN size can use any amount of disk space.
The AutoGrow feature is disabled along with the high watermark, and the minimum
and maximum LUN size parameters.
Related Commands
cifs share add Exports a directory on a volume to CIFS clients.
lun show disk Shows the list of disk devices.
Volume Delete
Synopsis
volume delete VOLNAME
Description
Logical volumes are collection of LUNs that are not application specific and provide
storage space.
Use the volume delete command to remove any previously configured volumes that
you added with the volume create command. The volume delete command also
removes any usage parameters that you specified for automatic volume space growth
and releases the disk space held by the volume that you delete. When you run this
command, the NAS Gateway prompts you for confirmation. Type Y to accept the
deletion, or N to cancel the deletion when you see this prompt:
Are you sure? [y|n]
When you run the volume delete command, the NAS Gateway performs the following
tasks:
• Deletes any CIFS or NFS shares that are configured to export from the volume, so
you do not need to explicitly delete the shares.
• Deletes the specified volume.
• Frees any disk space that the deleted volume owned. The LUNs that supported the
now deleted volume remain labeled and appear in the lun show all command as
“free.” Because the LUNs are still labeled, you can use them for creation of a new
volume, or for automatic growth of an existing volume.
Note!
Deleted volume information is not stored in any nonvolatile memory. When
you delete a volume, all information about that volume no longer exists. If you
want the volume information, you need to manually recreate it.
Options
The VOLNAME variable is the name of the volume that you are
deleting. Volume names are alphanumeric character strings. The
volume name needs to begin with either an alphabetic or numeric
character, or a dash (-) or underscore ( _ ).
Example
In this example, the volume publitech is deleted. The NAS Gateway prompts you for
confirmation before deleting the volume. At this prompt you can accept or cancel the
deletion by typing Y or N.
Related Commands
system create mgmtvolume Creates the management volume for the current
management virtual server.
volume create Creates a new volume in the current virtual
server.
volume show Shows one or more volumes.
vsvr set Sets the current virtual server for all future
commands.
Volume Import
Synopsis
volume import CLUSTERNAME VOLNAME [NEW_VOLNAME] -m
Description
You can import a volume from one cluster into a selected virtual server of another
cluster using the volume import command. Importing volumes is helpful if, for
example, a cluster fails. In that case you can import the volumes from the failed cluster
into a virtual server of an active cluster. Before importing a volume from a cluster, you
need to disable the volume to be imported and stop any active backup or mirror
sessions on that volume. You need to be in the virtual server context of the virtual
server to which you are importing the volume. After you have imported the volume,
you need to enable the volume before you can use it.
Before importing a volume from a cluster, consider the following:
• You need to disable the volume to be imported and stop any active backup or
mirror sessions on that volume.
• You need to be in the virtual server context of the virtual server to which you are
importing the volume.
• After you have imported the volume, you need to enable the volume before you
can use it.
• You can import only volumes that are visible through network or SAN
connectivity.
• If the volume importing fails while in progress, select Volume->Import again.
Note!
You need to run the lun rescan command before importing a volume. For
details see “LUN Rescan” on page 15-4.
Options
Table 32-4 : Options for the volume import command
Example
In the following example volume techpubs1 is imported from cluster cluster1-4, and
the imported volume is renamed pubsvol2.
Related Commands
volume show Shows one or more volumes.
volume modify Modifies the attributes of the volume.
Volume Modify
Synopsis
volume modify VOLNAME [-A ATIMEUPDATES] [-c CHARSUBST] [-q
HARDQUOTA] [-s SOFTQUOTA] [-g MINAUTOGROW] [-h HIGHWATERMARK]
[-p NEWVOLNAME][-e SHAREDREAD] [-L LANGUAGE] [-o OPLOCKS] [-S
STABILITY] [-t CHARSUBSTTABLE] [-d DEVICE] [-f]
Description
Use the volume modify command to modify any of the usage parameters that affect
the automatic volume resizing feature. Use this command to set or reset different
usage values, disable individual features, or reenable individual features for a volume
without deleting and re-creating the volume.
However, the NAS Gateway does not enable concatenation of volumes, division into
multiple volumes, or reduction in size. This command is useful for renaming a volume
or changing its quota parameters. For the volume modify command to complete, the
volume needs to be offline or online depending on the parameter that you want to
modify:
• To change the -h HIGHWATERMARK, -e SHAREDREAD, or -L LANGUAGE
parameters, the volume needs to be online. If the volume is offline, you can
explicitly bring the volume online by running the volume online command. (See
“Volume Online” on page 32-31.)
• To change the -p NEWVOLNAME parameter, the volume needs to be offline. If the
volume is online, you can explicitly take the volume offline by running the volume
offline command. (See “Volume Offline” on page 32-30.)
• To change the -d DEVICE, -q HARDQUOTA, -s SOFTQUOTA, or -g
MINAUTOGROWTH, the volume can be online or offline. The state does not
matter for these parameters.
As part of the volume modify command, you can target a specific device as a
candidate for automatic growth on an existing volume by using the -d option. Each
volume can accept a maximum of 8 additional devices or arrays for use in AutoGrow.
If you specify a device on an array that is not already associated with a volume, the
array for the new device is added to the array list, but only if the volume has less than
8 arrays associated with it. If the volume has 8 or more arrays and you attempt to
assign another device to the volume, an ALERT-level notification is posted to the NAS
Gateway’s event log.
When the NAS Gateway attempts to automatically grow the volume, the hard quota
value is checked, and the specified device is added to the volume only if the hard quota
is not reached. The automatic growth depends on whether the volume is mounted:
• If the volume is mounted, a grow of the file system is triggered.
• If the volume is not mounted, the specified device is still added to the volume, but
waits in a pending state until the next automatic growth, which is triggered when
the file system usage reaches high watermark. At this point, the file system is
allowed to grow from the preallocated device.
Note!
• The NAS Gateway supports AutoGrow, but it does not support automatic
shrinking of a volume. Therefore, no option to delete a device from a
volume exists.
• If the high watermark is not set, the volume does not automatically grow.
• Although you can add a device to a volume even if the device and the
volume have a different RAID level, it can be a problematic procedure to
add devices with a different RAID level than the volume. Therefore, do
not mix RAID levels unless it is unavoidable.
By default, the NAS Gateway uses the RAID level of the device that was originally
used to create the volume. When you add devices, the NAS Gateway runs a check to
compare the device’s RAID level with the RAID level that was used to create the
volume. One of two outcomes can occur:
• If the device you are adding to the volume has the same RAID level as the device
used to create the volume, the volume modify command completes.
• If the device you are adding to the volume has a different RAID level than the
device used to create the volume, the volume modify command does not
complete. However, you can explicitly cause the command to complete by using
the -f option in the volume modify command.
Options
Table 32-5 : Options for the volume modify command
Example
Related Commands
system create mgmtvolume Creates the management volume for the current
management virtual server.
volume add vsvr Assigns a volume to a virtual server.
volume create Creates a new volume in the current virtual
server.
volume offline Takes the volume offline.
volume online Brings a volume online.
volume show Shows one or more volumes.
vsvr set Sets the current virtual server for all future
commands.
Volume Offline
Synopsis
volume offline VOLNAME
Description
During runtime, an existing volume needs to be online prior to it being mounted.
Volumes can be either online or offline. You might have to take a volume offline, for
example, for maintenance to the physical devices that support the LUNs that the
volume owns. Diagnostics can also require you to take the volume offline. The NAS
Gateway supports a command that deactivates the volume while keeping all its
configured parameters intact for when the volume is brought back online. You can take
a volume offline by running the volume offline command.
Note!
This command can be intrusive, so make sure that no one is using the volume
when you take the volume offline. When you take a volume offline, the shares
supporting the volume are no longer visible to clients.
Options
The VOLNAME variable is the name of the online volume that you
want to take offline.
Example
In this example, the volume pubstest is taken offline. While it is offline, clients cannot
mount pubstest, and its resources are not available to clients.
Related Commands
volume show Shows one or more volumes.
vsvr set Sets the current virtual server for all future
commands.
Volume Online
Synopsis
volume online VOLNAME [-o MODE]
Description
Volumes can be either online or offline. You might have to take a volume offline, for
example, for maintenance or diagnostics. If a volume is offline, it is still configured,
but it is not mountable; you cannot use it for core dumps or user data, and its resources
are not being shared.
You can take an offline volume online by running the volume online command.
When the volume comes back online, is automatically mounted with its previously
configured parameters.
Note!
When you bring a volume online, its shares are again visible in the list of
shares.
Options
Table 32-6 : Options for the volume online command
Example
In this example, the volume pubstest is brought online in read-only mode. When this
command is run, the volume is activated and can be mounted and shared with the same
configuration that it had prior to being taken offline.
Note!
The -o ro option can be used to mount mirror volumes on a different
virtual server in the cluster. , so that a read-only share can be created
and data can be accessed in read mode on a different NAS Gateway
than the one currently servicing the mirror.
Related Commands
volume show Shows one or more volumes.
vsvr set Sets the current virtual server for all future
commands.
Synopsis
volume share export VOLNAME LOCATION [-V VIRTUALSERVER]
(all|SHARELIST) [SHARELIST...]
Description
Exporting CIFS and NFS shares facilitates recovery efforts. CIFS and NFS shares are
exported to a share list text file from the source volume. The share list text file is then
imported to a target volume. The share list file consists of a list of shares and
corresponding options, share names, and comments, one per line. NFS shares are
exported using a path relative to the volume name, so the source and target volume
names can differ. CIFS share path names are independent of the volume name. The
following table shows actual share paths and the exported share path.
Spaces in share names, path, and comments are supported. Share names with
spaces need to be enclosed in double quotation marks
Options
Table 32-1 : Options for the volume share export command
Examples
Related Commands
volume share import Imports volume shares.
Synopsis
volume share import VOLNAME LOCATION [-V VIRTUALSERVER]
Description
Run the volume share import command from the virtual server context to import a
previously exported list to a target volume. The exported volume list can be generated
by using the volume share export command.
When importing shares to a target volume, the share list file is parsed, and each share
is created on the target volume. The target volume must be online. An event log is
generated for each share to indicate whether the share creation on the target volume
succeeded or failed.
Note!
This command should only be used on out-of-cluster volumes.
Options
Table 32-2 : Options for the volume share import command
Examples
Related Commands
volume share export imports one or more volumes.
Volume Show
Synopsis
volume show [VOLNAME]
Description
Use the volume show command to display volume information in one of two ways:
• Volume Summary, which is a list of all volumes configured on a NAS Gateway
and information about the volume’s quota and AutoGrow parameters, and usage
metrics, and the name of the virtual server that owns the volume.
• Volume Details, which is a list of a specific volume and detailed information about
the volume such as the information from the Volume Summary plus information
about the RAID controller and RAID level that the volume supports, and
information about the LUNs that comprise the volume.
The volume show command is available regardless of the volume’s state. By default,
the volume information is displayed for the current NAS Gateway.
Options
The VOLNAME variable is the name of the volume that you want
to display. If you do not specify a particular volume, all volumes
on the current NAS Gateway are displayed.
Example
The following example shows the volume summary on the NAS Gateway..
In this example, the volume summary contains four volumes. The volume summary
shows the following information:
• Name indicates the name assigned to the volume when it was created.
• Status indicates the operational status of the volume. Valid values are:
- Mounted, for a logical volume that is online and mounted by clients.
- Online, for a logical volume that is online, but not mounted.
- Offline, for a logical volume that has been taken offline with the
volume offline command or through a network or system event.
In the following example, volume details for a specific volume are displayed.
Name : vol1
Id : 0x1c500000069
Type : Standard
Version : 26
Virtual Server : VS1
Status : Mounted
Current Size (MiB): 10111.94
Used Size (MiB): 35.22
Available Size (MiB): 10076.72
Usage (%) : 0.35 %
Hard Quota (MiB): No Limit
Soft Quota (%) : N/A
High Water Mark (%) : N/A
Min. Auto Growth (MiB): 500
Shared Read : allow
Oplocks : allow
CharSubst : disabled
CharSubstTable : 0000,0000,0000,0000,0000,0000,0000,0000
Language : en_us
Automatic Atime Updates: enabled
Stability: normal
Arrays : LSI_E4600A
Vendor/model : None
RAID Level : Raid-0
Min. Lun Size (MiB): 0
Max. Lun Size (MiB): 0
LUN List
Idx Device Name Size (MiB)
--------------------------------------------------
1 LSI_E4600A_R46_eng57_mgmt 10239.94
-------------------------------------------------
eng57>
In this example, the volume details are displayed for the volume vol1. The volume
details display contains the following information:
• Name shows the configured name of the volume.
• ID shows the volume ID that was computed for the volume. This value is
computed internally and used by the NAS Gateway. It is not a configurable value,
and it is used for internal processes in the NAS Gateway.
• Type indicates the type of virtual server that is supported. Valid values include:
- Standard, for a logical volume that is supporting standard file system
data.
- Mirror, for a logical volume that is supporting Data Mirror
functionality,
- Management, for a logical volume that is supporting NAS Gateway
management functions.
- Core, for a logical volume that is supporting core dump functionality.
• Version shows the current layout version of the filesystem.
• Virtual Server shows the name of the virtual server that owns the volume. The
virtual server shown is the one in which the volume was created.
• Status indicates the operational status of the volume Valid values are:
- Mounted, for a logical volume that is online and mounted by clients.
- Online, for a logical volume that is online, but not mounted.
- Offline, for a logical volume that has been taken offline with the
volume offline command or through a network or system event.
• Current Size (MiB) indicates the amount in megabytes of currently used volume
space.
• Used Size (MiB) indicates the percentage of used disk space based on the number
of megabytes configured for the volume when the volume was created.
• Available Size (MiB) indicates the amount of free disk space assigned to the
volume. The listed value is the amount of unused disk space in megabytes.
• Usage (%) indicates a percentage value that indicates the amount of the volume’s
configured size that is currently being used.
• HardQuota (MiB) indicates the number of megabytes that are assigned to the hard
quota for automatic volume resizing. The default value is zero (0), which causes
the volume to have no absolute limit so volume growth is unlimited.
Note!
If the HARDQUOTA is 0, the SOFTQUOTA value is also set to 0.
• Soft Quota (%) indicates the percentage of the hard quota at which the automatic
volume resizing feature triggers. Valid values are:
- A percentage between 1 and 100.
- Zero (0), the soft quota is disabled. This is the default.
• High Water Mark (%) specifies the trigger that causes the volume space to grow by
the amount specified in the Min. Auto Grow field. Valid values are:
- A percentage from 25 to 100.
- Zero (0), which disables the automatic volume resizing feature.
• Min. Auto Growth (MiB) specifies the smallest amount of disk space that is added
to the volume if the automatic volume growth feature is triggered.
- The default value is 100, which causes the NAS Gateway to get any
amount of disk size larger than 100 megabytes.
- Zero (0) causes the NAS Gateway to get the next available LUN with
any amount of disk space.
• Shared Read indicates the state of the CIFS “no shared read” open flag for the
volume. This flag is read by NFS requests, and the state you set affects whether
NFS clients can access files on the volume.
- Allow permits NFS requests to ignore the “no shared read” flag.
Therefore, NFS requests are allowed, and NFS clients are able to read
files on the volume.
- Disallow causes NFS requests to respect the “no shared read” flag.
Therefore, NFS requests are not allowed, and NFS clients are not
permitted to read files on the volume.
• Oplocks specifies whether CIFS requests are permitted to obtain OPLOCKS on
files. Valid values are allow and disallow.
• CharSubst sets the CIFS invalid character substitution option to enabled or disabled.
• CharSubstTable sets the CIFS invalid character substitution table.
• Language defines the valid characters in file names stored on this volume.
• Arrays indicates device name of an array from which the volume obtains its LUNs.
• Vendor/Model specifies the vendor names or model number of the LUNs to be
used for the volume.
• RAID Level shows the RAID level that was configured on the LUNs in the volume,
when the volume was created. Supported RAID levels are:
- RAID 0
- RAID 0+1
- RAID 1
- RAID 3
- RAID 5
- N/A for volumes that have LUNs created without a specified RAID
level.
• Min. LUN Size (MiB) specifies the smallest logical disk to be used in the volume
creation or resizing. The default value zero (0) causes no minimum disk size limits
to be enforced for LUN creation or resizing, so any size of disk can be used.
• Max. LUN Size (MiB) specifies the largest single disk to be used for creating or
resizing a volume. The default value zero (0) causes no minimum disk size limits
to be enforced for LUN creation or resizing, so any size of disk can be used.
• LUN List shows a table of the LUNs that have been configured for this volume.
The LUN list shows each LUN’s index number, device name (which is the RAID
controller ID plus the LUN ID, and LUN size.
Related Commands
vsvr set Sets the current virtual server for all future
commands.