background image

Œ

ZZZGHOOFRP

'HOOŒ3RZHU9DXOWŒ11DQG1

6<67(0$'0,1,675$725$1'

&200$1'5()(5(1&(*8,'(

Summary of Contents for PowerVault 720N

Page 1: ... ZZZ GHOO FRP HOO 3RZHU9DXOW 1 1 DQG 1 6 67 0 0 1 675 725 1 200 1 5 5 1 8 ...

Page 2: ...s product includes software developed by the University of California Berkeley and its contributors 4 Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT N...

Page 3: ...that you are familiar with how the Network File System NFS Common Internet File System CIFS and Hypertext Transfer Protocol HTTP protocols are used for file sharing or transfers This guide doesn t cover basic system or network administration topics such as Internet Protocol IP addressing routing and network topology it emphasizes the characteristics of the Dell filer 2WKHU RFXPHQWV RX 0D 1HHG Besi...

Page 4: ...nicians 7HUPLQRORJ This guide uses the following terms Filer refers to a PowerVault F720N F740N or F760N storage system System refers at a minimum to a filer and a connected PowerVault F700N Disk Array Enclosure DAE storage system A tape backup device can also be a component of the system but is not required 1RWDWLRQDO RQYHQWLRQV You can enter filer commands on either the system console or from an...

Page 5: ...X PXVW IROORZ WR DYRLG SHUVRQDO LQMXU RQYHQWLRQ 7 SH RI QIRUPDWLRQ Italic type Words or characters that require special attention File names Placeholders for information you must supply For example if the guide says to enter the arp d hostname command you enter the characters arp d followed by the actual name of the host Man page names Book titles in cross references Monospaced font Command and da...

Page 6: ...viii ...

Page 7: ...onents 1 3 Two Kinds of Components 1 3 Internal Filer Components 1 3 Slots and Ports 1 4 About PowerVault 700N Storage Systems 1 5 PowerVault 700N Storage Systems Contain Disks 1 5 PowerVault 700N Storage System Environmental Information 1 5 About Data ONTAP 5 3 1 5 Data ONTAP 5 3 Overview 1 5 Data Storage Management 1 6 Data Organization Management 1 6 Data Access Management 1 7 Filer Administrat...

Page 8: ...m NFS Clients 2 3 Editing Configuration Files 2 3 What Editor to Use 2 3 Where Configuration Files Reside 2 3 Choosing an NFS or a CIFS Client 2 3 Editing Files From an NFS Client 2 3 Editing Files From a CIFS Client 2 4 Obtaining Access to the Filer Shell 2 5 Ways to Access the Command Line 2 5 Sharing a Single telnet and Console Session 2 5 telnet Session Restriction 2 5 Closing a telnet Session...

Page 9: ...torage in NVRAM 2 10 NVRAM Event During Orderly Shutdown 2 10 Procedure to Halt the Filer 2 10 Procedure to Boot the Filer 2 11 Procedure to Reboot the Filer 2 11 Where the Filer Boots From 2 11 Use the Halt Command to Avoid Data Loss 2 11 For More Information 2 11 Understanding the Filer Default Configuration 2 12 About the Default Configuration 2 12 Default Exported and Shared Directories 2 12 D...

Page 10: ...p Space Needed 2 22 Message Logging 2 23 About Message Logging 2 23 About the syslogd Daemon and the etc syslog conf File 2 23 The etc syslog conf File Format 2 23 The facility Parameter 2 23 The level Parameter 2 24 The action Parameter 2 24 Example Line From etc syslog conf 2 25 The etc messages File Restart Schedule 2 25 Checking the etc messages File Daily 2 25 Sample etc syslog conf File 2 25...

Page 11: ...ng Time 2 31 Time Synchronization with the rdate Command 2 31 When to Use the rdate Command 2 32 Filer Clock Accuracy 2 32 Use of cron jobs to Run rdate 2 32 cron job Example 2 32 Time Synchronization With SNTP 2 32 When to Use SNTP 2 33 List of timed Options 2 33 Synchronizing Filer System Time 2 33 Description 2 33 Prerequisites 2 33 Steps 2 34 Using options Command Options to Maintain Filer Sec...

Page 12: ... Disks 3 10 Adding Disks to Volumes 3 10 Removing a Failed Disk 3 10 Removing a Hot Spare Disk 3 10 Removing an Active File System Disk 3 11 Volume Management Tasks 3 11 Introduction 3 11 Creating Volumes 3 11 After Creating a New Volume 3 12 Adding Disks to a Volume 3 12 Monitoring Volume Status 3 12 Setting Volume Options 3 12 Converting a Mirror Into a Regular Volume 3 12 Making a Volume Inacti...

Page 13: ...on 3 21 Volume Reversion Using SnapRestore 3 21 About SnapRestore 3 21 How SnapRestore Works 3 22 What SnapRestore Reverts 3 22 Files That SnapRestore Cannot Recover 3 22 How SnapRestore Affects Recent SnapShots 3 22 Typical Applications of SnapRestore 3 22 Considerations Before Using SnapRestore 3 23 How SnapRestore Works With SnapMirror 3 23 Effects of Reverting a Root Volume 3 24 Effects of Sna...

Page 14: ...routed Daemon to Manage Multiple Routers 4 12 Displaying Routing Status 4 13 The etc dgateways File 4 13 How the Filer Replies to Requests 4 14 Using ifconfig to Configure an Interface 4 15 About the ifconfig Command 4 15 The ifconfig Command Syntax 4 15 Reasons to Use the ifconfig Command 4 15 Changing the Interface s IP Address Network Mask or Broadcast Address 4 15 Setting the Media Type on an ...

Page 15: ...erface on a Single Filer 4 21 Virtual Interface Management 4 22 Use the vif Commands to Manage Virtual Interfaces 4 22 Put These vif Commands in etc rc 4 22 Creating a Single Mode Trunk 4 23 Description 4 23 Prerequisites 4 23 Step 4 23 Example 4 23 Specifying a Preferred Link in a Single Mode Trunk 4 23 Description 4 23 Step 4 24 Removing a Link From Preferred Status in a Single Mode Trunk 4 24 D...

Page 16: ... Enabling and Disabling Database File Protection With nvfail 4 31 Description 4 31 Step to Enable nvfail 4 31 Step to Disable nvfail 4 31 Using the nvfail_rename File for Additional Database Protection 4 31 Description 4 31 Restrictions 4 31 Steps 4 31 KDSWHU LOH 6KDULQJ HWZHHQ 1 6 DQG 6 8VHUV About This Chapter 5 1 About File Sharing 5 1 File Locking Interactions 5 1 About This Section 5 1 Types ...

Page 17: ...s and Character Sets 5 7 File Names Use Character Sets 5 7 Every Volume Has a Language 5 7 Language Selection 5 7 What a Language Applies to 5 8 Kinds of Character Sets Supported 5 8 Languages Supported 5 9 How to Choose a Language 5 10 Language Procedures 5 11 Displaying a List of Supported Languages 5 11 Description 5 11 Step 5 11 Setting the Console Encoding 5 11 Description 5 11 Step 5 11 Sett...

Page 18: ...ow to Manage UNIX Access to NTFS Files 5 16 UNIX Users Need Windows NT Credentials to Access NTFS Files 5 16 WAFL Credential Caching 5 17 How to Manage the WAFL Credential Cache 5 17 The Default Configuration 5 17 Two Ways to Manage the WAFL Credential Cache 5 17 Global Cache Management Options 5 17 When to Use the wcc Command 5 17 The wcc Command Syntax 5 18 The wcc Command Options 5 18 Setting H...

Page 19: ...troducing the etc exports File 6 1 etc exports Controls Client Access to Directories 6 1 Format for etc exports Entries 6 1 Filer Directory Path Format 6 1 Export Specification Determines Access Privileges 6 2 One keyword is required 6 2 What the list variable represents 6 2 You can combine elements in an entry 6 2 Example 1 exporting default filer volume to administration host 6 2 Example 2 expor...

Page 20: ...on 6 7 Syntax 6 7 Limits 6 7 Restrictions 6 7 The ro Option 6 7 Syntax 6 7 The exportfs Command 6 7 Using the exportfs Command 6 7 Syntax 6 7 Canceling All Exports 6 8 Updating Exports Through etc exports 6 8 The etc netgroup File 6 9 The etc netgroup File Defines Groups of Clients 6 9 Syntax 6 9 Limits 6 9 Member list syntax 6 9 Restrictions 6 9 Changes Take Effect Immediately 6 9 Example of etc ...

Page 21: ...ing the Root Directory 6 14 Turning Off WebNFS Service 6 14 Displaying NFS Statistics 6 15 About Displaying NFS Statistics 6 15 The nfsstat Command Displays NFS and RPC Statistics 6 15 Syntax 6 15 Options 6 15 Example no options 6 16 Example using the l option 6 17 Example using the h option 6 17 Example resetting counters with the z option 6 18 KDSWHU 6 GPLQLVWUDWLRQ What Is CIFS 7 1 What You Can...

Page 22: ...m for 7 7 UNIX Example 7 8 Automating Access Rights 7 8 Required Information in hosts equiv File 7 8 Enabling Guest and Generic Access 7 8 Two Ways to Give Access to Unauthenticated or Occasional Users 7 8 Guest Accounts 7 8 Setting Up a Guest Account 7 9 Disabling Guest Access 7 9 Generic User Accounts 7 9 Who Can Use the Generic User Account 7 9 Setting Up a Generic User Account 7 10 Disabling g...

Page 23: ... Rights 7 20 When to Assign or Change Access Rights 7 20 Methods of Assigning or Changing Access Rights to a Share 7 20 Assigning or Changing Access Rights With Server Manager 7 21 Giving Access With the cifs access Command 7 22 Command syntax 7 22 Examples 7 22 Removing a User or Group With the cifs access delete Command 7 23 Displaying Access Rights to an NTFS File 7 23 Access Rights Display Met...

Page 24: ...ging 7 29 Description 7 29 Step 7 30 Specifying the Active Event Log 7 30 Description 7 30 Prerequisites 7 30 Step 7 30 Setting a System ACL on a File 7 30 Description 7 30 Prerequisites 7 30 Steps 7 31 Viewing Events in a Security Log 7 32 Description 7 32 Prerequisites 7 32 Steps 7 32 Using Oplocks 7 33 What Oplocks Do 7 33 When to Use Oplocks 7 33 Data Loss Possibilities 7 33 Error Handling And...

Page 25: ... Delay 7 38 Changing the Time Delay 7 39 Canceling the cifs terminate Command 7 39 Examples of the cifs terminate Command 7 39 Terminating CIFS Service for All Users on the Filer 7 39 Console Display 7 39 Terminating a CIFS Session for a Specific Client 7 40 Using the cifs restart Command to Restart CIFS Service 7 40 Reconfiguring the Filer for CIFS 7 40 When to Reconfigure a Filer for CIFS 7 40 H...

Page 26: ...ss Rule 8 9 The Fail Rule 8 9 How the Filer Processes Rules 8 9 Displaying HTTP Connection Information 8 10 Information in the etc log httpd log File 8 10 Displaying HTTP Statistics 8 11 httpstat Statistic Types 8 11 Syntax 8 11 KDSWHU 6QDSVKRWV Understanding Snapshots 9 1 What Is a Snapshot 9 1 Accessing Snapshots 9 1 Simplifying Tape Backup 9 1 Snapshots Use Little Disk Space 9 1 Creating Snapsh...

Page 27: ...ce for File System Use 9 10 Example 9 10 Effects of Snapshots on Quotas 9 11 Managing Snapshot Disk Consumption 9 11 About Snapshot Management 9 11 Scheduling Snapshots 9 11 Displaying Snapshot Statistics 9 12 Command Output 9 12 The Used Column 9 12 The Total Column 9 13 Output Summary 9 13 Changing the Snapshot Reserve 9 14 Adjusting Disk Space Used by Snapshots 9 14 Example 9 14 Accessing Snaps...

Page 28: ...ss to UNIX Files 10 6 Creating a qtree 10 6 How to Create a qtree 10 6 Result 10 6 Creating a qtree in the Root Volume 10 6 Creating a qtree in a Volume Other Than the Root Volume 10 6 Modifying the Security Style of a qtree 10 7 When to Change the Security Style of a qtree 10 7 How to Change the Security Style of a qtree 10 7 Example With a qtree 10 7 Example With a Volume 10 7 Modifying qtree Op...

Page 29: ...Creating a User Quota 11 7 Creating a Group Quota 11 8 Removing Quota Restrictions 11 8 When Quotas Are Exceeded 11 9 Messages Displayed by the Filer When Quotas Are Exceeded 11 9 Messages Displayed on NFS Clients 11 9 Messages Displayed on CIFS Clients 11 10 Increasing the Maximum Number of Files 11 10 About Increasing the Maximum Number of Files 11 10 Viewing the Number of Files in a Volume 11 1...

Page 30: ...etermining the Amount of Backup Data 12 7 Description 12 7 Step for Estimating the Amount of Data If You Back Up A qtree 12 7 Steps for Estimating the Amount of Data if You Back Up Data Not In A qtree 12 8 If the Filer Is Mounted on an NFS Client 12 8 If the Filer Is Shared by a CIFS Client 12 8 Determining the Number of Tapes for the Backup 12 8 Description 12 8 Prerequisites 12 9 Steps 12 9 Prer...

Page 31: ...6 Restrictions 12 16 Steps 12 16 Examples of Level 0 Backups to a Local Tape File 12 16 Examples of Backups to a Remote Tape File 12 16 Example of an Incremental Backup to a Local Tape Drive 12 17 Examples of Backups to Multiple Tape Files 12 17 Example of Backing Up a Directory From a Snapshot 12 17 Example of Backups to a Tape Stacker 12 17 Example of Backing Up Multiple Files or Directories in ...

Page 32: ...5 Parallel Restores 13 5 Prerequisites 13 5 Where to Enter the restore Command 13 5 Steps 13 6 Performing a Full Restore of a Volume Containing qtrees 13 6 Description 13 6 Steps 13 6 Examples of the restore Command 13 7 Example of Restoring a Subtree 13 7 Example of Restoring the Entire Filer 13 8 If There Is One Backup for Each Volume 13 8 If Each Volume Was Backed Up as Subtrees or qtrees 13 8 ...

Page 33: ...Example of the sysconfig t Command for a Qualified Tape Drive 14 3 Examples Of the sysconfig t Command for a Nonqualified Tape Drive 14 3 Example of the sysconfig m Command 14 3 Example of the sysconfig v Command 14 4 Using the mt Command to Control Tape Devices 14 4 The mt Command Syntax 14 4 Moving a Tape to the End of Data 14 4 Appending a Dump 14 5 Rewinding a Tape 14 5 Taking a Tape Drive Off...

Page 34: ...e Copy Operation When it Is in Progress 15 8 Checking the Status of a Volume Copy Operation 15 8 Where to Enter the vol copy status Command 15 9 Example of a vol copy status Command 15 9 Aborting a Volume Copy Operation 15 10 Controlling the Speed of a Volume Copy Operation 15 10 Displaying the Default Speed for Copying a Volume 15 11 Example of Controlling the Speed of Copying a Volume 15 11 KDSW...

Page 35: ...ror conf File 16 8 When You Can Modify the snapmirror conf File 16 8 Format of the snapmirror conf File 16 8 Meaning of Each Field in asnapmirror conf Entry 16 8 Rules for Specifying the Update Schedule 16 9 Example 16 9 When Changes to snapmirror conf Take Effect 16 9 Recommendation 16 9 Replicating a Volume 16 9 Description 16 9 Prerequisites 16 10 Restrictions 16 10 Cautions 16 10 Recommendatio...

Page 36: ...g RAID Information Using sysconfig r 17 1 Displaying Tape Drive Information Using sysconfig t 17 2 Displaying Overall Filer Information Using sysconfig v 17 2 Displaying Overall Filer Information Using sysconfig 17 2 Displaying Volume Information 17 2 Use the Vol status Command 17 2 Displaying Volume State Information With Vol Status 17 2 Displaying Disk Information Using Vol status d 17 2 Display...

Page 37: ...xpected Shutdown 18 3 NVRAM Problem 18 3 How the Filer Handles Inconsistent NVRAM Contents 18 3 Inconsistency Due to Improperly Updated Volume 18 3 Inconsistency Due to Log Updates for Off line Volume 18 4 Inconsistency Due to Other Reasons 18 4 Volume Problems 18 4 Types of Volume Problems Described 18 4 Failed Mounts and Stale File Handles 18 4 Changing Volume Names Can Cause Mount and File Hand...

Page 38: ... Do When the Filer Is Not Accessible From the Administration Host 18 10 Filer Runs Setup When etc rc Is Damaged or Missing 18 10 How to Recover From Configuration Errors if NFS Is the Only Licensed Protocol 18 11 How to Reset the Filer Password 18 11 Reset the Password if You Forget It 18 11 Procedure for Resetting the Password 18 11 How to Initialize All Disks and Create a New File System 18 12 I...

Page 39: ...18 18 Filer df Command Always Shows Correct Disk Space 18 18 qtrees Affect Disk Space Displayed by df 18 19 Filer Quota Report Command Always Displays Correct Usage 18 19 Serious Error Messages 18 19 Panic Messages Mean Serious Problems 18 19 What to Do After a Panic Message 18 19 KDSWHU HWDLOHG 2SWLRQV QIRUPDWLRQ About options 19 1 About Setting Detailed Information 19 1 Option Values 19 1 Autosu...

Page 40: ...on 19 4 Default 19 4 Description 19 4 The cifs idle_timeout Option 19 4 Default 19 4 Description 19 4 The cifs netbios_aliases Option 19 5 Default 19 5 Description 19 5 The cifs oplocks enable Option 19 5 Default 19 5 Description 19 5 The cifs perm_check_use_gid Option 19 5 Default 19 5 Description 19 5 The cifs scopeid Option 19 5 Default 19 5 Description 19 6 The cifs search_domains Option 19 6 ...

Page 41: ... enable Option 19 8 Default 19 8 Description 19 8 The httpd log max_file_size Option 19 8 Default 19 8 Description 19 8 The httpd rootdir Option 19 8 Default 19 8 Description 19 9 The httpd timeout Option 19 9 Default 19 9 Description 19 9 The httpd timewait enable Option 19 9 Default 19 9 Description 19 9 NFS Options 19 9 What the NFS Option Does 19 9 The nfs mount_rootonly Option 19 9 Default 19...

Page 42: ... NIS Options Do 19 11 The nis domainname Option 19 11 Default 19 11 Description 19 12 The nis enable Option 19 12 Default 19 12 Description 19 12 RAID Options 19 12 What the RAID Options Do 19 12 The raid reconstruct_speed Option 19 12 Default 19 12 Description 19 12 The raid scrub enable Option 19 12 Default 19 12 Description 19 12 The raid timeout Option 19 13 Default 19 13 Description 19 13 tim...

Page 43: ...ion 19 15 The no_atime_update Option 19 15 Default 19 15 Description 19 16 The nosnap Option 19 16 Default 19 16 Description 19 16 The nosnapdir Option 19 16 Default 19 16 Description 19 16 The nvfail Option 19 16 Default 19 16 Description 19 16 The raidsize Option 19 17 Default 19 17 Description 19 17 The root Option 19 17 Default 19 17 Description 19 17 The snapmirrored Option 19 17 Default 19 1...

Page 44: ... 19 19 Description 19 19 The vol copy throttle Option 19 20 Default 19 20 Description 19 20 The wafl convert_ucode Option 19 20 Default 19 20 Description 19 20 The wafl create_ucode Option 19 20 Default 19 20 Description 19 20 The wafl default_nt_user Option 19 20 Default 19 20 Description 19 20 The wafl default_unix_user Option 19 21 Default 19 21 Description 19 21 The wafl maxdirsize Option 19 2...

Page 45: ... Table 1 3 Filer Internal Components 1 4 Table 1 4 Slots and Ports 1 5 Table 1 5 Data Storage Management Concepts 1 6 Table 1 6 Data Organization Management Concepts 1 7 Table 1 7 Periodic Administration Tasks 1 9 Table 2 1 Administration Host Privileges 2 1 Table 2 2 Editing Configuration Files From a NIFS Client 2 4 Table 2 3 Commands Accepted From rsh 2 6 Table 2 4 Character Restrictions for Us...

Page 46: ...Supported 5 8 Table 5 2 Supported Languages 5 9 Table 5 3 wcc Command Options 5 18 Table 6 1 exportfs Command Options Syntax 6 8 Table 6 2 nfsstat Command Options 6 15 Table 7 1 CIFS File Access Limits 7 2 Table 7 2 etc usermap cfg Format Variables 7 5 Table 7 3 Generic User Account options Commands 7 10 Table 7 4 Creating a Share With cifs shares Command 7 14 Table 7 5 Changing a Share With cifs ...

Page 47: ...apMirror 16 17 Table 17 1 ifstat Command on Ethernet Interface RECEIVE 17 5 Table 17 2 ifstat Command on Ethernet Interface TRANSMIT 17 6 Table 17 3 ifstat Command on Ethernet Interface DEVICE 17 7 Table 17 4 ifstat Command on Ethernet Interface LINK INFO 17 7 Table 17 5 ifstat Command on GB Ethernet Interface RECEIVE 17 7 Table 17 6 ifstat Command on GB Ethernet Interface TRANSMIT 17 8 Table 17 7...

Page 48: ...l ...

Page 49: ... these tasks is the Data ONTAP 5 3 operating system RPSRQHQWV RI D LOHU A filer consists of the following major components listed in Table 1 1 LOHU DQG LOHU 0DLQ 8QLW Often the filer main unit is referred to simply as a filer KDW D LOHU RHV A filer provides the features described in Table 1 2 7DEOH 0DMRU RPSRQHQWV RI D LOHU RPSRQHQW XQFWLRQ Filer main unit The piece of hardware that receives and s...

Page 50: ...nts can use the following protocols to access data on the filer CIFS Common Internet File System used by Windows clients HTTP HyperText Transmission Protocol used by the World Wide Web NFS Network File System used by UNIX systems Files written using one protocol are accessible to clients of any protocol provided that filer licenses and permissions allow it For example an NFS cli ent can access a f...

Page 51: ...such as Server Manager and User Manager RQILJXUDWLRQ LOH GLWLQJ You edit configuration files to supply information that Data ONTAP 5 3 needs to per form certain tasks You can access configuration files by mounting the root directory of the filer on a UNIX client or by mapping the administrative share C to a drive on a Windows cli ent then editing the file from the client RPPDQG HFXWLRQ 7KURXJK LOH...

Page 52: ... Random Access Memory Data ONTAP 5 3 uses NVRAM to log network transactions as a data integ rity measure In case of a system or power failure Data ONTAP 5 3 uses the contents of NVRAM to restore network data to disk Diskette drive In an emergency and for major upgrades Data ONTAP 5 3 uses the diskette drive to boot from diskettes LCD and LEDs The filer displays status information on the LCD and LE...

Page 53: ...e console if parameters exceed permissible operating conditions ERXW DWD 217 3 DWD 217 3 2YHUYLHZ You administer the filer using Data ONTAP 5 3 commands Data ONTAP 5 3 manages data in the following three ways Data storage management Data organization management Data access management 7DEOH 6ORWV DQG 3RUWV RPSRQHQW HVFULSWLRQ Slots The filer contains expansion slots for network interface cards tape...

Page 54: ...ndent Disks A feature that enables file access even if one disk in a RAID group is damaged RAID group A RAID group consists of a parity disk and up to 27 data disks and optional spare disks You can control the size of a RAID group This enables you to customize backups and disk failure recovery Data disks Hold the data that clients access You can control the number of data and spare disks that a fi...

Page 55: ...SW SODQDWLRQ DWD 2UJDQL DWLRQ GPLQLVWUDWLYH FWLRQV volume An independent file system You can specify the following features for a volume A security style which deter mines whether a volume can contain files that use UNIX secu rity Windows NT File System NTFS security or both type of files Whether it uses CIFS oplocks Disk space and file limits This enables you to customize vol umes for the needs o...

Page 56: ...g methods Gathering network statistics so that you can verify and improve the performance of the filer Gathering file statistics so that you can schedule snapshots Monitoring accesses to a file by CIFS clients so that you can monitor potential security problems You maintain client access by the following methods Configuring volumes and qtrees to accommodate the needs of Microsoft Windows operating...

Page 57: ...LQLVWUDWLRQ 7DVNV Table 1 7 lists essential tasks that you should consider performing periodically sug gests how often to perform a task and lists the command or file to use for the task 7DEOH 3HULRGLF GPLQLVWUDWLRQ 7DVNV RZ 2IWHQ 7DVN RPPDQG RU LOH Daily Review filer performance and CPU utilization sysstat FRPPDQG Review filer disk usage on a per volume and per snapshot level df FRPPDQG Check for...

Page 58: ...PPDQG Review NFS exports etc exports file Review filer network traffic statistics netstat FRPPDQG Review network interface perfor mance statistics on a per interface level ifstat FRPPDQG Monthly Make sure that the PowerVault 700N storage systems are con nected properly shelfchk FRPPDQG Review filer uptime uptime FRPPDQG Review filer OS revision version FRPPDQG Review current NIS server ypwhich FRP...

Page 59: ...er recognizes a single client computer as the administration host The adminis trator who set up the filer specified the name of the administration host using the setup program GPLQLVWUDWLRQ RVW 3ULYLOHJHV The filer granted root permissions to the administration host after the setup proce dure was completed Table 2 1 describes the administration host s privileges 7DEOH GPLQLVWUDWLRQ RVW 3ULYLOHJHV ...

Page 60: ...DV WKH GPLQLVWUDWLRQ RVW If you plan to use an NFS client to manage the filer the client must support a text editor that can display and edit text files containing lines ending with the newline character support the telnet and rsh commands be able to mount directories using the NFS protocol 5HTXLUHPHQWV IRU 8VLQJ D 6 OLHQW DV WKH GPLQLVWUDWLRQ RVW If you plan to use a CIFS client to manage the fil...

Page 61: ... client use the following syntax vol vol0 GLWLQJ RQILJXUDWLRQ LOHV KDW GLWRU WR 8VH The filer does not include a local editor You must use an editor from a client to change filer configuration files KHUH RQILJXUDWLRQ LOHV 5HVLGH Configuration files reside in the etc directory in the filer s root volume KRRVLQJ DQ 1 6 RU D 6 OLHQW The procedure for modifying configuration files is different dependi...

Page 62: ...e and execute rights to the share The C share is a hidden share you can get to it only by specifying the path manually for example as filer C rather than accessing it through the Network Neighborhood icon 7DEOH GLWLQJ RQILJXUDWLRQ LOHV URP D 1 6 OLHQW 6WHS FWLRQ If the NFS client is Then the administration host Mount the filer root volume to the host not the administration host 1 Mount the filer r...

Page 63: ...close a telnet session press Ctrl to log out of the filer then press Ctrl D to log out of telnet WHOQHW DQG RQVROH 3DVVZRUG 5HTXLUHPHQW Although telnet and the console share the same shell session telnet and the console each prompt you for a password Both the console and telnet connections use the same password UVK 6XSSRUW The filer supports rsh with trusted remote hosts those remote hosts listed ...

Page 64: ...ange the system password at any time with thepasswd command When you enter the passwd command the filer prompts you to enter the old password if any and then requests the new password twice KHUH WR R WR HDUQ 0RUH ERXW 6HFXULW For information about ways to increase filer security in addition to password protec tion use the options described in Using Options Command Options to Maintain Filer Securit...

Page 65: ...filer D V WR FFHVV WKH LOHU 8VLQJ DQ GPLQLVWUDWLYH RJLQ 1DPH Using an administrative login name you can access a filer through any of the follow ing tools Filer console telnet rsh UHDWLQJ GPLQLVWUDWLYH 8VHUV HVFULSWLRQ The useradmin command enables you to increase filer security by creating multiple administrative users rather than sharing the root name and password among multiple administrators 3...

Page 66: ...istrative user using rsh enter the following command XVHUDGPLQ XVHUDGG XVHUBQDPH SDVVZRUG user_name is the new administrative user login name password is the new password associated with the new user name HOHWLQJ GPLQLVWUDWLYH 8VHUV HVFULSWLRQ Use the userdel option to delete administrative users created with the useradd option of the useradmin command You can use the userdel option at any time to...

Page 67: ...users using a console telnet or rsh enter the following command XVHUDGPLQ XVHUOLVW XVHUQDPHBOLVW username_list is a space separated list of login names you want to display NOTE If you do not specify any user names all administrative users are listed KDQJLQJ DQ GPLQLVWUDWLYH 8VHU 3DVVZRUG HVFULSWLRQ Use the passwd command from a console telnet or rsh to change your adminis trative password on a fil...

Page 68: ... rsh enter the following command SDVVZG ROGBSDVVZRUG QHZBSDVVZRUG XVHUQDPH NOTE If you do not use the third argument the passwd command works as before and expects you to enter the old and new password for root DOWLQJ DQG 5HERRWLQJ WKH LOHU DWD 6WRUDJH LQ 195 0 The filer stores requests it receives in nonvolatile random access memory NVRAM The use of NVRAM improves system performance prevents loss...

Page 69: ...and avoids potential data loss on CIFS clients If a CIFS client is disconnected from the filer the users applications are termi nated and changes made to open files since the last save are lost 87 21 1HYHU LQWHUUXSW 6 VHUYLFH E KDOWLQJ WKH ILOHU ZLWKRXW JLY LQJ DGYDQFH ZDUQLQJ WR 6 XVHUV Before turning the filer Off use the halt or cifs terminate command to send a warning message to CIFS users Thi...

Page 70: ...needs HIDXOW SRUWHG DQG 6KDUHG LUHFWRULHV HIDXOW LUHFWRULHV UHDWHG When setup finishes two default directories are made available for access by cli ents The default directories are the root directory the home directory 3HUPLVVLRQV IRU WKH HIDXOW LUHFWRULHV Table 2 5 shows the permissions that are assigned to the default directories when setup finishes 7DEOH 3HUPLVVLRQV IRU WKH HIDXOW LUHFWRULHV 7K...

Page 71: ...ctory NFS permissions associated with individual users and with groups through UNIX security database CIFS permissions assigned by the filer administrator for the HOME share 7DEOH FFHVVLQJ WKH LUHFWRULHV 7R DFFHVV URP WKLV FOLHQW R WKLV The root directory NFS Mount filer vol vol0 CIFS Map a drive to filer C The home directory NFS Mount filer vol vol0 home CIFS Map a drive to filer HOME Or Use the ...

Page 72: ...orts NFS export points NFS only hosts Known hosts and their IP addresses All hosts equiv Trusted hosts and users for rsh All group CIFS group names GIDs group identifica tion numbers and members names Not used if you use NIS to authenticate groups CIFS only netgroup Network groups NFS only nsswitch conf The order in which the filer contacts name services All passwd Users names UIDs user identifica...

Page 73: ...H 8VLQJ WKH KRPH LUHFWRU RU 1 6 FOLHQWV RU 6 FOLHQWV The home directory is exported with read and write permissions to all NFS clients and with root access to the administration host Clients can mount directories after the filer host name is added to the filer etc hosts file or to the client s name server The svtx bit also known as the sticky bit is set on the home directory to prevent users from ...

Page 74: ... UF LOH RQWHQWV The best way to understand the commands used in etc rc on the root volume is to examine the following sample etc rc file Auto generated etc rc Fri May 30 14 51 36 PST 1997 hostname filer ifconfig e0 hostname 0 ifconfig e1 hostname 1 route add default MyRouterBox routed on options dns domainname company com options dns enable on options nis domainname company com options nis enable ...

Page 75: ...rs depend on the specific filer Refer to Naming Conventions for Network Interfaces for more information about inter face names If you change the filer s host name you must modify the etc hosts file on the root volume to substitute the new host name If you don t ifconfig fails To override the default network mask explicitly spec ify the network mask in the ifconfig command after the host name for e...

Page 76: ...h file in the etc zoneinfo directory on the root volume describes the time zone you want VDYHFRUH Saves the core file from a system panic if any in the etc crash directory on the root volume Core files are created only during the first boot after a system panic H SRUWIV D Exports all directories specified in the etc exports file on the root volume This command is included only if the filer runs NF...

Page 77: ... hardware guide for your specific filer RZ 0XOWLSOH 3RUWV UH GHQWLILHG Some Ethernet interface cards support four ports These cards are referred to as quad port interfaces The filer uses a letter to refer to each port on a quad port inter face Table 2 10 shows the relationship of port numbers to letters RZ QWHUIDFHV UH 1DPHG Table 2 11 shows how interfaces other than virtual interfaces are named a...

Page 78: ...names remember the interface naming conventions that the filer uses Because the slot in which an inter face card is installed is a part of the interface name different filers might have different interface names LOHU RVW 1DPHV The first time the setup program runs the filer creates a host name for each installed interface by appending the interface name to the host name RVW 1DPH DPSOH A filer name...

Page 79: ...ng from System Boot Diskette in Chapter 18 3URFHGXUH KHQ GPLQLVWUDWLRQ RVW DQQRW FFHVV WKH LOHU If your filer becomes inaccessible from the administration host after you change the etc rc file perform the following steps to recover from the error 1 Enter commands on the console to configure the interface with the correct address 2 Enter the exportfs command to export the filer root directory to th...

Page 80: ...file name is a number The string nz indi cates that the file is compressed Displays a message on the system console Logs a message in etc messages on the root volume RUH XPS 6SDFH 1HHGHG A core dump file contains the contents of memory and NVRAM Core dumps are writ ten to a set of areas at the beginning of all the disks The core dump area on each disk has a fixed size of approximately 20 447 232 b...

Page 81: ...origin By default all system messages except for those of severity level debug are written to the console and to the etc messages file on the root volume 7KH HWF V VORJ FRQI LOH RUPDW The etc syslog conf file consists of lines with two tab separated not space separated fields of the following form IDFLOLW OHYHO DFWLRQ 7KH IDFLOLW 3DUDPHWHU The facility parameter specifies the subsystem from which ...

Page 82: ...s 7DEOH OHYHO 3DUDPHWHU H ZRUGV H ZRUG HVFULSWLRQ emerg panic condition that causes a disruption of normal service alert condition that you should correct immediately such as a failed disk crit critical conditions such as disk errors err errors such as those caused by a bad configuration file warning conditions that might become errors if not corrected notice conditions that are not errors but mig...

Page 83: ...g this file by creating a script on the administration host that periodically searches etc messages and then alerts you 6DPSOH HWF V VORJ FRQI LOH The following example shows a customized etc syslog conf file RJ DQ WKLQJ RI OHYHO LQIR RU KLJKHU WR HWF PHVVDJHV LQIR HWF PHVVDJHV RJ DOO NHUQHO PHVVDJHV DQG DQ WKLQJ RI OHYHO HUU RU KLJKHU WR WKH FRQVROH HUU NHUQ GHY FRQVROH RJ DOO NHUQHO PHVVDJHV DQG...

Page 84: ...ly the options command displays option values or changes the filer s behavior temporarily the system returns to the state specified in the etc rc file when rebooted To make changes permanent you must include theoptions commands in the etc rc file 6 QWD RI WKH RSWLRQV RPPDQG The syntax of the options command is as follows RSWLRQV RSWLRQ YDOXH If you omit a value for an option the command displays t...

Page 85: ... follows YRO RSWLRQV YROQDPH RSWLRQ YDOXH If you omit a value for an option the command displays the current value of the option Table 2 18 describes the variables DPSOH RI WKH YRO RSWLRQV RPPDQG The following command sets the maximum size of a RAID group in the volume named myvol to 12 YRO RSWLRQV P YRO UDLGVL H 6HQGLQJ XWRPDWLF PDLO RZ XWRPDWLF PDLO 0HVVDJHV UH RQWUROOHG The filer uses the autos...

Page 86: ...up is used as a mail host You can specify more mail hosts ERXW RQILJXULQJ DXWRVXSSRUW You can specify up to five addresses of email recipients Refer to Use the Options Command to Configure Autosupport for more information about specifying the email address and other options YHQWV 7KDW 7ULJJHU DXWRVXSSRUW PDLO The mail host sends email about your filer after any of the events listed in Table 2 19 7...

Page 87: ...J Y RSWLRQV LIFRQILJ D QIVVWDW F FLIV VWDW FLIV VHVVLRQV FLIV VKDUHV KWWSVWDW GI GI L VQDS VFKHG V VFRQILJ U contents of etc messages contents of etc serialnum 8VH WKH RSWLRQV RPPDQG WR RQILJXUH DXWRVXSSRUW To change the default behavior of the autosupport daemon use the options com mand As with other filer commands you can add options commands to the etc rc file if you want to execute them automa...

Page 88: ...VXSSRUW WR DGGUHVVHV You can specify up to five email addresses Separate email addresses by commas and do not include spaces in the list Example RSWLRQV DXWRVXSSRUW WR FXVWRPHU FRPSDQ FRP Be sure to enter the command on a single line 6SHFLI LQJ WKH LOHU GPLQLVWUDWRU V GGUHVV The options command for specifying the filer administrator is as follows RSWLRQV DXWRVXSSRUW IURP DGGUHVV Example RSWLRQV DX...

Page 89: ...QL LQJ 7LPH The filer uses two commands and a set of options to control and synchronize the sys tem time The date command sets the time locally For example the following command sets the system date and time to 9 25 a m on May 22 1999 date 199905220925 The rdate command synchronizes the filer s time with the time on another host with an accuracy of one second SNTP Simple Network Time Protocol sync...

Page 90: ...DWH A typical scheme is to have a UNIX computer run a periodic cron job that executes the appropriate rdate command on your filer through rsh The computer and the user if not root running the cron job must be in the filer s etc hosts equiv file on the root volume FURQ MRE DPSOH For example on the UNIX computer named adminhost the user named adminuser sets up a cron job to run every day at 3 a m It...

Page 91: ...automatically 3UHUHTXLVLWHV You must have available the name of at least one time server You can get a list of NTP Network Time Protocol time servers which SNTP can use from http www eecis udel edu mills ntp servers htm 7DEOH LVW RI WLPHG 2SWLRQV 7LPHG RSWLRQ XQFWLRQ HIDXOW timed enable Determines whether the timed daemon runs Off timed log Determines whether to log time changes initiated by the t...

Page 92: ...med max_skew nu n is the number of units specified by u u is one of the following s for seconds m for minutes h for hours The default is 30m which stands for 30 minutes 4 Specify a protocol by entering the following command options timed proto protocol protocol is one of the following rdate for the protocol used by the rdate command ntp for SNTP The default is ntp 5 Specify a synchronization sched...

Page 93: ... The mount_rootonly option restricts the mount privilege to root using privi leged ports ports 1 through 1 024 By default the option is enabled This option accepts the arguments off and on to disable and enable it This option is applica ble only if your filer runs NFS NOTE Some PC clients and some older implementations of NFS on UNIX worksta tions use non privileged ports to send requests If you h...

Page 94: ...0 or later You want to enable a service not previously licensed for your filer The filer s file system becomes corrupt and must be rebuilt Dell provides you with the appropriate license codes when shipping you the software upgrade kit or when giving you instructions for obtaining the software upgrade over the Internet QDEOLQJ 6HUYLFHV To enter a license code to enable a protocol on your filer use ...

Page 95: ...rc as a result of the license command If you want the filer to run NFS service after each reboot add nfs on to etc rc CIFS 6 OLFHQVH HQDEOHG 5XQ FLIV VHWXS WR HQDEOH 6 To start CIFS service set up the filer s CIFS configuration by run ning cifs setup You don t need to run cifs setup after the license command if you already set up the CIFS configuration HTTP KWWS OLFHQVH HQDEOHG 8VH RSWLRQV KWWSG H...

Page 96: ...s the code for the protocol For example to dis able your filer s license for NFS enter OLFHQVH QIV 6 After you disable a license your filer stops service for the corresponding protocol You can restart the service by reentering the license code 5HSODFLQJ LFHQVH RGHV If you misplace a license code contact Dell technical support to obtain a copy ...

Page 97: ...her with the support for RAID optimizes filer perfor mance and enables you to incrementally expand the filer s disk storage capacity In a RAID group different disks have different functions Most of the disks in the RAID group are data disks One disk is the parity disk which enables the filer to recover the data on a data disk if one fails Multiple RAID groups The filer supports multiple RAID group...

Page 98: ...e role of parity disk to the largest disk in the RAID group After a data disk failure the filer uses the parity disk in con junction with the other data disks to reconstruct the failed disk s data and optionally write it to a hot spare disk The parity disk must be at least as large as the largest data disk For more information about how the filer recovers from disk failures by using the par ity di...

Page 99: ...verable error on a disk that you can not fix before the next disk scrub The following commands disable and enable disk scrubbing RSWLRQV UDLG VFUXE HQDEOH RII RSWLRQV UDLG VFUXE HQDEOH RQ Commands to start and stop disk scrubbing You can also manually start and stop disk scrubbing regardless of the current value On or Off of the raid scrub enable option Following are the commands for starting and ...

Page 100: ...isk must be as large as the largest file sys tem disk If you have multiple hot spare disks installed the system uses the smallest hot spare disk needed to replace the failed disk 8QGHUVWDQGLQJ RW 6ZDS The filer enables you to hot swap disk drives Hot swapping a disk drive means install ing or removing it from the PowerVault 700N storage system while the filer is running with minimal interruption t...

Page 101: ...e option raid timeout command the argument is the time in hours that the system runs before automatic shutdown The system shuts down after the specified period if it is running in degraded mode A filer is in degraded mode if either of the following conditions exist One disk in any RAID group has failed The batteries on the NVRAM card are low if the filer is a PCI based system With a hot spare disk...

Page 102: ...d is light increase the speed of RAID data recon struction to maximize CPU utilization For more information about the sysstat command refer to the section Displaying Filer Statistics in Chapter 17 9ROXPH RQFHSWV 6HFWLRQ RQWHQWV This section covers the following topics Understanding volumes Determining the number of volumes to use Planning a multiple volume configuration Installing a foreign volume...

Page 103: ...ume_name directory Example For example vol users home cheryl is a directory called home cheryl in a volume named users HWHUPLQLQJ WKH 1XPEHU RI 9ROXPHV WR 8VH Whether you should use the default single volume configuration or create additional volumes depends mainly on the storage capacity of the filer Use of a single volume If you want the filer to be configured with a single volume you do not nee...

Page 104: ...ant to configure keep the fol lowing considerations in mind Configuring with more volumes provides more flexible quota and snapshot configuration requires more export points Configuring with larger volumes increases the time needed to restore a volume from tape The maximum number of volumes per filer is 23 The maximum recommended volume size is 250 GB For instructions about specific volume configu...

Page 105: ...ction contains procedures for managing the filer s disks and RAID groups 6HWWLQJ WKH 6L H RI D 9ROXPH V 5 URXSV To set the RAID group size of a volume when you create it enter the command YRO FUHDWH YROXPH U Q where volume is the name of the volume and n is the number of disks you want in each RAID group Every RAID group must contain at least two disks KDQJLQJ WKH 6L H RI D 5 URXS IWHU UHDWLQJ W T...

Page 106: ...the following command V VFRQILJ U 3 Check the sysconfig r output to verify that the new disk has been added GGLQJ LVNV WR 9ROXPHV To add new disks to a volume perform the following steps 1 Enter the command V VFRQILJ U to verify that there are spare disks available for you to add 2 Add the disks to a volume by entering the command YRO DGG YROXPH QGLVNV where volume is the name of the volume and nd...

Page 107: ...Step 1 in place of disk_name GLVN IDLO GLVNBQDPH The disk fail command permanently marks a disk as failed You cannot reuse the disk you must replace it After the disk fail command the system operates in degraded mode which means that a disk is missing from the RAID group 3 Remove the disk from the filer following the instructions in the hardware guide for your specific filer File service resumes 1...

Page 108: ...isks to an existing volume enter YRO DGG YRO Q where vol is the name of the volume and n is the number of disks to be added 0RQLWRULQJ 9ROXPH 6WDWXV To determine volume status such as size options disk assignments and so on enter YRO VWDWXV YROXPH To view the RAID group and individual disk information for a particular volume enter YRO VWDWXV U YROXPH To view the RAID group and individual disk info...

Page 109: ...tivate an off line volume enter YRO RQOLQH YROXPH GGLQJ D RUHLJQ 9ROXPH To add a foreign volume that is a volume that was previously installed on another filer you move the disks that contain the volume from the old filer to the destination filer To add a foreign volume perform the following steps 1 Follow the instructions in the hardware guide to remove the disks from the old filer 2 Turn off the...

Page 110: ...J D 9ROXPH To destroy a volume turning its disks back into spare disks perform the following steps 1 To deactivate the volume enter YRO RIIOLQH YROXPH 2 Enter the reboot command to reboot the filer 3 To destroy the volume enter YRO GHVWUR YROXPH 5HQDPLQJ D 9ROXPH To rename a volume perform the following steps 1 Enter YRO UHQDPH ROGYROXPH QHZYRO 2 Update the etc exports file and run exportfs 3 Upda...

Page 111: ...e Creation time Modification time Owner 7KH ILOHVWDWV RPPDQG 6 QWD The filestats command has the following syntax filestats ages ages sizes sizes timetype a m c cr style readable table html volume volume_name snapshot snapshot_name The volume and snapshot arguments are required volume_name is the name of the volume snapshot_name is the name of the snapshot Use the ages timetype sizes and style opt...

Page 112: ... filestats command with the ages option to display a daily breakdown of file changes in a volume as shown in the following example filestats ages 1D 2D 3D 4D 5D 6D 7D 8D 9D 10D 11D 12D 13D 14D volume vol0 snapshot hourly 0 Use the daily age breakdown displayed in the CUMULATIVE TOTAL KB column of the AGE output to determine the average change in data per day Divide the amount of disk space you wan...

Page 113: ...e vol0 snapshot hourly 0 If hourly 0 was taken at 8 a m and most file changes took place between 7H and 9H which corresponds to 3 p m and 5 p m in this example you can schedule more snap shots during these hours and fewer throughout the rest of the day Scheduling more snapshots before or during increased file activity decreases the time between file changes and snapshots For information about mana...

Page 114: ...h the filestats command ages timetype sizes style expr ERXW WKH JHV 2SWLRQ The ages option of the filestats command enables you to see when files have been accessed You can specify file ages in seconds hours and days using a comma to separate each value By default file ages are broken down by days in 30 day increments DPSOH RI WKH JHV 2SWLRQ For example to display files with ages under 900 seconds...

Page 115: ...ilobytes M megabytes G gigabytes a special value you use to list all unique file sizes one line per unique size Using this command can result in output of several thousands of lines DPSOH RI WKH 6L HV 2SWLRQ For example to display file sizes in four categories files with less than 500 kilobytes files with less than 2 megabytes files with less than 1 gigabyte and all other files enter the following...

Page 116: ... option of the filestats command The expr option enables you to specify a Boolean expression that the filestats command refers to for each file it encounters Table 3 2 lists valid file attributes that you can use with the expr option 7DEOH 9DOLG LOH WWULEXWHV IRU H SU 2SWLRQ WWULEXWH HILQLWLRQ tid Tree ID type File type perm Permissions flags Additional flags nlink Count of hard links uid Numeric ...

Page 117: ...han 10 000 bytes and whose UID is 5150 enter the follow ing command filestats expr size 10000 uid 5150 volume vol0 snapshot hourly 0 9ROXPH 5HYHUVLRQ 8VLQJ 6QDS5HVWRUH ERXW 6QDS5HVWRUH The filer s SnapRestore feature enables you to revert a volume to the state it was in when a particular snapshot was taken Without this feature you would need to use one of the following methods to restore data to a...

Page 118: ...rt the root directory the registry is reverted to the version that was in use at the snap shot creation time For more information about how reverting a root volume works refer to Effects of Reverting a Root Volume LOHV 7KDW 6QDS5HVWRUH DQQRW 5HFRYHU You cannot revert a volume to recover a deleted snapshot For example if you delete the hourly 2 snapshot and revert the volume to the hourly 1 snapsho...

Page 119: ...em you cannot copy the file from the snapshot to the active file system For example if a 10 GB file is corrupted and only 5 GB of free space exists in the active file system you cannot copy the file from a snapshot to recover the file In this case SnapRestore can quickly recover the file you do not have to spend time making the additional space available in the active file system RZ 6QDS5HVWRUH RU...

Page 120: ...ting the configuration files To avoid reverting the configuration files follow one of these steps Store all data that might need to be reverted in a volume other than the root vol ume This ensures that you never need to revert the root volume If the data you want to revert resides in the root volume back up the etc direc tory to another volume or another filer before using SnapRestore After you re...

Page 121: ...he reversion When you revert a source volume for data replication try not to select a snapshot taken before the SnapMirror snapshot If you must revert to a snapshot taken before the SnapMirror snapshot the filer can no longer perform an incremental update of the mirror it must recreate the base line version of the mirror Snapshot deletions are irrevocable If you delete a snapshot you cannot recove...

Page 122: ... the filer stops deleting and creating snapshots 3 Enter y to confirm that you want to revert the volume Result The filer displays a list of snapshots for you to choose from 4 Enter the name of the snapshot for reverting the volume and go to Step 7 Result The filer displays the name of the volume and the name of the snapshot for the reversion Then it asks whether you want to reboot the filer to pr...

Page 123: ...rt the volume Result The filer displays the name of the volume and the name of the snapshot for the reversion Then it asks whether you want to reboot the filer to proceed with the reversion 7 Enter y to confirm that you want to continue with the reversion Result The filer reboots ...

Page 124: ...3 28 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...

Page 125: ...m file size on your server and you enter a command to display the volume size on your server the file size is displayed incorrectly In this case the maximum file size appears as 2 GB even though the file on the client is larger than 2 GB 6RIWZDUH 5HTXLUHPHQWV To use large files ensure that your system meets the following requirements Filer operating system Data ONTAP 5 3 NFS version 3 enabled UNIX...

Page 126: ...alled Management Information Bases MIBs DWD 6103 3URYLGHV For diagnostic and other network management services the filer supports the SNMP MIB II specification Based on SNMP version 1 this specification provides data about the following MIB II groups system interfaces address translation IP ICMP TCP UDP SNMP MIB II SNMP commands enable users to specify up to eight communities and trap notifica tio...

Page 127: ...opriate to any trap hosts that were previously registered using the snmp traphost command This command should be the last SNMP command in the filer s etc rc file snmp traps Generates asynchronous notification of events called traps ERXW WKH HOO XVWRP 0 The Dell custom MIB provides detailed information about many aspects of filer opera tion You must use Dell custom MIB 1 1 2 or higher It contains o...

Page 128: ...EOH 0 URXS RQWHQWV URXS QDPH RQWHQWV FLIV Statistics like those displayed by the cifs stat command filesys Information related to the file system including the equiva lent of the maxfiles and df commands and some of the information from the snap list command nfs Statistics like those displayed by the nfsstat command including statistics for each client if per client statistics are enabled The per ...

Page 129: ...p should send data The following triggers are available single edge trigger sends data when the trap s target MIB variable s value crosses an edge a value that you specify double edge trigger enables you to have the trap send data when an edge is crossed in either direction the edges can be different for each direction level trigger sends data whenever the trap s value exceeds a certain level edge...

Page 130: ...offset The interval offset is the amount of time in seconds until the first trap evaluation and is zero by default You can set it to a non zero value to prevent too many traps from being evaluated at once at sys tem startup for example backoff calculator After a trap sends data you might not want it to be evaluated so often anymore For instance you might want to know within a minute of when a file...

Page 131: ...earch order for each map 6SHFLI LQJ D 6HDUFK 2UGHU To specify a different order in which the filer contacts host name services create the etc nsswitch conf file in the root volume Each line must have the following format as described in Table 4 4 PDS VHUYLFH 7DEOH HIDXOW 6HDUFK 2UGHU IRU 0DSV 0DS 6HUYLFHV LQ VHDUFK RUGHU hosts root files NIS DNS passwd root files NIS netgroup root files NIS group ...

Page 132: ...ads the etc hosts file in the root volume whenever it needs to resolve host names so changes to the file take effect immediately If you change the IP address for an interface the new IP address doesn t take effect until you reboot the filer and execute the appropriate ifconfig command from etc rc It is safest to reboot the filer after changing any etc file to make sure that the new configuration w...

Page 133: ...nable DNS you use only the default etc hosts file in the root volume Enabling DNS during setup At setup if you enter y in response to the following prompt setup prompts you for a DNS domain name as follows R RX ZDQW WR UXQ 16 UHVROYHU Q y 3OHDVH HQWHU 16 GRPDLQ QDPH After you enter a DNS domain name setup prompts you for the IP addresses for up to three DNS name servers Based on the IP addresses y...

Page 134: ...ot volume to make the change permanent RSWLRQV GQV HQDEOH RII Changing your DNS domain name To change your DNS domain name enter the following command or put the command in the etc rc file in the root volume to make the change permanent RSWLRQV GQV GRPDLQQDPH GRPDLQQDPH 8VLQJ 1 6 The filer includes NIS client capabilities to query NIS servers for host name to IP address and IP address to host name...

Page 135: ...ger have to update the filer s etc hosts file in the root volume every time you add a new host to the network unless you specify files first in the etc nsswitch conf file in the root volume Disabling NIS To disable NIS on a running system enter the following command or put the command in the etc rc file in the root volume to make the change permanent RSWLRQV QLV HQDEOH RII Changing your NIS domain...

Page 136: ...r is specified during setup You can however add potential default routers at any time to the etc dgateways file in the root volume For each added router you should also specify the metric which is a number indicating the route pref erence for the router The highest preference is 1 which is also the default preference for the router specified during setup The lowest preference is 15 For information...

Page 137: ...RQ DWHZD 0HWULF 6WDWH 7LPH DVW HDUG NDUO 9 HG 0DU 07 JURXFKR 9 HG 0DU 07 9 HG 0DU 07 9 HG 0DU 07 MXQH 9 HG 0DU 07 9 HG 0DU 07 9 HG 0DU 07 9 HG 0DU 07 9 HG 0DU 07 The routed status display shows the following information whether RIP snooping is active On or Off the current list of default gateways the metrics of the default gateways 1 through 15 the state of the gateways ALIVE or DEAD the last time...

Page 138: ...e that NFS over UDP responses might be returned through a different path than you might expect from an examination of the IP routing table using netstat r This scheme generally works well although it can result in different routes than expected if your environment contains one way routes For example the IP packets might not be routed as you intended if you configured the network so that the IP tra...

Page 139: ... for the following purposes changing the interface s IP address network mask or broadcast address setting the media type on an Ethernet interface setting the maximum transmission unit MTU configuring the interface up or down KDQJLQJ WKH QWHUIDFH V 3 GGUHVV 1HWZRUN 0DVN RU URDGFDVW GGUHVV The following examples show configuring an Ethernet interface and a virtual interface on a filer LIFRQILJ H LIF...

Page 140: ...r MTU value for an interface if a bridge or router on the attached network cannot break large packets into fragments To view the current setting of the MTU value use the following command QHWVWDW L RQILJXULQJ WKH QWHUIDFH 8S RU RZQ The following example illustrates how to configure interfaces up and down LIFRQILJ H D XS LIFRQILJ H GRZQ LIFRQILJ YLUWBLQWHUIDFH XS 7DEOH 0HGLD 7 SHV RQ DQ WKHUQHW QWH...

Page 141: ...cal interface unit known as a trunk A trunk is composed of links each of which is an interface Commands that work on physical interfaces also work on trunks except that the ifstat command returns limited trunk information 6 QRQ PV IRU 7UXQNV Trunks are also referred to by the following terms Virtual aggregations Link aggregations EtherChannel virtual interfaces This document uses the term trunk QW...

Page 142: ...into a multiple mode trunk called Trunk1 LJXUH QWHUIDFHV IWHU 7UXQNLQJ LQGV RI 7UXQNV 7ZR LQGV RI 7UXQNV There are two kinds of trunks Single mode trunks enable one link to fail over to another link Multiple mode trunks enable faster throughput by having links share network loads 1 2 3 4 e3a e3b e3c e3d Subnetwork A Switch Filer 1 2 3 4 e3a e3b e3c e3d Subnetwork A Logical 1 Trunk 1 Filer Switch ...

Page 143: ...nection The interface e1 also takes over the MAC address of the e2 interface LJXUH 6LQJOH 0RGH 7UXQNV With single mode trunks the filer performs takeover based on the absence of a link 0XOWLSOH 0RGH 7UXQNV In a multiple mode trunk all the interfaces are active This provides greater speed than a single interface A multiple mode trunk requires a switch that supports manually configurable trunking Th...

Page 144: ...be either half duplex or full duplex 9LUWXDO QWHUIDFHV 7UXQNLQJ 6XSSRUWHG E 9LUWXDO QWHUIDFH HDWXUH The feature that supports trunking is known as a virtual network interface or virtual interface The filer treats a virtual interface in the same way as a physical interface except for the ifstat command which does not show virtual interface information The vif command is customized for virtual inter...

Page 145: ...HYHO 9LUWXDO QWHUIDFHV RQ D 6LQJOH LOHU You use second level virtual interfaces on a single filer to maintain service even if a switch fails DPSOH RI D 6HFRQG HYHO 9LUWXDO QWHUIDFH RQ D 6LQJOH LOHU A subnetwork has two switches that are capable of trunking over multiple port con nections The filer has a two link multiple mode trunk to one switch and a two link multiple mode trunk to the second swi...

Page 146: ...to perform the following actions Create either a single mode or a multiple mode trunk Specify a preferred link to activate in a single mode trunk Add physical interfaces to a trunk Display the status of a virtual interface Display virtual interface statistics such as the number of packets received and transmitted on each link that makes up a virtual interface You can specify the time interval in s...

Page 147: ...terface Trunk names are case sensitive A list of the interfaces you want to combine into the trunk 6WHS To create a trunk in which only one interface is active at a time enter the following command or put it in the etc rc file YLI FUHDWH VLQJOH WUXQN LQWHUIDFHV where trunk is the name of the trunk and interfaces is a list of the interfaces you want the trunk to consist of DPSOH The single mode tru...

Page 148: ...t to perform this pro cedure if you are replacing or upgrading a physical interface that is currently the preferred link and want to stop using it NOTE There can only be one preferred link in a trunk After you complete this procedure the currently preferred link is not the preferred link and you can use the vif favor command to make another link the preferred link 6WHS To remove a link from prefer...

Page 149: ...put it in the in the etc rc file YLI FUHDWH PXOWL WUXQN LQWHUIDFHV where WUXQN is the name of the trunk and LQWHUIDFHV is a list of the interfaces that make up the trunk DPSOH The multiple mode trunk shown in Single Mode Trunks was created with the fol lowing command YLI FUHDWUH PXOWL 0XOWL7UXQN H H H H UHDWLQJ D 6HFRQG HYHO 9LUWXDO QWHUIDFH RQ D 6LQJOH LOHU HVFULSWLRQ You use this procedure to cr...

Page 150: ...commands create the second level virtual interface shown in Example of a Second Level Virtual Interface on a Single Filer vif create multi Firstlev1 e0 e1 vif create multi Firstlev2 e2 e3 vif create single Secondlev Firstlev1 Firstlev2 GGLQJ 3K VLFDO QWHUIDFHV WR D 7UXQN HVFULSWLRQ Use this procedure to add one or more physical interfaces to a trunk After you com plete this procedure you get the f...

Page 151: ... for example is useful in troubleshooting trunk problems You can use this procedure any time 6WHS To display the status of a trunk enter the following command YLI VWDWXV WUXQN where WUXQN is the name of the trunk If you don t specify a trunk the status of all trunks is displayed 6DPSOH 2XWSXW YLI VWDWXV GHIDXOW WUDQVPLW PXOWL IDLO ORJ YLI OLQNV WUDQVPLW PXOWL IDLO GHIDXOW XS H D VWDWH XS VLQFH DQ ...

Page 152: ...you complete this procedure you get information that for example is use ful in troubleshooting trunk problems You can use this procedure any time 6WHS To display statistics enter the following command YLI VWDW WUXQN LQWHUYDO where WUXQN is the name of the trunk If you don t specify a trunk the status of all trunks is displayed LQWHUYDO is the interval in sec onds The default is one second 6DPSOH 2...

Page 153: ...time Use it to warn database administrators of NVRAM problems that could compromise database validity If the filer finds any problems database instances hang or shut down and the filer sends error messages to the console to alert you to check the state of the database RZ WR 3URYLGH GGLWLRQDO 3URWHFWLRQ IRU DWDEDVH LOHV You can provide additional protection to specific database files by adding them...

Page 154: ...rrors File service starts normally The filer detects NVRAM errors and you use the optional nvfail_rename file a The filer returns a stale filehandles ESTALE error to NFS clients trying to access the database causing the application to hang crash or shut down and sends an error message to the filer console and log file b The filer renames database files specified in the nvfail_rename file by append...

Page 155: ...ter the following command YRO RSWLRQV YROXPHBQDPH QYIDLO RII volume_name is the name of the volume 8VLQJ WKH QYIDLOBUHQDPH LOH IRU GGLWLRQDO DWDEDVH 3URWHFWLRQ HVFULSWLRQ Use the optional nvfail_rename file when you want to rename database files after the filer detects NVRAM errors This enables you to examine the files for consistency before clients can access them 5HVWULFWLRQV You can only list o...

Page 156: ...ault 720N 740N and 760N System Administrator and Command Reference Guide 2 List the path name and file name one file per line within the nvfail_rename file for example vol vol1 home dbs oracle WG73 dbf 3 Save the file ...

Page 157: ... currently used by a client program using a different protocol in an environment consisting of CIFS and NFS users For details about locking in a particular protocol consult the documentation for that protocol 7 SHV RI OLHQWV There are CIFS clients and NFS clients 7 SHV RI RFNV NFS locks are advisory while CIFS locks are mandatory CIFS applications depend on locking to behave properly Because NFS l...

Page 158: ...olute and relative Absolute symbolic links begin with a slash and are treated as a path relative to the root of the file system Relative symbolic links begin with a character other than a slash and are treated as a path relative to the parent directory of the symbolic link RQWUROOLQJ FFHVV WR 6 PEROLF LQNV You can control CIFS access to symbolic links in three ways Enabling or disabling symbolic l...

Page 159: ...ged by applications that update files as described you might want to disable symbolic links for CIFS RZ WR QDEOH DQG LVDEOH 6 PEROLF LQNV You enable and disable symbolic links with thecifs symlinks enable option The option is On by default To disable symbolic links for CIFS use options cifs symlinks enable off To reenable symbolic links for CIFS use options cifs symlinks enable on RZ WR 5HGLUHFW E...

Page 160: ...ng command options cifs symlinks cycleguard off When you list the contents of a directory symbolic links that are valid references to files or directories are listed as if the target of the symbolic link existed in the direc tory If the symbolic link cannot be expanded it still looks like a file in a directory listing however any attempt by an application to open the link results in an access erro...

Page 161: ...o not allow renaming a file whose read only bit has been set NFS deletes follow NFS conventions That is deletes are allowed if the user has write permission in the parent directory If the bit was turned on by an NFS client that turned off all write permission bits removing or renaming the file is allowed if the user has sufficient permission to do so This is because file systems on UNIX systems al...

Page 162: ...he short names appear on clients that support only the 8 3 format The short names are not visible to NFS clients On Windows 9x and Windows NT clients you can choose to display the short name or the long name by using File Properties NOTE Under some circumstances an application running on a client that uses names in 8 3 format can lose the file s original long format name This can occur as a con se...

Page 163: ...Spec txt and the other is displayed as Spec 0 txt DQJXDJHV DQG KDUDFWHU 6HWV LOH 1DPHV DQJXDJHV DQG KDUDFWHU 6HWV File names in languages other than English can use characters that have diacritic marks or accents or can use characters that are not even in the Roman alphabet UNIX and Windows systems can create file names with no restrictions provided that they do not violate the naming conventions ...

Page 164: ...acter sets Table 5 1 shows what proto cols and operating systems use a particular character set You use this information to determine what directory format you use 7DEOH KDUDFWHU 6HWV 6XSSRUWHG KDUDFWHU VHW W SH HVFULSWLRQ 8VHG E ASCII A 7 bit character set used by most computers Does not allow letters with accents that is diacritics NFS console and log files qtree names snapshot names and volume ...

Page 165: ...ol lang command as described in Setting the Language of a Volume OEM Single or multiple encodings for older clients DOS Windows 9x except for file names NT system and domain name 7DEOH 6XSSRUWHG DQJXDJHV DQJXDJH DQJXDJH RGH Danish da Dutch nl English en English US en_US Finnish fi French fr German de Hebrew he Italian it Japanese euc j ja Japanese PCK sjis ja_JP PCK Norwegian no Portuguese pt POSI...

Page 166: ... a language LJXUH ORZFKDUW WR KRRVH D DQJXDJH Spanish es Swedish sv 7DEOH 6XSSRUWHG DQJXDJHV FRQWLQXHG DQJXDJH DQJXDJH RGH Start No No Yes Yes Set the language of each volume to the language used by NFS Language does not matter Set the language of the volume to the language of its clients Use sjis for Japanese Filer used for NFS only Filer used for CIFS only ...

Page 167: ...what language to specify for a volume if you do not already know what languages are supported 6WHS To display a list of the languages for which the filer supports character sets enter the following command vol lang 6HWWLQJ WKH RQVROH QFRGLQJ HVFULSWLRQ Use this procedure to set how the console displays non ASCII information You would change the encoding if your console does not accept or display c...

Page 168: ...rocedure the filer stores file names in the selected volume using a character set that best fits the language you select 3UHUHTXLVLWHV To complete this procedure you need the language code of the language you want to use You can get the language code from the table in Languages Supported DXWLRQ Changing the language after the volume contains files can cause some of the NFS encodings to be invalid ...

Page 169: ...is not recommended 6WHS To set the language and character set that a volume uses to store file names enter the following command vol create volume l langcode volume is the name of the volume whose language you want to change langcode is the code for the language you want the volume to use LVSOD LQJ KLFK 9ROXPH 8VHV KLFK DQJXDJH HVFULSWLRQ This procedure displays a list of volumes with the language...

Page 170: ... to avoid the following problems UNIX lowercase names might contain uppercase characters when converted to CIFS names Some CIFS clients changing the case of NFS file names on the filer making them inaccessible from NFS To change back to having the filer preserve the case of CIFS file names follow the procedure in Preserving the Case of CIFS File Names RUFLQJ 6 LOH 1DPHV WR RZHUFDVH HVFULSWLRQ This...

Page 171: ... cifs save_case on LUHFWRU RQYHUVLRQ 7LPH LUHFWRU RQYHUVLRQ DQ 7DNH D RQVLGHUDEOH PRXQW RI 7LPH Although the conversion process to Unicode directory format is automatic the initial conversion of a directory can take a considerable amount time especially if the direc tory contains a large number of files It is important to take these conversion times into consideration when deciding when to convert...

Page 172: ...irectory from a Windows NT client on the same volume in the same qtree as the directory you want to convert 2 With the NFS mv command rename files from the directory you want to convert into the directory you just created 3 Optionally remove the old directory 4 Optionally rename the new directory RZ WR 0DQDJH 81 FFHVV WR 17 6 LOHV 81 8VHUV 1HHG LQGRZV 17 UHGHQWLDOV WR FFHVV 17 6 LOHV If a user is ...

Page 173: ...blems NOTE If you make changes to the WAFL credential cache and an NFS client has cached information it can take a noticeable amount of time for the changes to become visible OREDO DFKH 0DQDJHPHQW 2SWLRQV If the default configuration does not work well for your site you can use an option to set how long each WAFL credential cache entry is valid You can also trace CIFS logins as an aid to debugging...

Page 174: ...uld be wcc u displays what the mapping of a UNIX name would be wcc x removes entries from the WAFL credential cache 7KH ZFF RPPDQG 2SWLRQV Each wcc command type has a different set of options as shown in Table 5 3 7DEOH ZFF RPPDQG 2SWLRQV 7 SH 2WKHU RSWLRQV XQFWLRQ wcc a u uname i ip addr v Adds the name to the WAFL credential cache The v option displays Windows NT groups wcc d v Displays the foll...

Page 175: ... than with a greater value This means that with a smaller value users might experience slower performance wcc x f v Removes all entries from the WAFL cre dential cache The v option displays how many entries have been removed i ip addr v Removes all entries from the WAFL cre dential cache with the same IP address The v option displays how many entries have been removed s ntname i ip addr v Removes ...

Page 176: ...You can use this proce dure in a script to load the WAFL credential cache at boot time with entries rather than wait for those entries to be created in the course of accessing a file You can per form this procedure at any time 3UHUHTXLVLWHV You must have the names and IP addresses of those you want to add to the WAFL credential cache DXWLRQV If you add more entries than the maximum number of entri...

Page 177: ... that group from the WAFL credential cache 6WHS To remove an entry from the WAFL credential cache enter the following command wcc x name name can be one of the following specifications s followed by a Windows user name or group name u followed by a UNIX name You can further narrow the specification of a user by adding i followed by the IP address of the host that the user is on LVSOD LQJ UHGHQWLDO...

Page 178: ...ivileged entries 1 indicates members of BUILTIN Administrators group The following sample output shows the output of statistics with the v option used twice cc dvv mmm UID 1321 from 10 100 4 41 NT DOMAIN mmm UNIX uid 1321 NT membership NT DOMAIN mmm NT DOMAIN Domain Users NT DOMAIN SU Users NT DOMAIN Installers NT DOMAIN tglob NT DOMAIN Engineering BUILTIN Users User is also a member of Everyone N...

Page 179: ...r of Everyone Network Users Authenticated Users hawleyr UID 1129 from 10 100 4 41 NT DOMAIN hawleyr UNIX uid 1129 NT membership NT DOMAIN hawleyr NT DOMAIN Domain Users NT DOMAIN Installers NT DOMAIN SU Users BUILTIN Users User is also a member of Everyone Network Users Authenticated Users Total WCC entries 3 oldest is 156 sec Total Administrator privileged entries 1 indicates members of BUILTIN A...

Page 180: ... display what the current mapping of a UNIX name would result in but not change the WAFL credential cache enter the following command wcc u uname uname is the UNIX name of a user You can further narrow the specification of the user by adding i followed by the IP address of the host that the user is on You can get more detailed information by appending v to the command line 6DPSOH 2XWSXW The follow...

Page 181: ...hat the current mapping of a Windows name would result in but not change the WAFL credential cache enter the following command wcc s uname uname is a Wndows NT account You can further narrow the specification of the user by adding i followed by the IP address of the host that the user is on You can get more detailed information by appending v to the command line 6DPSOH 2XWSXW The following example...

Page 182: ... console messages Constant use of CIFS login tracing can result in many console and log messages 6WHS WR 7XUQ 2Q 6 RJLQ 7UDFLQJ To turn on CIFS login tracing enter the following command options cifs trace_login on 6DPSOH 2XWSXW If user jdoe attempts to log in messages like the following appear on the console Mon Jan 4 15 21 38 PST CIFSAuthen Login attempt by DELL jdoe from SMITH PC Mon Jan 4 15 21...

Page 183: ...ents access filer directories You add entries to the etc exports file for all the directories you want to export RUPDW IRU HWF H SRUWV QWULHV The format of the entries in the etc exports file is as follows filer_directory_path export_specification LOHU LUHFWRU 3DWK RUPDW The filer directory path specifies which directory is made available to clients The for mat is as follows vol volume_name direct...

Page 184: ... as shown in the following example root adminhost administrators rw blender pcusers 123 45 67 0 24 DPSOH H SRUWLQJ GHIDXOW ILOHU YROXPH WR DGPLQLVWUDWLRQ KRVW The following line exports the root directory of the default filer volume to the adminis tration host with root privileges The administration host can mount the directory change permissions and ownerships and create and delete directories an...

Page 185: ...st be able to resolve host names into IP addresses Host name resolution can take place through DNS name resolution by using the etc hosts file on the filer root volume Refer to Host Name Resolution in Chapter 4 for more information about host name to IP address resolution DQQRW 5HVWULFW FFHVV RVW Neither the filer nor NFS provide a way to specify hosts that cannot mount the filer To restrict acces...

Page 186: ... filer determines permissions it makes little sense to give a client greater permissions at a higher level in the file system DPSOH The following lines show an etc exports file that creates a security breech by enabling any host to mount the vol vol0 directory while restricting specific hosts to mounting the vol vol0 home directory In this example any host can gain access to the vol vol0 home dire...

Page 187: ...generated by setup Mon Oct 27 14 15 36 PST 1997 vol vol0 access silver root silver vol vol0 home root silver The contents of the default etc exports file is shown below vol vol0 access adminhost root adminhost Only the administration host adminhost can mount the root directory and mod ify files in the directory NOTE On filers with a single volume you can refer to the root directory without the vol...

Page 188: ...e number of host names you can specify with the access option However the length of a line in the etc exports file cannot exceed 1 024 characters NOTE If you cannot fit all the host names in a 1 024 character line you can use net groups in place of host names 7KH URRW 2SWLRQ The root option lists the hosts that can mount exported directories as root Hosts that mount exported directories as root ha...

Page 189: ...KH UR 2SWLRQ The ro option lists the clients that cannot modify the exported directories 6 QWD The syntax for the ro option is as follows ro hostname hostname 7KH H SRUWIV RPPDQG 8VLQJ WKH H SRUWIV RPPDQG You use the exportfs command to export and unexport volumes and directories Depending on which options you use the command exports the volumes and directo ries listed in the etc exports file or a...

Page 190: ... entries listed in the etc exports file u Unexports all the entries listed in the etc exports file NOTE When you use the u option with the a option all exports are unexported regardless of whether they were created from the etc exports file or with the o option i Exports all the export entries listed in the etc exports file but ignores the options specified for the entries v Prints each path name ...

Page 191: ...etc netgroup file is limited to 4 096 characters 0HPEHU OLVW V QWD Each element in member list is another group name an entry in the following form hostname username domainname An element in an entry can be blank but the commas must be present When group names are used in the etc exports file the username and domainname fields are ignored When domain names are used they must be DNS names NIS names...

Page 192: ...QHWJURXS ILOH You must copy an existing NIS network group over to vol vol0 etc netgroup on the filer before the exportfs command can use it XWRPDWLQJ FRS LQJ ZLWK D 0DNHILOH You can modify the Makefile of the NIS master to copy the NIS master s etc netgroup file to the filer when it is changed DPSOH 0DNHILOH The following lines of code in the NIS Makefile section for netgroup time copy the etc net...

Page 193: ... num_bits dotted_ip can be an IP address a b c d or an IP subnet a for a class A network a b for a class B network a b c for a class C network The size of the subnet is specified by the number of leading bits of the netmask num_bits SRUW WR D 6XEQHW DV RX R WR D OLHQW You export a directory to a subnet as you do to an individual client except that you specify a subnet address rather than a full IP...

Page 194: ...P URZVHUV The filer can use NFS rather than HTTP to respond to file transfer requests made through Web browsers that support the WebNFS protocol The filer does not need a license for the HTTP protocol to respond to WebNFS requests however the filer must be licensed for the NFS protocol HE URZVHU 5HTXLUHPHQWV To access files through the WebNFS protocol users type URLs that start with nfs Web browse...

Page 195: ...rectory known as the root directory for WebNFS access Then Enter the following commands replacing directory with the path to the root directory options nfs webnfs rootdir directory options nfs webnfs rootdir set TRUE Results All NFS lookups are done relative to the root directory All WebNFS cli ents can access files and directories under the root directory Do not want to specify a public directory...

Page 196: ...es remember to use this procedure to specify the new name of the root directory 1 Enter the following command replacing newdir with the path of the new root directory options nfs webnfs rootdir newdir Example To change the root directory to vol vol0 corpwebfiles you the follow ing command options web webnfs rootdir vol vol0 corpwebfiles 2 Enter the following command to enable the root directory op...

Page 197: ...of information about this topic is Managing NFS and NIS by Hal Stern O Reilly Associates Inc 6 QWD The syntax of the nfsstat command is as follows nfsstat interval h ip_address host_name l z nfsstat h ip_address host_name nfsstat l nfsstat z 2SWLRQV Table 6 2 describes the options for the nfsstat command 7DEOH QIVVWDW RPPDQG 2SWLRQV 2SWLRQ HVFULSWLRQ none When no options are specified the command ...

Page 198: ...rovide the client s host name or IP address as an argument to the h option To use the h option you must enable the nfs per_client_stats enable option by entering the following command options nfs per_client_stats enable on Enable the per client statistics collection mode as soon as possible after you start the filer or reset the counters with nfsstat z Otherwise nfsstat l reports incorrectly low p...

Page 199: ...t 0 0 DPSOH XVLQJ WKH O RSWLRQ The following lines show the output of the nfsstat command when you specify the l option nfsstat l 172 17 25 13 sherlock NFSOPS 2943506 90 172 17 25 16 watson NFSOPS 3553686 2 172 17 25 18 hudson NFSOPS 2738083 1 172 17 230 7 conan NFSOPS 673247l 3 172 17 230 8 baker NFSOPS 202614527 1 172 17 230 9 moriarty NFSOPS 1006881 0 175 17 230 10 doyle NFSOPS 1185 0 DPSOH XVL...

Page 200: ...move rename link symlink 0 0 3225 10 12 0 7 0 9 0 0 0 0 0 mkdir rmdir readdir statfs 0 0 0 0 416 1 29 0 Server nfs V3 null getattr setattr lookup access readlink read 0 0 0 0 0 0 0 0 0 0 0 0 0 0 write create mkdir symlink mknod remove rmdir 0 0 0 0 0 0 0 0 0 0 0 0 0 0 rename link readdir readdir fsstat fsinfo pathconf 0 0 0 0 0 0 0 0 0 0 0 0 0 0 commit 0 0 DPSOH UHVHWWLQJ FRXQWHUV ZLWK WKH RSWLRQ ...

Page 201: ...n about vol ume operations see Chapter 3 Disk and File System Management Setting or changing volume and qtree security style and oplocks status For infor mation about administering qtrees from the filer command line see Chapter 12 Qtree Administration For information about how to administer qtrees in Filer View see FilerView on line help IIHFWV RI 5HQDPLQJ D 9ROXPH RQ 6KDUHV If you change the name...

Page 202: ...VVLRQV DQG 6KDUHV LPLWV IRU WKH HOO 3RZHU9DXOW 1 1 DQG 1 The filer is subject to limits on file access through CIFS Table 7 1 shows access limits for the 720N 740N and 760N filers with at least 120 MB of memory 7DEOH 6 LOH FFHVV LPLWV KDQJLQJ RU 9LHZLQJ WKH LOHU V HVFULSWLRQ KHQ WR KDQJH RU 9LHZ D LOHU V HVFULSWLRQ The description of a filer appears next to its name wherever a machine s descriptio...

Page 203: ...er Properties window appears 5 Type a new description of the filer in the Description field 6 Click OK Result The new description goes into effect 9LHZLQJ D LOHU V HVFULSWLRQ URP WKH LOHU RPPDQG LQH To view the description of a filer enter the following command FLIV FRPPHQW KDQJLQJ D LOHU V HVFULSWLRQ URP WKH LOHU RPPDQG LQH To change the description of a filer enter the following command FLIV FRP...

Page 204: ... in the etc passwd file on the filer or include the user in the etc usermap cfg file KDW LV WKH HWF XVHUPDS FIJ ILOH The etc usermap cfg file explicitly maps Windows NT users to the correct UNIX account and UNIX users to a Windows NT account The file can be coded as follows As a text file with non ASCII characters encoded in the NFS character set As a UNICODE file created using the Windows NT tool...

Page 205: ...n IP address in any of the following formats A regular IP address specified as numbers separated by periods dot notation with an optional subnet address For example 192 4 1 0 24 narrows possible matches to the 192 4 1 0 class C subnet A host name A network name A network name with a subnet specified in dot notation For example corpnet 255 255 255 0 specifies the corpnet subnet NT domain Specifies ...

Page 206: ...nto the NIS password and group maps NOTE If you do not use NIS create entries for the user in the filer s etc passwd and etc group files GGLQJ RFDO URXSV WR WKH LOHU RZ WR GG D RFDO URXS You add a local group to the filer with the New Local Group window in the User Man ager for Domains GGLQJ D URXS LWK WKH 1HZ RFDO URXS LQGRZ To create a new local group perform the following steps 1 Open User Mana...

Page 207: ...es in the Names list box Type valid user or group names in the Add Names list box 12 Click Add in the window where you specified the names Result The names are added to the Add Names field of the Add Users and Groups window 13 If you want display the full name of a user associated with an account name by clicking Show Full Name 14 Click OK Result The names appear in the Members field of the New Lo...

Page 208: ...or each filer at your site 5HTXLUHG QIRUPDWLRQ LQ KRVWV HTXLY LOH Make sure that the following entries are added to the hosts equiv file in the etc directory host user host root where host is the host you are using and user is your name NOTE Make sure that you include both lines or not all remote shell functionality works properly QDEOLQJ XHVW DQG HQHULF FFHVV 7ZR D V WR LYH FFHVV WR 8QDXWKHQWLFDW...

Page 209: ...D DV DFFRXQWBQDPH HQHULF 8VHU FFRXQWV If you are using Windows NT domain authentication a generic user account is mapped by default with the name pcuser The generic user account enables users who meet the criteria described in this section to connect to NTFS or mixed qtrees on the filer For information about qtrees see Chapter 10 Qtree Administration or FilerView on line help NOTE For generic user...

Page 210: ...Display a Filer s Shares From the filer command line use the cifs shares command to display share information as described in Using the cifs Shares Command to Display A Filer s Shares 8VLQJ 6HUYHU 0DQDJHU WR LVSOD D LOHU V 6KDUHV To display a filers s shares with Server Manager and get detailed information perform the following steps 1 Open Server Manager by choosing it from the Start menu 2 From ...

Page 211: ...the filer s list of shares from the filer s command line use the cifs shares command RPPDQG 6 QWD The syntax is as follows FLIV VKDUHV DPSOH RI LVSOD LQJ D ILOHU V 6KDUHV The following example shows a filer s shares FLIV VKDUHV 1DPH 0RXQW 3RLQW HVFULSWLRQ 20 YRO PXIILQ KRPH HIDXOW 6KDUH HYHU RQH XOO RQWURO WHFKSXEV J XOO RQWURO YRO PXIILQ 5HPRWH GPLQLVWUDWLRQ HYHU RQH XOO RQWURO 8 7 1 GPLQLVWUDWRU...

Page 212: ... Manager by choosing it from the Start menu 3 From the Server Manager Computer menu choose Select Domain Result The Select Domain window opens 4 In the Select Domain window select the filer you want by typing its UNC name for example FILERNAME in the Domain field then clicking OK Result A Server Manager window for the filer appears 5 Choose Computer Shared Directories then click the New Share butt...

Page 213: ...ies Result The Shared Directories window appears 5 Double click a share name Result The Share Properties window appears 6 Type a new description of the share in the Comments field if you want 7 If you do not want to limit the number of users that can connect to the share at the same time select Maximum Allowed under User Limit 8 To limit the number of users that can connect to the share at the sam...

Page 214: ... the client If the description contains spaces you must enclose it in single quotation marks JURXSQDPH The name of the group you want all files in the share to get the group membership of Q The maximum number of users that you specify can con nect to the share at the same time The limit on this number is dependent on filer memory and is shown in Limits on CIFS Open Files Sessions and Shares SDWK T...

Page 215: ...e current code page It is displayed in the share list in Network Neighborhood on the client If the description contains spaces you must enclose it in single quotation marks JURXSQDPH The name of the group you want all files in the share to get the group membership of Q The maximum number of users that you specify can con nect to the share at the same time The limit on this number is dependent on f...

Page 216: ...ou want by typing its UNC name for example FILERNAME in the Domain field then clicking OK Result A Server Manager window for the filer appears 4 Double click the name of a filer Result The Filer Properties window appears 5 Click the Shares button Result Information about each share on the filer appears 8VLQJ WKH FLIV 6KDUHV RPPDQG WR 9LHZ QIRUPDWLRQ ERXW 6KDUHV To display information about a share...

Page 217: ... D 6KDUH RZ WR HOHWH D 6KDUH To delete shares do either of the following From the Windows NT desktop use Server Manager as described Using Server Manager to Delete a Share From the filer use the cifs shares command as described in Using the cifs Shares Command to Delete Shares 8VLQJ 6HUYHU 0DQDJHU WR HOHWH D 6KDUH To delete a share from Server Manager follow these steps 1 Open Server Manager by ch...

Page 218: ... a Share with the cifs Shares Command FLIV VKDUHV GHOHWH OLEUDU UHDWLQJ D RPH 6KDUH IRU DFK 8VHU KHQ WR UHDWH D RPH LUHFWRU You can create a share that contains home directories of registered CIFS users For example if there are users called user1 and user2 the share contains directories for user1 and user2 When user1 connects to the filer and asks for its list of shares the display shows a share c...

Page 219: ...ectory option by entering the following command RSWLRQV FLIV KRPHBGLU KRPHGLUSDWK Where homedirpath is the UNIX path name that will be mapped to the share CIFS HOMEDIR This share automatically contains CIFS user home directories If the directory containing the home directories is vol vol1 homes enter the fol lowing command RSWLRQV FLIV KRPHBGLU YRO YRO KRPHV 2 Within the directory specified by the...

Page 220: ...Q 8 7 1 GPLQLVWUDWRUV XOO RQWURO 20 YRO YRO KRPH HIDXOW 6KDUH HYHU RQH XOO RQWURO 6 20 5 YRO YRO KRPHV RPH LUHFWRULHV HYHU RQH XOO RQWURO 5HVXOW Users in the engineering group can read all home directories in HOMES on the root volume which corresponds to the share defined by the options cifs home_dir command However they can only write to their own home directories which reside in the CIFS HOMEDIR...

Page 221: ...xample FILERNAME in the Domain field then clicking OK Result A Server Manager window for the filer appears 4 In the Server Manager window click Computer Shared Directories then click the Properties button Result The Share Properties window appears 5 Click Permissions Result The Access Through Share Permissions window appears 6 To add a new user or group click Add Result The Add Users and Groups wi...

Page 222: ...m mand line To change the permissions run the command with the new permissions RPPDQG V QWD The cifs access command has the following syntax FLIV DFFHVV VKDUH J XVHU_JURXS ULJKWV The g flag specifies that the access rights are defined for a group rights can be UNIX style permissions or Windows NT style rights UNIX style permissions are defined as r w and x which mean read write and delete and exec...

Page 223: ...HWKRGV You can display access rights to an NTFS file from Windows LVSOD LQJ FFHVV 5LJKWV URP WKH LQGRZV HVNWRS To display access rights to a file from the Windows desktop follow these steps 1 Right click a file and choose Properties from the pop up menu Result The Properties sheet appears 2 Click the Security tab Result If the file is a Windows file the Security sheet appears 3 Click Permissions R...

Page 224: ...s 3 Choose Properties from the pop up menu The Properties dialog box appears 4 Click the SecureShare tab SecureShare Access appears KDQJLQJ WKH 3HUPLVVLRQV RI D 6LQJOH WHP If you select only one item SecureShare Access appears 87 21 6HFXUH6KDUH FFHVV KDV QR XQGR IHDWXUH 8VH LW YHU FDUHIXOO TWUHH 6HFXULW 6W OH IIHFWV The security style of the qtree from which you select an item has the following ef...

Page 225: ...ectory where one item differs from the rest of the items you selected appear with a light gray background Permissions or DOS attributes that you set apply to all items you selected Turning one of the check boxes gray preserves the permissions on any of the selected items 6HQGLQJ D 0HVVDJH WR OO 8VHUV RQ D LOHU KHQ WR 6HQG D 0HVVDJH You might want to send a message to all users on a filer to tell t...

Page 226: ...filer using the Windows Event Viewer as described in Viewing Events in a Security Log K 8VH YHQW XGLWLQJ You use event auditing to troubleshoot access problems to check for suspicious activ ity on a system or to investigate a security breach If someone who should have access to a file cannot get access examining the event can provide a clue to resolving the problem If a file has been changed in a ...

Page 227: ...s always SECURITY because this is a security log Object Type The type of object being accessed Object name The name such as a file name of the object being accessed New Handle ID The new handle identifier of the open object Operation ID A unique identifier associating multiple events result ing from a single operation Process ID The identifier of the client process accessing the object Primary Use...

Page 228: ...user could not access a file For example an unsuccessful file access occurs when a user tries to access a file but does not have permission to access it The display shows the ID of the user who tried to access the file and an indication that the access attempt was unsuccessful RVW 5HFRUG YHQW HWDLO LVSOD If the system could not create an audit record the Lost record event detail display gives a re...

Page 229: ...ng Events in a Security Log to view the security log QDEOLQJ 6 FFHVV RJJLQJ HVFULSWLRQ Use this procedure to enable CIFS access logging You follow this procedure when you want to start logging file access events by a specified user on a particular file After you complete this procedure the filer is ready to process access logging information 6WHS To enable CIFS access logging enter the following c...

Page 230: ... active log center the following command at the command line RSWLRQV FLIV DFFHVVBORJJLQJ ILOHQDPH SDWKBQDPH path_name is the path name in UNIX format of the file to which you want the system to write access logging information 6HWWLQJ D 6 VWHP RQ D LOH HVFULSWLRQ Use this procedure to set a system ACL SACL on a file You must complete this pro cedure to monitor access activity on a file You complet...

Page 231: ...ain appears in the Names list box 6 To add a name type one or more user names in the Add Names list box or select one or more names and click Add 7 Specify one or more names in one of these ways Click one or more names in the Names list box Type valid user or group names in the Add Names list box 8 Click Add in the window where you selected the names Result The names are added to the Add Names fie...

Page 232: ...wer by selecting the following menu items Programs Admin istrative Tools and then Event Viewer Result The event viewer appears 2 From the Log menu of the Event Viewer choose Open Result An Open window appears 3 Choose the share that contains the log you want to look at Result A list of files appears 4 Click the log file you want to examine An Open File Type window appears 5 If Security is not sele...

Page 233: ...n that has write cached data can lose that data under the following set of circumstances It has an exclusive oplock on the file It is told to either break that oplock or close the file During the process of flushing the write cache the network or target system generates an error UURU DQGOLQJ QG ULWH RPSOHWLRQ The cache itself does not have any error handling the applications do When the applicatio...

Page 234: ...dividual clients Turning CIFS oplocks On at the filer does not override any client specific settings Turning CIFS oplocks Off at the filer disables all oplocks to or from the filer RU GGLWLRQDO QIRUPDWLRQ For additional information about oplocks consult the Microsoft Knowledge Base at http www microsoft com kb LVSOD LQJ 6 6WDWLVWLFV RZ DQG K WR LVSOD 6 6WDWLVWLFV You use the cifs stat command to d...

Page 235: ...ay information about a specific connected user LVSOD LQJ QIRUPDWLRQ LWK WKH FLIV VHVVLRQV RPPDQG The cifs sessions command syntax is as follows FLIV VHVVLRQV XVHUQDPH LVSOD LQJ QIRUPDWLRQ ERXW OO RQQHFWHG 8VHUV To display information about all connected users use the following command syntax FLIV VHVVLRQV 7DEOH FLIV VWDW RPPDQG 2XWSXW LHOGV LHOG HVFULSWLRQ GetAttr Attribute operations Read Read da...

Page 236: ...ecify the user name in the com mand for example FLIV VHVVLRQV JKRSSHU users VKDUHV ILOHV RSHQHG 20 JKRSSHU 1 86 56 5HDG GHQ 233 5 65 352 20021 773 KWWSGBIDVW F 3 JKRSSHU 1 86 56 LVSOD LQJ RQQHFWHG 8VHU 6HFXULW QIRUPDWLRQ To display security information for each connected user use cifs sessions with the s option After the first two lines detailed information for each connected user is displayed The...

Page 237: ...fs shares command to display share infor mation as described in Using the cifs Terminate Command LVFRQQHFWLQJ 8VHUV LWK 6HUYHU 0DQDJHU To stop CIFS sessions with Server Manager follow these steps 1 Open Server Manager by choosing it from the Start menu 2 From the Server Manager Computer menu choose Select Domain Result The Select Domain window opens 3 In the Select Domain window select the filer y...

Page 238: ...clients and the time delay in minutes before the CIFS sessions are terminated as shown in the following command syntax FLIV WHUPLQDWH FOLHQW W WLPH Table 7 8 describes the variables 7KH FLIV WHUPLQDWH RPPDQG 1RW 3HUVLVWHQW The cifs terminate command disables CIFS sessions only between the time you enter the command and the next reboot After each reboot if your filer is licensed and configured to r...

Page 239: ... WKH FLIV WHUPLQDWH RPPDQG Here are some examples of the cifs terminate command 7HUPLQDWLQJ 6 6HUYLFH IRU OO 8VHUV RQ WKH LOHU To terminate CIFS service for all users on the filer after 10 minutes enter the follow ing command FLIV WHUPLQDWH W The cifs terminate command displays an alert message on CIFS clients that warns them of the pending shutdown of CIFS service NOTE Windows 9x and Windows for ...

Page 240: ...QJ 5HFRQILJXULQJ WKH LOHU IRU 6 KHQ WR 5HFRQILJXUH D LOHU IRU 6 You can reconfigure the filer for CIFS service at any time for example if you want to change the authentication method from PDC Primary Domain Controller to UNIX password database RZ WR 5HFRQILJXUH D LOHU IRU 6 To reconfigure a filer for CIFS follow these steps 1 Enter the cifs terminate command to stop CIFS service 2 Enter the cifs s...

Page 241: ...EOH RQ 2 Use the following command syntax to specify the root directory that contains the files and directories to be read by HTTP clients RSWLRQV KWWSG URRWGLU GLUHFWRU For example if the root directory is vol vol0 home users pages enter the follow ing command RSWLRQV KWWSG URRWGLU YRO YRO KRPH XVHUV SDJHV 3 If you want to limit the size of the etc log httpd log log file to other than the default...

Page 242: ...e HTTP root directory which is vol vol0 home users pages assuming that the HTML root directory is vol vol0 home users pages 2 Start a Web browser on a client and specify the URL of the HTML file in the browser For example if your filer is filer and the root directory for HTTP is vol vol0 home users pages enter this URL KWWS ILOHU P ILOH KWPO The path component of the URL is a path name relative to...

Page 243: ...lias for the directory that appears instead of the direc tory name in the browser s password dialog box when a user tries to access the directory Whatever follows AuthName is the name of the realm The name of the realm can contain spaces The syntax of the AuthName directive is as follows XWK1DPH UHDOP QDPH 7KH 5HTXLUH 8VHU LUHFWLYH Specifies the users who can access the directory The syntax of the...

Page 244: ...ire user bob Limit GET Directory The Limit GET and Limit GET directives which might have been imported from an Apache or NCA Web server are not supported To be used on a filer the file does not need to be edited to remove the Limit GET directive the filer ignores the directive and all other directives not mentioned in this chapter The following sample procedure restricts user access to a particula...

Page 245: ...ption to the ifconfig com mand Following are examples of the command To mark the e0 interface as untrusted enter the following command ifconfig e0 untrusted To mark the e0 interface as trusted enter the following command ifconfig e0 trusted 8VLQJ 9LUWXDO RVWLQJ ERXW 9LUWXDO RVWLQJ Virtual hosting enables a filer to respond to requests directed to more than one IP address through a single physical ...

Page 246: ...resses in this example 192 225 37 102 the destination IP address is used to select the virtual host root directory from the etc httpd hostprefixes file 0DSSLQJ 9LUWXDO RVW GGUHVVHV To map virtual host addresses to the virtual host interface use the ifconfig com mand as follows Add a new IP virtual host address mapping with the following command ifconfig vh alias address where address is an IP addr...

Page 247: ...d mimetypes sample file name is not displayed in its entirety By default the Explorer displays the file name as etc httpd mimetypes If you are using Windows from the Explorer View menu select Options then the View tab and in the dialog box make sure that there is no check mark in the check box next to Hide MS DOS file extensions for file types that are registered 0RGLI LQJ 0 0 RQWHQW 7 SH 0DSSLQJV...

Page 248: ...file contains up to three fields in the following format as shown in Table 8 2 UXOH WHPSODWH UHVXOW 7UDQVODWLRQ 5XOHV 6XSSRUWHG E WKH LOHU This section explains the meanings of the rules It also describes the format required for each type of entry in etc httpd translations 7KH 0DS 5XOH The map rule specifies that if a component of a URL matches the template the request is mapped to another directo...

Page 249: ... bin as is even though there is another rule specified as follows PDS LPDJH ELQ XVU ORFDO KWWS LPDJHV If the pass rule includes the result field the filer accepts the request processes the request by using the URL defined in the result field and disregards other rules 7KH DLO 5XOH The fail rule specifies that if a component of a URL matches the template the filer denies access to that component an...

Page 250: ...he wildcard character to displayfares and displaydates and redirects the requests to the host named cgi host To the client the results of these requests are the same as the results of the following requests KWWS FJL KRVW FJL ELQ GLVSOD IDUHV KWWS FJL KRVW FJL ELQ GLVSOD GDWHV LVSOD LQJ 773 RQQHFWLRQ QIRUPDWLRQ QIRUPDWLRQ LQ WKH HWF ORJ KWWSG ORJ LOH You can read the etc log httpd log file if you a...

Page 251: ...tatistics accumulated since the last reboot or since the last time the z argument was used The z argument resets both the gets and badcalls counters The t argument displays statistics since the last filer reboot You can specify the interval in seconds at which the filer displays the statistics Fol lowing is an example of httpstat httpstat HTTPD statistics gets badcalls open conn peak conn 451 11 5...

Page 252: ...8 12 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...

Page 253: ...p the data to tape However it is not necessary if you are backing up an existing snapshot Because a snapshot is a read only copy of the file system it does not change even when files in the active file system are changing As a result dump can make a safe and consistent backup without requiring you to take the filer off line 6QDSVKRWV 8VH LWWOH LVN 6SDFH The filer uses a copy on write technique to ...

Page 254: ... find any differences between them To make sure that the two files have different inode numbers before the comparison copy one of the files to another name RZ 6QDSVKRWV RUN When the filer creates a snapshot it doesn t copy disk blocks instead it identifies all blocks in the file system as belonging to the snapshot as well as to the active file system DPSOH Consider a particular file named foo in a...

Page 255: ...uickly If a large percentage of data changes every day there might not be room to keep snapshots for even a few hours To accommodate the needs of different users create multiple volumes on the filer In this way you can apply different snapshot schedules to different volumes In summary when the filer creates a snapshot it doesn t use any disk space but as files in the active file system are changed...

Page 256: ...his command is available through SNMP using the Dell custom MIB as described in Using SNMP in Chapter 4 Lists all available snapshots snap create volume_name snapshot_name Creates a snapshot with a spec ified name snap delete volume_name snapshot_name Deletes a specified snapshot snap rename volume_name from to Renames a snapshot snap reserve volume_name Reserves a percentage of the disk space for...

Page 257: ...day of the week that weekly snapshots occur no nightly snapshot is created Nightly snapshots are called nightly n where n is an integer nightly 0 is the most recent nightly snapshot and nightly 1 is the next most recent nightly snapshot When the filer creates a nightly snapshot the value of n is adjusted for all nightly snapshots The higher the value of n the older the snapshot Hourly The filer cr...

Page 258: ...8 12 17 20 If the argument is omitted the filer creates an hourly snapshot The default snapshot schedule is snap sched volume_name 0 2 6 8 12 16 20 DPSOH RI VQDS VFKHG RPPDQG Following is an example of the snap sched command snap sched volume_name 2 6 8 8 12 16 20 6QDSVKRWV UHDWHG E 7KLV 6FKHGXOH The following list describes the snapshots created by the example weekly snapshots and keeps the two m...

Page 259: ... 00 weekly 1 5HVXOW This schedule keeps the eight most recent hourly snapshots created at 8 a m noon 4 p m and 8 p m every day the six most recent daily snapshots and the two most recent weekly snapshots Whenever the filer creates a new snapshot of a particular type it deletes the oldest one and renames the existing ones On the hour for exam ple the filer deletes hourly 7 renames hourly 0 to hourl...

Page 260: ...XPSWLRQ E 0XOWLSOH GHQWLFDO 6QDSVKRWV Suppose a snapshot contains a 1 MB file that hasn t changed since the filer created the snapshot If that file is removed from the active file system the snapshot then consumes 1 MB of disk space The same version of that 1 MB file might be referenced by several snapshots hourly 0 hourly 1 and hourly 2 If these snapshots all contain the 1 MB file that hasn t cha...

Page 261: ... snapshots 6QDSVKRWV 8VH HOHWHG FWLYH LOH LVN 6SDFH If the filer created a snapshot when the disks were full removing files from the active file system wouldn t create any free space because everything in the active file sys tem would also be referenced by the newly created snapshot The filer would have to delete the snapshot before it could create any new files The following example shows how dis...

Page 262: ... snapshot data This is 2 5 GB more than the space reserved for snapshots Because the active file system cannot use that space the space shows up as used by the active file system even though no files are there 5HFRYHULQJ LVN 6SDFH IRU LOH 6 VWHP 8VH Whenever snapshots consume more than 100 of the snapshot reserve the system is in danger of becoming full In this case you can create files only after...

Page 263: ...mand to adjust the schedule of snapshot creation Following are some suggested strategies for scheduling and retaining snapshots If users rarely lose files or typically notice lost files right away use the default snapshot schedule For example this is the schedule that creates a snapshot every day and keeps two snap sched home 0 2 6 8 12 16 20 If users commonly lose files and need to restore them D...

Page 264: ...volume for a while check how much disk space the snapshots consume in the volume LVSOD LQJ 6QDSVKRW 6WDWLVWLFV The snap list command shows the amount of disk space used by snapshots in a specified volume This command enables you to see how much disk space each snap shot uses and helps you determine an appropriate snapshot reserve RPPDQG 2XWSXW Following is an example of the command output If you d...

Page 265: ...ots is only 10 so the default snapshot reserve of 20 seems to be a waste of disk space Assuming that this pattern of change holds up a reserve of 12 to 15 provides a safe margin to ensure that removing files frees disk space when the active file system is full The values in parentheses that is the values that show the space used by an individ ual snapshot are useful in identifying a particular sna...

Page 266: ...ple snap reserve vol0 25 With no arguments the snap reserve command displays the percentage of disk space reserved for snapshots in each volume NOTE Snapshots can exceed the snapshot reserve space GMXVWLQJ LVN 6SDFH 8VHG E 6QDSVKRWV This section describes how to use the snap list output to determine which snap shot file to delete to free the most disk space In the sample snap list output in Displa...

Page 267: ... 20 MB out of 100 MB However this time they reference different data blocks Cumu latively they consume 40 MB which is about 33 of the disk space used 120 MB which is 40 MB used by snapshots plus 80 MB in the file system Before trying to conserve space by deleting a large snapshot file examine the cumu lative values in the snap list output If two adjacent snapshot files show little difference in th...

Page 268: ...UH RI 1 6 OLHQW FFHVV WR 6QDSVKRWV SODQDWLRQ In this example the client can obtain access to snapshots by way of n filer snap shot This might seem to contradict the explanation of snapshot access in the preceding section because it shows a snapshot directory only at the mount point instead of in every directory in the tree Actually the snapshot directory in the mount point is real to make the pwd ...

Page 269: ...rate a list much longer than expected 6 OLHQW FFHVV WR 6QDSVKRWV To CIFS clients the snapshot directory appears only at the root of a share For exam ple if a user s home directory is a share named bill that corresponds to the vol vol0 home bill directory only the vol vol0 home bill snapshot directory is visible When this user displays the contents of the home directory the snapshot directory is di...

Page 270: ...nnot modify or remove these older versions because everything beneath snapshot is read only URP D 6 OLHQW Use the Find command to search for the file in the snapshot directory For example if a user maps the home share to drive F and wants to find all versions offoo in snap shots the user can use the Find command to search for foo in the f snapshot folder HWHUPLQLQJ FFHVV 7LPHV When the filer creat...

Page 271: ...s as described in Chapter 11 Quotas and Maximum Number of Files 9ROXPHV DQG TWUHHV A volume has all the properties of a qtree except It can have qtrees under it It has different defaults than a qtree Unless expressly mentioned otherwise whatever applies to qtrees also applies to volumes NOTE You cannot create a qtree inside another qtree 8VHV RI TWUHHV You use qtrees to group files that have simil...

Page 272: ...es and applications while yet another project can use both Windows and UNIX files Set oplocks if the project uses Windows as appropriate to the project without affecting other projects For example if one project uses a database that requires no oplocks you can turn oplocks Off on that project s qtree If another project uses oplocks it can be in another qtree that has oplocks set to On Limit the di...

Page 273: ...0 2 TWUHH 6HFXULW 6W OHV LQ HWDLO Table 10 3 describes the security styles in detail and the effects of changing to each style 7DEOH TWUHH DQG 9ROXPH HIDXOWV 3DUDPHWHU TWUHH GHIDXOW 9ROXPH GHIDXOW oplocks On On security The style of the volume s root directory UNIX 7DEOH TWUHH 6HFXULW 6W OHV 6W OH HKDYLRU NTFS Exactly like Windows NT NTFS Files and directories have Windows NT file level permission...

Page 274: ...e ated before the change UNIX User access depends on the protocol as follows CIFS requests Windows users are mapped to a UNIX UID and UNIX permis sions determine access In a UNIX qtree a user cannot set Win dows NT permissions A Windows user can change UNIX permissions from Win dows using SecureShare Access as described in Sending a Message to All Users on a Filer in Chapter 7 NFS requests Only th...

Page 275: ...X UID and GID PC style permissions are determined by the rights assigned in a share s Access Control List ACL and are limited by the UNIX permissions assigned to a file PC security is like FAT File Allocation Table file system security with per file permissions If the owner of a file or directory accesses an item the owner permissions are checked to see whether they allow access If someone other t...

Page 276: ...e root volume unless you specify another volume Name pathname Security style that of the root directory of the volume Oplocks settings On UHDWLQJ D TWUHH LQ WKH 5RRW 9ROXPH If pathname does not begin with a slash the qtree is created in the root volume For example qtree create news creates the qtree vol vol0 news where vol vol0 is the default name for the root vol ume For information about volumes...

Page 277: ...athname mixed ntfs unix DPSOH LWK D TWUHH To change the security model of vol users docs to be the same as Windows NT use qtree security vol users docs ntfs DPSOH LWK D 9ROXPH To change the security model of the root directory of the users volume to mixed so that outside of a qtree in the volume one file can have NTFS security and another UNIX security use TWUHH VHFXULW YRO XVHUV PL HG NOTE When y...

Page 278: ...ee oplocks vol users docs enable DPSOH LWK 9ROXPH To disable oplocks in the entire users volume if oplocks are enabled and the cifs oplocks enable option is set to On enter the following command qtree oplocks vol users disable This disables only files and directories that were not in a qtree when oplocks were enabled IIHFW RI WKH FLIV RSORFNV HQDEOH 2SWLRQ Setting the cifs oplocks enable option ha...

Page 279: ...Sesame is a qtree in the Bagels volume Its security style and oplocks setting happen to be the same as that of its parent volume bagels Bran is a qtree in the muffin volume Its security style is different from that of its parent volume muffin Files in bran have UNIX style permissions files in muffin but not in bran have NTFS style permissions 7DEOH TWUHH RPPDQG LVSOD LHOG RQWHQWV Volume The volume...

Page 280: ...10 10 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...

Page 281: ...otas create a quotas file in the etc directory NOTE Keep a record of your quotas file in a safe place and update it as you change it in case you must do a restore without having access to the root volume Following is a sample quotas file Quota Target type disk files vol home user joe user 500M 10K 21 group 750M 75K vol eng proj1 tree 750M 75K writers group vol eng proj1 300M 50K user 50M 10K NOTE ...

Page 282: ...a user s home directory for a user quota 4XRWD 7DUJHW IRU D URXS 4XRWD You specify a group with one of the following targets a file or subdirectory whose GID matches the group the group s name the group s GID The methods are equivalent A file or directory is used only as the source of a GID there are no quota implications for that file or directory The GID of the group must not be 0 4XRWD 7DUJHW I...

Page 283: ...lar to a disk partition but you can increase or decrease the size of a tree quota at any time LVN LHOG Specifies the maximum amount of disk space that the quota target can use In this field K is equivalent to 1 024 bytes M means 2 20 bytes and G means 2 30 bytes If you omit the K M or G the default is K If you want to track the disk usage but do not want to impose a disk usage limit on the quota t...

Page 284: ...B of disk space and 10 240 files in the rls volume The group publications can use 750 MB of disk space with no restrictions on the number of files in the root volume The group that owns vol home eng can use 750 MB of disk space and 76 800 files in the cad volume The qtree proj1 in the cad volume can use 750 MB of disk space and 76 800 files The writers group can use 150 MB of disk space and an unl...

Page 285: ... resize quotas on a per volume basis display information about all active quotas or about quotas that apply to a speci fied path Some of the information from quota commands is available through SNMP using the Dell custom MIB For more information about the MIB refer to About the Dell Custom MIB in Chapter 4 QDEOLQJ RU LVDEOLQJ 4XRWDV The quota on off command enables or disables quotas for all volum...

Page 286: ...ze new entry on line n in etc quotas where n is a line number The quota resize command does not ignore newly added quota targets in the following situation If a default quota applies to the creator of a file an active quota record is created for the owner of the file If a newly added quota target is the user or group that has an active quota record the quota resize command does not ignore the newl...

Page 287: ...tion about the user or group as if the user or group had an entry in the quotas file In this case the Quota Specifier column in the quota report is blank With a path argument quota report displays information about all quotas that apply to the specified file UHDWLQJ D 8VHU 4XRWD Follow these steps to limit disk space used by a user named jdoe 1 Decide who should be limited by a disk quota In this ...

Page 288: ...ou can also use the GID of the group or the name of the group If you want the restrictions to apply to a vol ume other than the root volume for example the home volume enter the following line YRO KRPH JURXS VHUYLFH JURXS YRO KRPH 0 Substitute the values you want for 700M and 100K 3 Use the quota on command If quotas are already on for the home volume enter the following commands TXRWD RII KRPH TX...

Page 289: ...ng exceeded 0HVVDJHV LVSOD HG RQ 1 6 OLHQWV If a write from an NFS client to a filer causes a quota to be exceeded the user experi ence depends on the operating system version and the application If a UNIX client mounts a filer without the noquota option the login program on the client checks to see whether the user has reached the disk quota and file quota each time the user tries to log in to th...

Page 290: ...lue Unlike UNIX which requires that you specify the maximum number of files in a file system when you create the file system the filer enables you to use the maxfiles command to increase the number of files for each volume at any time NOTE Use caution when increasing the maximum number of files because after you increase this number you can never reduce it As new files are created the file system ...

Page 291: ...hich df does not count as part of the file system space 8VLQJ WKH GI RPPDQG LWK TWUHHV When you enter a df command with a path name on a client the command returns the amount of free space in the file system containing the path name For example if the filer is mounted on the client as t filer the df command on the client displays the disk information about the t filer file system as follows df t f...

Page 292: ...inistrator and Command Reference Guide In this way the filer takes the qtrees into consideration when responding to adf command from a client and returns the amount of free space in each qtree as opposed to the space available in the entire file system ...

Page 293: ...corrupts or deletes files that cannot be recovered from snapshots You can store the backup tapes at an off site archive to protect the data against natural disasters After you reinstall the file system on the filer for example for migrating to larger disks or for converting a single volume filer to a multivolume filer you can restore data from tape LIIHUHQW 0HWKRGV IRU DFNLQJ 8S WKH LOHU The filer...

Page 294: ...before initiating the backup The dump command names each snapshot it creates snapshot_for_backup n The n at the end of the snapshot name is an integer starting at 0 Each time the dump com mand creates a snapshot it increments the integer by 1 The filer resets the integer to 0 when it is rebooted The dump command automatically deletes the snapshot after it successfully finishes the backup When the ...

Page 295: ...tion When the dump command traverses the dump path it compares file and directory names to each exclude string specified in the dump command If the name exactly matches the string the file is excluded from the backup NOTE You can reduce the amount of backup data by using an exclude list in the dump command However an exclude list increases the amount of time needed to finish a dump command because...

Page 296: ...revious level are written to the backup media KHUH WR QWHU WKH XPS RPPDQG You can enter the dump command through the console or through rsh HQHILWV RI QWHULQJ WKH GXPS RPPDQG 7KURXJK UVK Entering the dump command through rsh gives you these benefits When the dump command is in progress you can still use the console to man age the filer If the dump command entered on the console is backing up a lar...

Page 297: ...he accuracy of the restore operation when the backup data is restored The dump command writes files and directories to tape by inode numbers LYH 3DVVHV RI WKH GXPS RPPDQG The dump command consists of five passes After you enter the dump command the filer displays messages showing which pass is in progress In passes 1 and 2 the filer traverses directories to search for files to be backed up The fil...

Page 298: ...e You can back up a dump path to one tape file on a tape multiple tape files on a tape or multiple tape files on multiple tapes In the dump command you can specify the maximum size of the tape file in terms of tape blocks For example if you want the maximum tape file to be 2 GB specify 2 097 151 That is the largest tape file can contain 2 097 151 tape blocks which are 1 kilobyte each 87 21 I WKH E...

Page 299: ...pes in tape stackers When you use these tape files thedump command unloads the tape when it reaches the end of tape and then the tape stacker reloads another tape The name of an unload reload tape file begins with a u for example urst0a An unload reload tape file cannot be a norewind tape file For example do not specify unrst0a NOTE If the tape stacker is attached to a remote host the dump command...

Page 300: ... documentation for your client system for interpreting the output because the output is written in different units for example 512 byte units or 1 024 units depending on the operating system I WKH LOHU V 6KDUHG E D 6 OLHQW Follow these steps to determine the amount of backup data from a CIFS client 1 On the CIFS client point to the shared file or directory that you want to back up 2 Right click to...

Page 301: ...u are using for the backup 2 Determine the amount of data that needs to be backed up 3 Determine the amount of space that will be left unused on a tape For example if the dump command specifies several tape files the command automatically writes to the next tape file even though there is space left in the current tape Example The following dump command starts the second tape file on rst1a after wr...

Page 302: ...ou specify in the dump command does not exceed the maximum blocking fac tor supported by the remote host If you use a blocking factor greater than 63 you must know the maximum block ing factor supported by the system that you plan to use for restoring the data If the maximum blocking factor is 63 on the system for restoring data that system cannot restore data from a tape file created with a block...

Page 303: ...restore you must restore from all incremental backups to restore the most recent data Having all the incremental backups in the same tape minimizes tape management during the restore process ULWH RZQ 4WUHH QIRUPDWLRQ HIRUH DFNLQJ 8S TWUHHV Record the information about qtrees if your backup contains qtrees This is because when you restore data from tape the filer does not automatically re create th...

Page 304: ...s longer because it must compare each file name to the strings in the exclude list to determine whether it should back up the file 5HFRPPHQGDWLRQV IRU 0LQLPL LQJ RZQWLPH XULQJ DWD 5HFRYHU The method used for restoring data has a greater effect on downtime than does the dump command However it helps to keep the data in the dump path to 100 GB or less because a full restore is more efficient than a ...

Page 305: ...same order as you list the options The dump level must be the first option You can type other options in any order path is the complete path name of the file or directory to be backed up by the dump command Always precede the volume name by vol even though the volume is a root volume This is because between different levels of backups you might have changed the root volume NOTE Some options do not...

Page 306: ...It takes a number as an argument which is the number of 1 KB blocks in each write If you use a local tape drive for backup the number should be from 4 to 64 If you use a remote tape device for backup the number must be from 4 to 256 The dump command generates an error message if you specify a number that is out of range for your tape drive The default argument is 63 B It takes a number as an argum...

Page 307: ...e future X It takes a string as argument You can specify a comma separated list of strings If the name of a file in the dump path matches one of the strings the dump command excludes that file from the backup Each string for the X option applies to files at every direc tory under the dump path The following list describes the rules for specifying the strings To exclude a file the name of the file ...

Page 308: ...command in the appropriate format using the examples that fol low as a guide DPSOHV RI HYHO DFNXSV WR D RFDO 7DSH LOH The following list provides examples of level 0 backups to a local tape file dump 0f rst0a vol vol1 users tom specs The command performs a full backup of the vol vol1 users tom specs directory After the dump command is finished the filer rewinds the tape dump 0uf rst0a vol vol1 use...

Page 309: ...file to the same tape drive on urst0a If the command needs to write the third tape file it prompts you to load a new tape NOTE In this example if you know in advance that the backup requires two tape files use rst0a as the second tape file name in the dump command so that the command automatically rewinds the tape after it is finished DPSOH RI DFNLQJ 8S D LUHFWRU URP D 6QDSVKRW dump 0f rst0a vol v...

Page 310: ... the epoch DUMP Dumping vol vol0 home to nrst0a DUMP mapping Pass I regular files DUMP Reading file names from standard input user1 user3 user5 DPSOH RI DFNLQJ 8S DWD LWKRXW V dump 0uAf rst0a vol vol1 The command performs a level 0 backup of the vol vol1 volume The A option means that the backup does not include any Windows NT ACL information Use this option if the files in the volume are for NFS ...

Page 311: ... tape stacker filer1 which contains 3 volumes filer2 which contains 2 volumes filer3 which contains 2 volumes The schedule uses the following assumptions The level 0 backup takes 10 hours The tape stacker is attached to filer1 and the tape stacker contains two tape drives Root on each filer has the permission to write to filer1 According to this schedule the filers perform the following types of b...

Page 312: ...mp 1uf filer1 nrst1a vol vol6 filer2 dump 2uf filer1 urst1a vol vol4 Monday filer1 dump 0uf urst0a urst0a urst0a vol vol2 filer3 dump 1uf filer1 nrst1a vol vol7 filer2 dump 2uf filer1 urst1a vol vol5 Tuesday filer1 dump 0uf urst0a urst0a urst0a vol vol3 filer1 dump 1uf nrst1a vol vol1 filer3 dump 2uf filer1 urst1a vol vol6 Wednesday filer2 dump 0uf filer1 urst0a urst0a urst0a vol vol4 filer1 dump ...

Page 313: ...The filer performs a level 1 backup and a level 2 backup for each volume every week The filer does not rewind the tape for each level 1 backup so that the subsequent level 2 backup can be written immediately after the level 1 backup on the tape Thursday filer2 dump 0uf filer1 urst0a urst0a urst0a vol vol5 filer1 dump 1uf nrst1a vol vol3 filer1 dump 2uf urst1a vol vol1 Friday filer3 dump 0uf filer1...

Page 314: ...l2 dump 1uf nrst1a vol vol7 dump 2uf urst1a vol vol5 Tuesday dump 0uf urst0a urst0a urst0a vol vol3 dump 1uf nrst1a vol vol1 dump 2uf urst1a vol vol6 Wednesday dump 0uf urst0a urst0a urst0a vol vol4 dump 1uf nrst1a vol vol2 dump 2uf urst1a vol vol7 Thursday dump 0uf urst0a urst0a urst0a vol vol5 dump 1uf nrst1a vol vol3 dump 2uf urst1a vol vol1 Friday dump 0uf urst0a urst0a urst0a vol vol6 dump 1u...

Page 315: ...ut of storage space you can do the following tasks Back up the entire filer Replace the current disks with disks of greater capacity Set up volumes on new disks Restore the filer from tapes 7KH QWLUH LOHU V DPDJHG DQG 8QXVDEOH If the entire filer is damaged and unusable call Dell technical support to determine whether you can repair the filer If you can repair the filer but some files are deleted ...

Page 316: ...re FRPPDQG RLQJ VR UHVXOWV LQ GDWD ORVV KDW DWD DQQRW H 5HFRYHUHG The restore command cannot recover data that was backed up by commands issued on other systems For example do not try to use the filer s restore com mand to recover a tape file created by the Solaris ufsdump command 81 OH 3HUPLVVLRQV DQG LQGRZV 17 V A file recovered by the restore command has the same UNIX file permissions and Windo...

Page 317: ...s for the restore command 7DEOH UHVWRUH RPPDQG XQFWLRQ H V H 0HDQLQJ r Rebuilds the file system or subtree If you are applying incrementals this must be the only option specified R After the restore command is interrupted this function key restarts data recovery from the last tape file used successfully by the command t Lists all the file names on a tape If you specify a path name only the files i...

Page 318: ... home directory when the filer con tained a single volume and you want to restore home to vol engineering home specify vol engineering home as the target path name in the restore command Otherwise the home backup is restored to the home directory of the root volume s number Specifies the number of the file if multiple tape files exist on a tape File numbering starts at 1 v Specifies that restore t...

Page 319: ...ates if it runs out of space If you want to perform a full restore the additional space should be in the directory that is the root of the backup If you want to restore only some data in a backup the additional space should be in the etc tmp direc tory of the volume where data is to be restored The restore command does not restore qtree information Before you restore a volume containing qtrees cre...

Page 320: ...ep 3 until the restore is complete 3HUIRUPLQJ D XOO 5HVWRUH RI D 9ROXPH RQWDLQLQJ TWUHHV HVFULSWLRQ The restore command does not restore qtree information For example if you need to restore a volume or a part of a volume that contains qtrees you must first create the qtrees into which data is to be restored 6WHSV Follow these steps to fully restore a volume containing qtrees 1 Obtain the record of...

Page 321: ...and if the subtree is backed up to only one tape UHVWRUH UI UVW D YRO YRO KRPH You do not have to specify the D option and vol vol0 home if the destination directory for the restore is the same as the directory that was backed up This command restores the backup in rst0a to the vol vol0 home directory using the same block size as when the subtree was backed up to the tape If the backup of the subt...

Page 322: ...m the following steps to restore the entire volume In this example the files are restored from a local tape drive 1 If you are not restoring qtrees go to Step 4 If you want to restore qtrees go to Step 2 2 Create directories on the filer using the qtree command that is used as the top of the subtrees to be restored Examples TWUHH HWF TWUHH KRPH 3 Set the security for each qtree created in Step 2 4...

Page 323: ...J 7ZR 7DSH ULYHV The following command restores the volume to the vol vol0 myexample directory from two tapes that are in different tape drives restore rfD rst0a vol vol0 myexample When the restore command prompts you for the next tape drive enter the name of the tape drive for example rst1a 5HVWRULQJ D 9ROXPH WR D LUHFWRU URP 0XOWLSOH 7DSHV 8VLQJ 2QH 7DSH ULYH If the two tapes use the same tape d...

Page 324: ... Specify next volume 2 Mount tape volume 2 Enter none if there are no more tapes otherwise enter tape name default rst0a rst1a You have read volumes 2 Specify next volume 1 Mount tape volume 1 Enter none if there are no more tapes otherwise enter tape name default rst1a rst0a After prompting for the tape devices the filer also displays the following question set owner mode for yn y To keep the ori...

Page 325: ...es Replace the r function key with the R function key to indicate that you want to restart the restore command Use the appropriate tape file name for the f function key The tape file should be the one used by the original restore command when it was interrupted DPSOH In this example the following restore command was entered on the filer console for performing a full restore from three tape files i...

Page 326: ...ape drive must allow access from the other system That is the host or filer from which a dump or ufsdump or restore or ufsrestore com mand is issued must be listed in the following configuration files The etc hosts equiv file on the filer with the tape drive Alternatively you can specify both the host and user in etc hosts equiv The filer etc hosts equiv file contains entries in this format hostna...

Page 327: ...ttached to the filer Positioning tapes RZ WKH LOHU LVSOD V QIRUPDWLRQ ERXW 9DULRXV 7DSH ULYHV QWURGXFWLRQ This section describes how the filer displays tape drive information about different types of tape drives You need the tape information for planning your backup This section does not describe how to display information about tape drives on remote hosts The filer can only display information ab...

Page 328: ... 1RQTXDOLILHG 7DSH HYLFHV To display information about nonqualified tape devices perform the following steps 1 If the filer has accessed the tape drive through the dump or mt command go to Step 3 Otherwise go to Step 2 2 Enter the following command to access the tape device PW I GHYLFH VWDWXV 3 Enter the following command V VFRQILJ W 6WHSV IRU LVSOD LQJ QIRUPDWLRQ ERXW 7DSH 6WDFNHUV To display inf...

Page 329: ...mat is 85937 bpi 50 GB w comp nrst0h no rewind device format is 85937 bpi 50 GB w comp urst0h unload reload device format is 85937 bpi 50 GB w comp rst0a rewind device format is 85937 bpi 70 GB w comp nrst0a no rewind device format is 85937 bpi 70 GB w comp urst0a unload reload device format is 85937 bpi 70 GB w comp DPSOHV 2I WKH V VFRQILJ W RPPDQG IRU D 1RQTXDOLILHG 7DSH ULYH The following examp...

Page 330: ...ws mt f t tapedevice command count This section discusses only the eom fsf rewind offline and status com mands Keep in mind the following information The f and t options are interchangeable as far as the filer is concerned Only the f option is shown here For additional information about controlling tape devices and detailed information about the mt command consult the mt 1 man page For information...

Page 331: ...le mt f nrst0a rewind 7DNLQJ D 7DSH ULYH 2II LQH To rewind the tape and if appropriate take the tape drive off line by unloading the tape use the offline command as in the following example mt f nrst0a offline LVSOD LQJ 6WDWXV QIRUPDWLRQ To display status information about the tape unit use the status command as in the following example mt f nrst0a status Tape drive Quantum DLT7000 Status ready wr...

Page 332: ...14 6 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...

Page 333: ... QWURGXFWLRQ WR WKH LOHU V RPPDQGV IRU RS LQJ 9ROXPHV 3XUSRVHV RI WKH YRO FRS RPPDQG 6HW The vol copy command set enables you to copy one volume to another The com mands in this command set control copying both data in the active file system and data in snapshots from one volume to another The source and destination volumes of the copy can reside on the same filer or on different filers For more i...

Page 334: ...QV 6LWXDWLRQ 5HDVRQV IRU FRS LQJ RQH YROXPH WR DQRWKHU You want to copy data from one filer to another regularly to ensure high data availability After you copy the data clients can switch to the destination filer in the following scenarios When you shut down the source filer for soft ware or hardware upgrades If a network client process accidentally deletes a large number of files on the source f...

Page 335: ...e must not contain data that you want to preserve The source and destination filers must have a trusting relationship with each other The localhost interface must be specified as a trusted host if data is copied on the same filer 9HULI LQJ WKH 6WDWXV RI DFK 9ROXPH The destination volume must exist before you enter the vol copy start com mand to start copying a volume If the volume does not exist t...

Page 336: ...napshot of the destination volume is lost after the filer starts copying the data 9HULI LQJ WKH 5HODWLRQVKLS HWZHHQ LOHUV If the source and destination volumes in a volume copy operation reside on two filers the filers must have a trusting relationship with each other That is you must specify each filer as a trusted host in the etc hosts equiv file of the other filer The etc hosts equiv file conta...

Page 337: ... namednightly 1 at midnight the filer does not copy the nightly 1 snapshot 6SHFLI LQJ WKH 9ROXPHV QYROYHG LQ WKH RS The source and destination arguments are the names of the volumes If a volume is on a different filer precede the volume name with the filer name and a colon For examples illustrating how to specify volume names see Examples of the vol copy start Command 7DEOH RPPDQG 6 QWD IRU RS LQJ...

Page 338: ...owing list One operation is for reading data from the source volume Screen messages dis played by a vol copy command refer to this operation as the volcopy dump operation One operation is for writing data to the destination volume Screen messages displayed by a vol copy command refer to this operation as the volcopy restore operation The filer assigns a volume copy operation number to each operati...

Page 339: ...wo vol copy start commands on a filer to copy volumes locally vol copy start vol0 vol1 vol copy start vol2 vol3 When these commands are in progress you cannot enter additional vol copy start commands because four volume copy operations are already running on the filer Two of the operations are for reading the vol0 and vol2 volumes and two of the operations are for writing the vol1 and vol3 volumes...

Page 340: ...l ume copy operations vol copy status operation_number 7DEOH YRO FRS VWDUW RPPDQG UURU 0HVVDJHV UURU PHVVDJH 0HDQLQJ Permission denied VOLCOPY Could not connect to filer 127 0 0 1 The source filer does not have per mission to copy to the destination filer Action Make sure that the filers have a trusting relationship with each other If both the source volume and destination volume are on the same f...

Page 341: ... filer are different because the reading and the writing are consid ered two different operations DPSOH RI D YRO FRS VWDWXV RPPDQG The following example illustrates a vol copy start command that copies the vol0 volume to the vol1 volume on the same filer vol copy start S vol0 vol1 Copy Volume vol0 on machine 127 0 0 1 to Volume vol1 Reading the dump stream VOLCOPY Starting on volume 1 This dump co...

Page 342: ...eed of a volume copy operation in two ways Before you enter the vol copy start command use the following com mand syntax to set the default speed for all volume copy operations options vol copy throttle value The value variable specifies the speed which ranges from 10 full speed to 1 one tenth of full speed If a volume copy operation is in progress use the following command syntax to set the speed...

Page 343: ...displays the value 1 through 10 to be used by all volume copy operations The value of the vol copy throttle option was set at 10 at the factory DPSOH RI RQWUROOLQJ WKH 6SHHG RI RS LQJ D 9ROXPH The following example illustrates changing the speed of all volume copy operations in progress to one tenth of full speed through rsh rsh filer vol copy throttle 1 volcopy operation 0 Throttle adjusted from ...

Page 344: ...15 12 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...

Page 345: ...a volume if you are in any of the situations described in When to Copy Volumes Because SnapMirror offers additional advantages there are other situations where you want to replicate a volume as described in Table 16 1 7DEOH 5HSOLFDWLQJ D 9ROXPH 6LWXDWLRQ 6LWXDWLRQ RZ GDWD UHSOLFDWLRQ KHOSV Remote access to data Users who need read access to a volume are distributed over a large geographical area Y...

Page 346: ...ans the source filer does not have to allocate resources for performing backups Data migration You want to migrate data from one filer to another without interrupting net work service After replicating the source filer you can export or share the source filer with read only permissions so that net work clients cannot make additional changes to the source filer Because the source and destination fi...

Page 347: ... the vol copy command Refer to Volume Copy Operations in Chapter 18 for the meaning of a volume copy operation KDW DSSHQV IWHU RX 5HSOLFDWH D 9ROXPH After you replicate a volume the active file system and all snapshots in the source vol ume are available on the mirror As with any volume you can export the mirror for NFS mounting or add a share corresponding to this volume for CIFS sharing SnapMirr...

Page 348: ...ribes the snapshots that are created on the source vol ume and copied to the mirror In this example data is replicated from vol vol1of filerA to vol vol2 of filerB To create a baseline version of a mirror filerA creates a snapshot file named vol vol1 filerB_vol2 1 on filerA All snapshots in vol vol1 of filerA including vol vol1 filerB_vol2 1 are transferred to vol vol2 of filerB For example the sn...

Page 349: ... example illustrating what happens if you inadvertently delete a snapshot required for data replication In this example data is replicated from vol vol1 of filerA to vol vol2 of filerB Suppose you use the snap delete command on filerA to delete the filerB_vol2 2 snap shot When filerB tried to update the mirror according to the schedule in the snapmirror conf file it could not find the snapshot to ...

Page 350: ...to a Regular Volume for information about changing the status of a mirror RZ 6QDS0LUURU RUNV LWK WKH XPS RPPDQG RZ WR DFN 8S DWD LQ WKH 0LUURU If you want to back up data from a mirror the data must be in an existing snapshot not the active file system on the mirror This is because before the dump command writes data from an active file system to tape the filer must create a snapshot in the volume...

Page 351: ...VQDSPLUURU DOORZ LOH The etc snapmirror allow file on the source filer specifies the host names of filers that are allowed to replicate data from the source filer The filer is not shipped with a default etc snapmirror allow file You must use a text editor to create the file if you want to use SnapMirror KHQ RX DQ 0RGLI WKH VQDSPLUURU DOORZ LOH You can modify the etc snapmirror allow file at any ti...

Page 352: ...which data is replicated source_vol is the source volume name For example for the vol1 volume type vol1 Do not type the full path name vol vol1 destination_filer is the host name of the filer to which data is replicated destination_vol is the destination volume mirror name For example for the vol1 volume type vol1 Do not type the full path name vol vol1 argument is kbs kilobytes per second the max...

Page 353: ... 11 45 a m 12 45 p m 1 45 p m 2 45 p m 3 45 p m and 4 45 p m Monday through Friday The asterisk in this example means that the mirror update schedule is not affected by the day of month KHQ KDQJHV WR VQDSPLUURU FRQI 7DNH IIHFW If SnapMirror is enabled the changes take effect within two minutes If SnapMirror is disabled the changes take effect immediately after you enter the vol snapmirror on comma...

Page 354: ...ferent for the two volumes Refer to Adding Disks to a Volume in Chapter 3 for information about how to add disks to a volume The mirror must not be the root volume 5HVWULFWLRQV Each filer supports up to four simultaneous volume copy operations For information about volume copy operations refer to Number of Volume Copy Operations Snap Mirror Generates DXWLRQV SnapMirror creates snapshots in the sou...

Page 355: ...ich the mirror resides contains a copy of the etc quotas file from the source filer Whenever you make a change to the etc quotas file on the source filer make the same change to the copy of the etc quotas file on the destination filer 6WHSV Follow these steps to replicate a volume 1 Add the host name of the destination filer to the etc snapmirror allow file on the source filer 2 Edit the etc snapm...

Page 356: ...e that data replication is no longer necessary You can disable the feature at any time even when replication is underway The mirror remains unchanged after you disable replication 6WHSV Follow these steps to disable volume replication for the entire filer 1 Enter the vol snapmirror off command on the destination filer to disable SnapMirror Result If the filer is currently transferring data from on...

Page 357: ...red status to the volume because you cannot set the snapmirrored volume option to On If the mirror never lost the snapmirrored status but you took the mirror off line you must put it back on line 6WHS To resume data replication for the entire filer enter the vol snapmirror on com mand on the destination filer to enable SnapMirror Result The filer reads the etc snapmirror conf file to determine whe...

Page 358: ...cheduled update data replication starts up again 1 Enter the vol copy status command to display the operation numbers of the volume copy Result Because SnapMirror uses the vol copy command to transfer data the vol copy status command displays all volume copy operations including the one for replicating a volume 2 Enter the vol copy abort command to terminate the volume copy operation Result The fi...

Page 359: ...e filer has just begun transferring data from the vol0 volume to the vol1 volume on filerA Source Dest Status filerA vol0 filerA vol1 Transferring The following display shows that the filer finished transferring 26 of the data from the vol0 volume to the vol1 volume on filerA Source Dest Status filerA vol0 filerA vol1 Transferring 26 complete RQYHUWLQJ D 0LUURU WR D 5HJXODU 9ROXPH HVFULSWLRQ If yo...

Page 360: ...you can apply the entries to the destination volume when the source filer becomes unavailable 6WHSV Follow these steps to convert a mirror to a regular volume 1 If you want to enable quotas after converting the mirror to a regular volume go to Step 2 Otherwise go to Step 4 2 Edit the etc quotas file on the destination filer so that after the conversion the former mirror has the same quota restrict...

Page 361: ...nly volume It does not copy incremental changes from the source volume It periodically copies incremental changes from the source volume It requires that you enter the destina tion filer name in the etc hosts equiv file It requires that you enter the destina tion filer name in the etc snapmirror allow file It does not involve a configuration file that controls how a volume is copied It requires th...

Page 362: ...16 18 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...

Page 363: ...ysconfig command displays information about the filer s hardware configura tion The exact types of information displayed depend on the command options LVSOD LQJ LVN QIRUPDWLRQ 8VLQJ V VFRQILJ G The sysconfig d command displays product information about each disk in the filer LVSOD LQJ 5 QIRUPDWLRQ 8VLQJ V VFRQILJ U The sysconfig r command displays RAID configuration information about the parity di...

Page 364: ... You can specify a slot number to display information about a particular slot Slot numbers start at 0 where slot 0 is the system board LVSOD LQJ 2YHUDOO LOHU QIRUPDWLRQ 8VLQJ V VFRQILJ If you enter sysconfig without any options information similar to what you get with sysconfig v is displayed but the information is abbreviated When you report a problem to Dell provide the information displayed bys...

Page 365: ...whether you should install more NVRAM system memory or disks Depending on the applications that access the filer the computers on the network and the network configuration the following suggested actions might improve your filer s performance The data in the Cache age column indicates how fast read operations are cycling through system memory If the values in the Cache age column are consistently ...

Page 366: ...options show the state of all network inter faces or one specific interface respectively The netstat r command shows the filer s routing table For information about troubleshooting network problems see Network Problems in chapter 18 For more information about the netstat command see the netstat 1 man page LVSOD LQJ QWHUIDFH 6WDWLVWLFV 8VH WKH LIVWDW RPPDQG The ifstat command prints per interface s...

Page 367: ...erface Bytes Number of bytes received on the interface Errors Number of errors during Ethernet frame reception including all kinds of receive errors No buffers Number of received packets dropped due to the unavail ability of buffers Length err Number of frames truncated due to the shortage of receive descriptors Runt frames Number of runt frames Long frames Number of frames received that exceeded ...

Page 368: ...Number of times the queue was full List full Number of frames that were dropped due to the unavail ability of descriptors No carrier Number of times the carrier signal was not present dur ing transmission Underflow Number of times the transmitter terminated the mes sage because data arrived late from memory Defer Number of times transmission had to be deferred Time out Number of times the transmit...

Page 369: ...es the Ethernet device interrupted the host Resets Number of times the Ethernet device was reset 7DEOH LIVWDW RPPDQG RQ WKHUQHW QWHUIDFH 1 1 2 6WDWLVWLF 0HDQLQJ Auto Auto Negotiation state Mediatype Media type such as twisted pair Link Partner The Auto Negotiation capability of the remote end It is unknown if Auto Negotiation is disabled Link State Link status 7DEOH LIVWDW RPPDQG RQ WKHUQHW QWHUID...

Page 370: ...ommodates approxi mately 300 000 files with short file names The wafl maxdirsize option takes the maximum number of kilobytes as its argument When you reset the maximum directory size the argument that you supply 7DEOH LIVWDW RPPDQG RQ WKHUQHW QWHUIDFH 75 160 7 6WDWLVWLF 0HDQLQJ Packets Number of packets attempted to be transmitted Bytes Number of bytes attempted to be transmitted Errors Number of...

Page 371: ...urning this option On if your filer has extremely high read traffic for example on a news server used by an Internet provider because it prevents inode updates from contending with reads from other files 87 21 I RX DUH QRW VXUH ZKHWKHU RXU ILOHU VKRXOG PDLQWDLQ DQ DFFX UDWH DFFHVV WLPH RQ LQRGHV OHDYH WKLV RSWLRQ DW LWV GHIDXOW 2II VR WKDW WKH DFFHVV WLPH LV XSGDWHG PSURYLQJ 3HUIRUPDQFH RQ LUHFWRU...

Page 372: ...17 10 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...

Page 373: ...er still responds to the command any diagnostic messages that were reported diagnostic messages are in the etc messages file on the root volume For additional information you may need see Getting Help in your Installation and Troubleshooting Guide RZ WR RQWDFW HOO For numbers that you can use to contact Dell technical support see Getting Help in your Installation and Troubleshooting Guide RRWLQJ U...

Page 374: ...iskette and insert the diskette labeled System Boot Disk 2 into the filer s diskette drive 4 Press the Enter key on your console Result The filer boots and if it can displays the following boot menu 1RUPDO RRW RRW ZLWKRXW HWF UF KDQJH 3DVVZRUG QLWLDOL H DOO GLVNV 0DLQWHQDQFH PRGH ERRW 6HOHFWLRQ 5 Choose one of the boot types shown below by entering the corresponding number Normal Boot 1 Use Normal...

Page 375: ... is Then Showing the mon prompt Enter b for boot to reboot the filer Showing the ok prompt Enter boot to reboot the filer Unresponsive Reset the filer by turning it off leaving it off for 30 seconds and turning it back on Results The filer boots and displays the system prompt on the console 3 If the filer still does not boot display the boot menu from diskette as described in Booting From System B...

Page 376: ...entire RAID array The parity check and any correction is performed on line that is the filer conducts the test in the background while continuing otherwise normal operation This kind of data error can happen only when you boot a system after a failure or after you turn off a filer without using the halt command 9ROXPH 3UREOHPV 7 SHV RI 9ROXPH 3UREOHPV HVFULEHG This section describes the following ...

Page 377: ...re _tech_pubs SW_Engineering Dept_32 UURU 0HVVDJHV ERXW 9ROXPH 1DPHV You might get an error message that contains one of the following phrases invalid volume name unrecognized volume name illegal volume name If you get one of these messages take one of the following actions Type correctly the name of an existing volume Type a valid volume name LVN 3UREOHPV 7 SHV RI LVN 3UREOHPV HVFULEHG The next t...

Page 378: ...re that you notice the failure the filer automatically shuts itself off in 24 hours by default or in a period you set with the raid timeout option to the options command You can restart the filer without fixing the disk but it continues to shut itself off periodically until you repair the problem 87 21 KHFN WKH etc messages ILOH RQ WKH URRW YROXPH RQFH D GD IRU LPSRUWDQW PHVVDJHV RX FDQ DXWRPDWH F...

Page 379: ...lable contact Dell technical support as described in Getting Technical Assistance 5HODWHG QIRUPDWLRQ In addition to disk failure and hot spare disk replacement activity the etc messages file on the root volume logs any failure in a periodic check of the hot spare disk For more information refer to the sysconfig 1 and messages 5 man pages LVN UURUV 7 SHV RI LVN UURUV HVFULEHG The filer displays err...

Page 380: ...oblem 1 Display the boot menu from diskette as described in Booting From System Boot Diskette then choose Maintenance mode boot 2 Use the vol offline command to take the volume off line 3 Reboot the filer the volume specified in Step 2 is off line 4 Add missing disks if possible then bring them on line otherwise follow these steps a Replace any broken disks b Destroy the old volume c Create a new ...

Page 381: ...ive type and firmware revision level KHFNLQJ FFHVV WR D LVN The disk_check command checks access to a particular disk issuing read requests to the disk The disk is active for approximately 15 seconds During this time you can watch the disk s activity LED to verify that the disk is accessed UDVLQJ D LVN DEHO The disk_erase_label command erases a disk label on the specified disk drive 87 21 8VH WKH ...

Page 382: ...acing the information shown in italics with values appropriate for your filer LIFRQILJ LI PHGLDW SH W SH 3BDGGUHVV QHWPDVN QHWPDVN H SRUWIV L R URRW DGPLQKRVWB 3BDGGU QIV RQ 3 Mount the root file system from the administration host 4 Edit the configuration files as described in Chapter 2 Filer Administration Basics LOHU 5XQV 6HWXS KHQ HWF UF V DPDJHG RU 0LVVLQJ If the etc rc file on the root volum...

Page 383: ... DGPLQKRVWB 3BDGGU QIV RQ 4 Mount the root file system from the administration host 5 Edit the configuration files 6 Remove the system boot diskette from the disk drive and reboot the filer to test the new configuration files NOTE Although you can correct network problems using various keyboard commands correct the etc rc file on the root volume so that it initializes the system correctly if there...

Page 384: ...ell technical support advises you that the only way to recover from an error is to initialize all disks 87 21 QLWLDOL LQJ DOO GLVNV FDXVHV DOO H LVWLQJ GDWD WR EH ORVW 3URFHGXUH IRU QLWLDOL LQJ OO LVNV Complete the following steps to initialize all disks 1 If the console is Then Displaying the filer prompt for example filer Place the system boot diskette into the diskette drive of the filer and en...

Page 385: ... network connections on both ends of the connection Bad transceivers or network hubs can sometimes introduce errors into the network Collisions reported by netstat are a concern only if the filer detects a substan tial percentage of collisions as compared to the total packet throughput NOTE The goal is to keep collisions below 5 percent but a network can operate properly but slowly with collision ...

Page 386: ...to get a license contact Dell technical support as described in Getting Technical Assistance 2 Make sure that the filer can correctly look up the client host name 3 Make sure that NFS service has been turned On using the nfs on command 4 Make sure that the filer and the client are using correct IP addresses and names 5 Sometimes a client can see the filer but gets a Permission Denied message when ...

Page 387: ...if a message with protocols other than CIFS appears but CIFS is absent you must get a license for CIFS NOTE For information about how to get a license contact Dell technical support as described in Getting Technical Assistance 2 If you are authenticating through a Windows NT domain make sure that the filer has an account in the domain NOTE You can verify that the filer is registered with a domain ...

Page 388: ... ity V WKH 3 RU RQ WKH VDPH VXEQHW DV WKH ILOHU DQG LV WKH VXEQHW FRQQHFWHG WR WKH ILUVW FRQILJXUHG QHWZRUN LQWHUIDFH FDUG RQ WKH ILOHU HV 1R V WKHUH D FRPSXWHU DFFRXQW FUHDWHG IRU WKH ILOHU LQ WKH LQGRZV 17 GRPDLQ Put the domain controller on the same subnet as the filer and con nect the subnet to the first configured network interface card on the filer Without a WINS server the filer can talk on...

Page 389: ... that still use a 16 bit inode UH XVHUV LQ WKH VDPH GRPDLQ DV WKH ILOHU HV 1R UH RX XVLQJ D YLUWXDO 1 V WKHUH D WUXVW UHODWLRQVKLS EHWZHHQ WKH ILOHU DQG WKH GRPDLQ HV 1R HV 1R Have the users log in with DOMAIN NAME USERNAME Enter the users into the etc passwd file Have the users log in with DOMAIN NAME USERNAME Establish a trust relationship between the user s account domain and the filer s domain...

Page 390: ...d the problem by requiring that the files have the same UID GID mode mod time inumber and device before concluding that they are the same file 81 GI 3UREOHPV 7KH GI 9HUVLRQ 0XVW 6XSSRUW DUJH LOH 6 VWHPV Some UNIX versions of the df command have file system limits considerably smaller than the file system size supported by the filer This can cause the UNIXdf command to show an incorrect and useless...

Page 391: ...roblem such as a problem with the hardware or a bug in the system software it issues a system panic message similar to the following one PANIC system hung NS0 Volume volname Version verno Table 18 5 shows panic message components KDW WR R IWHU D 3DQLF 0HVVDJH Complete the following steps when your system issues a panic message 1 Write down the panic message 2 Call Dell technical support immediatel...

Page 392: ...18 20 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...

Page 393: ...conventions apply to default values listed None means that there is no default value If the default is On the other possible value is Off If the default is Off the other possible value is On The values for On and Off are not case sensitive If you do not supply a parameter in the options command the command prints the current values of all available options XWRVXSSRUW 2SWLRQV KDW WKH XWRVXSSRUW 2SW...

Page 394: ...ne and should describe the reason for the notification 7KH DXWRVXSSRUW HQDEOH 2SWLRQ HIDXOW On HVFULSWLRQ Enables the autosupport daemon which sends automatic email messages to report the status of the filer 7KH DXWRVXSSRUW IURP 2SWLRQ HIDXOW autosupport HVFULSWLRQ Specifies the sender of the automatic email message 7KH DXWRVXSSRUW PDLOKRVW 2SWLRQ HIDXOW administration_host HVFULSWLRQ Specifies th...

Page 395: ...QV R The CIFS options control CIFS features on the filer 7KH FLIV DFFHVVBORJJLQJBHQDEOH 2SWLRQ HIDXOW Off HVFULSWLRQ When On enables the filer to process access logging or auditing information The default is Off 7KH FLIV DFFHVVBORJJLQJ ILOHQDPH 2SWLRQ HIDXOW None HVFULSWLRQ Specifies the active event log file The file must be in an existing directory in a net work share 7KH FLIV E SDVVBWUDYHUVHBFK...

Page 396: ...d the user has the UNIX user ID and the group ID of the guest account For more infor mation see Enabling Guest and Generic Access in Chapter 7 7KH FLIV KRPHBGLU 2SWLRQ HIDXOW None HVFULSWLRQ Specifies the complete path name of the homes directory The directories under this path should have the names of users as their names When a CIFS user connects to the filer and there is a directory name that e...

Page 397: ... should disable this option only if there are problems with databases and to isolate problems 7KH FLIV SHUPBFKHFNBXVHBJLG 2SWLRQ HIDXOW On HVFULSWLRQ This option affects security checking for Windows clients of files with UNIX security where the requestor is not the file owner In all cases Windows client requests are checked against the share level ACL If the requestor is the owner the User permis...

Page 398: ... searched in order If no list is supplied all domains are searched You use this option to limit searches if you used an asterisk for a domain name in the usermap cfg file 7KH FLIV VKRZBVQDSVKRW 2SWLRQ HIDXOW FALSE HVFULSWLRQ Specifies whether to show the snapshot directories in folders To show the snap shot directories set this option to TRUE 7KH FLIV V POLQNV F FOHJXDUG 2SWLRQ HIDXOW On HVFULSWLR...

Page 399: ...as a path relative to the parent directory of the symbolic link and absolute symbolic links links to paths beginning with and treated as a path relative to the root of the file system For more information about this option refer to Managing Symbolic Links for CIFS Access in Chapter 5 16 2SWLRQV KDW WKH 16 2SWLRQV R The DNS options control how the filer works with DNS For more information about DNS...

Page 400: ...ministration 7KH KWWSG DGPLQ HQDEOH 2SWLRQ HIDXOW On HVFULSWLRQ Enables HTTP access to the filer s on line Help files and other files used by FilerView 7KH KWWSG HQDEOH 2SWLRQ HIDXOW Off HVFULSWLRQ Enables the HTTP server 7KH KWWSG ORJ PD BILOHBVL H 2SWLRQ HIDXOW 2147483647 2 GB 1 byte HVFULSWLRQ Specifies the number of bytes etc log httpd log the HTTP log file can grow to The maximum value is 500...

Page 401: ...n you set this option to On the filer drops an HTTP connection one minute after the client closes it When you set this option to Off the connection is not dropped and resources are consumed until the connection times out 1 6 2SWLRQV KDW WKH 1 6 2SWLRQ RHV The NFS option enables and controls NFS services For more information about NFS see Chapter 6 NFS Administration 7KH QIV PRXQWBURRWRQO 2SWLRQ HI...

Page 402: ...Q HIDXOW Off HVFULSWLRQ Limits to 2 GB the response the filer gives to requests from NFS v2 clients regarding total space free space or available space This option is necessary for some NFS cli ents to calculate the amount of free space accurately Without this option a file system with more than 2 GB of free disk space might appear to be full to the client that initiates the file system statistics...

Page 403: ...ecifies a relative path lookups for files are done with respect to this directory 7KH QIV ZHEQIV URRWGLU VHW 2SWLRQ HIDXOW FALSE HVFULSWLRQ When set to TRUE sets the directory specified in the nfs webnfs rootdir option to be the WebNFS root or public directory 1 6 2SWLRQV KDW WKH 1 6 2SWLRQV R The NIS options control how the filer works with NIS For more information about NIS see Chapter 4 Network...

Page 404: ...WKH 5 2SWLRQV R The RAID options control how the filer uses RAID For more information about RAID on the filer see Chapter 3 Disk and File System Management 7KH UDLG UHFRQVWUXFWBVSHHG 2SWLRQ HIDXOW 4 HVFULSWLRQ Specifies the speed of RAID reconstruction The speed ranges from 1 slowest to 10 fastest The filer uses the number to determine the percentage of CPU time used for RAID reconstruction 7KH UD...

Page 405: ...hronize time with a time server For additional information about time synchroni zation and using the timed options see Filer System Time Synchronization and Synchronizing Filer System Time in Chapter 2 7KH WLPHG HQDEOH 2SWLRQ HIDXOW Off HVFULSWLRQ Determines whether a time daemon timed runs on the filer and synchronizes time with a time server 7KH WLPHG ORJ 2SWLRQ HIDXOW Off HVFULSWLRQ Determines ...

Page 406: ...30 minutes 7KH WLPHG SURWR 2SWLRQ HIDXOW ntp HVFULSWLRQ Selects whether to use the protocol used by the rdate command or SNTP The value can be one of the following rdate for the protocol used by the rdate command ntp for SNTP 7KH WLPHG VFKHG 2SWLRQ HIDXOW hourly HVFULSWLRQ Schedules when to synchronize the time with a time server The value can be one of the following hourly to synchronize hourly m...

Page 407: ... time servers is as follows sundial sundial dell com 10 152 8 12 You can get a list of NTP Network Time Protocol time servers which SNTP can use from http www eecis udel edu mills ntp servers htm YROXPH 2SWLRQV KDW WKH YROXPH 2SWLRQV R The volume options control volume level operations You use these options only with the vol options command For more information about volume options see The vol opt...

Page 408: ...es invisible the snapshot directory that s usually present at the client mount point or at the root of the CIFS share It also turns off access to the snapshot directory and all snapshot directories under the mount point or the root of the CIFS share After you toggle this option you might not notice the effect immediately because the information about the snapshot directories might still be in the ...

Page 409: ...o Off Change the value to Off if you want to convert a mirror to a regular volume After you make the change the volume is no longer read only and the filer stops making incremental changes to the volume for data replication NOTE You cannot set this option to On That is you cannot use this option to convert a regular volume to a mirror To use a volume as a mirror follow the instructions in Chapter ...

Page 410: ...HIDXOW On HVFULSWLRQ Enables or disables path MTU discovery which is currently used only by TCP When enabled the filer can discover and use the largest packet size that the filer can send to another host without fragmenting a packet This means that the filer doesn t have to limit itself to sending many small packets which takes more time and resources than sending fewer large packets 7DEOH FRQVROH...

Page 411: ...LRQ Enables the SNMP server on the filer 7KH WHOQHW HQDEOH 2SWLRQ HIDXOW On HVFULSWLRQ Enables the Telnet server on the filer 7KH WHOQHW KRVWV 2SWLRQ HIDXOW All hosts HVFULSWLRQ Specifies a list of hosts that can log in to the filer using telnet You can limit telnet access to up to five specified hosts The hosts should be listed in a comma separated list You can disable telnet for all hosts by spe...

Page 412: ...Access from CIFS causes conversion of pre 4 0 and 4 0 format directories Access from NFS causes conversion of 4 0 format directories 7KH ZDIO FUHDWHBXFRGH 2SWLRQ HIDXOW Off HVFULSWLRQ Setting this option to On forces Unicode format directories to be created by default both from NFS and CIFS By default all directories are created in pre 4 0 format and the first CIFS access converts a directory to U...

Page 413: ...or subdirectories 7KH ZDIO URRWBRQO BFKRZQ 2SWLRQ HIDXOW On HVFULSWLRQ Enables only the root user to change the owner of a file When you disable the option the owner of a file can change its ownership without being root By default this option is enabled When a non root user changes the owner of a file the set user id and set group id bits are cleared If a non root user tries to change the owner of...

Page 414: ...19 22 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...

Page 415: ...e A 1 3 3 1 RPPDQG 5HIHUHQFH This appendix provides the commands that you use to control a filer and are grouped in the following sections User Commands File Formats Headers Tasks and Macros System Services and Daemons ...

Page 416: ...A 2 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...

Page 417: ...Command Reference A 3 8VHU RPPDQGV This section contains user commands ...

Page 418: ... current ARP entries d Deletes an entry for the host called hostname s Creates an ARP entry for the host called hostname with the Ethernet address ether_address The Ethernet address is given as six hex bytes sepa rated by colons The entry will be permanent if the words following s includes the keyword temp Temporary entries that consist of a complete Internet address and a matching Ethernet addres...

Page 419: ... cifs restart Restarts CIFS if it has been shut down with cifs terminate cifs setup Configures CIFS service cifs sessions Displays current configuration and current connections cifs shares Displays modifies the CIFS exports cifs stat Displays operational statistics cifs terminate Shuts down CIFS or logs off a single station cifs testdc Tests the filer s connection to domain controllers SEE ALSO ci...

Page 420: ...or UNIX style NT style rights are No Access Read Change Full Control UNIX style rights are a combination of r for read w for write and x for execute If a share level ACL entry for user already exists on the specified share cifs access updates that ACL entry To display the current share level ACL of a share use Windows Server Manager or the cifs shares command OPTIONS g Specifies that user is the n...

Page 421: ...o the UNIX group wheel on the share sysadmins filer cifs access sysadmins g wheel Full Control The following example deletes the ACL entry for ENGINEERING mary on the share releases filer cifs access delete releases ENGINEERING mary SEE ALSO cifs_shares cifs access ...

Page 422: ... displays or changes the CIFS server description CIFS clients see the CIFS server description when browsing servers on the network If no command line arguments are given cifs comment displays the current CIFS server description If you enter a string for the newcomment parameter the current CIFS server description is changed to newcomment If newcomment contains spaces enclose it in double quotation...

Page 423: ... NT SID Security ID or a textual NT SID into its corresponding Windows NT user or group name EXAMPLES filer cifs lookup mday SID S 1 5 21 39724982 1647982808 1376457959 1221 filer cifs lookup NT DOMAIN mday SID S 1 5 21 39724982 1647982808 1376457959 1221 filer cifs lookup BUILTIN Administrators SID S 1 5 32 544 filer cifs lookup S 1 5 32 544 name BUILTIN Administrators filer cifs lookup nonexista...

Page 424: ...740N and 760N System Administrator and Command Reference Guide NAME cifs restart restart CIFS service SYNOPSIS cifs restart DESCRIPTION cifs restart restarts CIFS service if it has been terminated by cifs terminate cifs restart ...

Page 425: ...LEY PC hawleyr root 1 4 If you include the user argument the command displays information about the specified user along with the names and access level of files that user has opened If you use as the specified user the command lists all users Executing the command for user sam might produce output as follows cifs sessions sam users shares files opened HAWLEY HOME1 sam ENG USERS Read denyW SAM SRC...

Page 426: ...ystem Administrator and Command Reference Guide WIN 95 AGuest nobody guest UNIX uid 1208 user is a member of group nobody 65535 NT membership NT DOMAIN Domain Guests BUILTIN Guests User is also a member of Everyone Network Users cifs sessions ...

Page 427: ...ou enter this command You must run the cifs setup command from the console or from a telnet connection you can t enter the command through rsh FILES etc cifsconfig cfg general configuration information etc cifssec cfg NT domain machine account information etc filersid cfg local machine SID etc lclgroups cfg local NT group information etc usermap cfg multiprotocol user map file SEE ALSO cifs_access...

Page 428: ...PTION cifs shares displays one or more shares edits a specified share creates a share or deletes a share Listing shares To list all shares and their access control lists use the commandcifs shares with no arguments To list a single share and its access control list use the command cifs shares sharename where sharename name of the share filer cifs shares Name Mount Point Description HOME vol vol0 h...

Page 429: ...en brows ing the filer s shares If the description includes spaces it must be enclosed in double quotation marks If you do not specify a description the descrip tion is blank maxusers userlimit maximum number of simultaneous connections to the new share userlimit must be a positive integer If you do not specify a number the filer does not impose a limit on the number of connections to the share fo...

Page 430: ...e share For more information about the share description setting see the Creating new shares section above nocomment changes the description of the share to an empty string maxusers userlimit changes the user limit on the share For more information about the user limit setting see the Creating new shares section above nomaxusers removes the user limit on the share forcegroup groupname changes the ...

Page 431: ...IFS activity until interrupted The information is for the preceding interval seconds The header line is repeated in the display every 10 lines If you do not specify the interval the command displays counts and percentages of all CIFS operations EXAMPLE filer cifs stat 10 GetAttr Read Write Lock Open Cl Direct Other 175 142 3 70 115 642 50 0 0 0 0 0 18 0 0 8 0 0 3 8 0 0 10 0 0 0 0 0 0 6 0 0 1 0 0 0...

Page 432: ...ata Therefore it is very important to warn users before terminating CIFS service The t option described below can be used to warn users before terminating CIFS service If you run cifs terminate without the t option and the affected workstations have open files then you ll be prompted to enter the number of minutes that you d like to delay before terminating If you execute cifs terminate from rsh y...

Page 433: ...0 WINS Broadcast PURPLE 3 WINS Broadcast PURPLE 20 WINS Broadcast PURPLE 1 0 WINS Broadcast PURPLE 1 3 WINS Broadcast PURPLE 1 20 WINS Broadcast PURPLE 2 0 WINS Broadcast PURPLE 2 3 WINS Broadcast PURPLE 2 20 WINS Broadcast PURPLE 3 0 WINS Broadcast PURPLE 3 3 WINS Broadcast PURPLE 3 20 WINS Broadcast PURPLE 4 0 WINS Broadcast PURPLE 4 3 WINS Broadcast PURPLE 4 20 WINS Broadcast PURPLE 5 0 WINS Br...

Page 434: ...8 2 14 192 168 2 14 is alive trying 192 168 2 85 192 168 2 85 is alive found PDC NT DOMAIN BDC Testing all Domain Controllers found 4 addresses trying 192 168 2 14 192 168 2 14 is alive trying 192 168 2 85 192 168 2 85 is alive trying 198 95 227 75 198 95 227 75 is alive trying 192 168 2 14 192 168 2 14 is alive found DC NT DOMAIN BDC found DC FRENCH40 found DC NT DOMAIN BDC found DC FRENCH40 cifs...

Page 435: ...econds a number from 00 to 59 If the first 2 digits of the year are omitted they default to 19 if all 4 digits of the year are omitted they default to the current year If the month or day are omitted they default to the current month and day respectively If the seconds are omit ted they default to 0 Time changes for Daylight Saving and Standard time and for leap seconds and years are handled autom...

Page 436: ...ministrator and Command Reference Guide To set the current time to 21 00 and the current day to December 6th 1999 date 9912062100 To set the current time to 21 00 and the current day to December 6th 2002 date 200212062100 SEE ALSO rdate timezone date ...

Page 437: ... used by the active file system as well as by snapshots In this case it may appear that more blocks have been used in total than are actually present in the file system With the i option df displays statistics on the number of free inodes EXAMPLES The following example shows file system disk space usage filer df Filesystem kbytes used avail capacity Mounted on vol vol0 4339168 1777824 2561344 41 v...

Page 438: ...A 24 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide SEE ALSO maxfiles rc snap df ...

Page 439: ...se the disk swap command to stall I O activity After you removed or added the disk file system activity automatically continues If you should type the disk swap command accidentally or you choose not to swap a disk at this time use disk unswap to cancel the swap operation and continue service If you want to remove or add a fibre channel disk there is no need to enter the disk swap command Before y...

Page 440: ... disk remove disk_name removes the specified spare disk from the RAID configuration spinning the disk down when removal is complete You can usedisk remove to remove a spare disk so that it can be used by another filer as a replacement for a failed disk or to expand file system space disk scrub start starts a RAID scrubbing operation on all RAID groups The raid scrub enable option is ignored scrubb...

Page 441: ...is ST118202FC FD9E LOD The revision in the file name is the number against which the filer compares each disk s existing firmware revision In this example if the filer has disks with firmware revision F307 the file etc disk_fw ST118202FC FD9E LOD assuming it exists will be downloaded to all the disks when you execute this command To download the firmware to all disks enter disk_fw_update without a...

Page 442: ... an NFS client that has write access to the filer s root directory For more information about how to install files for the new release see the upgrade instructions that accompany each release After the filer reboots you can verify the version of the newly installed software with the version command FILES etc boot directory of Data ONTAP 5 3 executables etc boot netapp alpha symbolic link to curren...

Page 443: ...hot it automatically deletes the snapshot when it completes Another way to allow dump to work with remote tape devices that are limited to 2 GB of data per tape file is to dump to multiple tape files or volumes TheB option to dump specifies the maximum amount of data to be dumped to one vol ume when that much data has been written to one volume dump will start writing to another volume A list of t...

Page 444: ... order listed if the dump requires more volumes than the number of names given the last file name will used for all remaining volumes after prompting for media changes Use sysconfig t for a list of local tape devices See below for an exam ple of a dump to local tape For a dump to a tape device on a remote host host must support the standard UNIX rmt remote tape protocol By default dump writes to s...

Page 445: ...list If you use this option you must also use option n n Specifies the dumpname for a multi subtree dump Mandatory for multi subtree dumps Q Backs up all files and directories in qtree 0 of the specified volume Qtree 0 is a qtree that is not created by you with the qtree command In each volume the files and directories that do not belong to a qtree you create are considered to be in qtree 0 Follow...

Page 446: ... to the norewind device so that they and the next dump done after them will appear consecutively on the tape write the next file to the unload reload device This will cause the stacker to rewind and unload the tape after the file has been written and then load the next tape write the last file to the rewind device so that the tape will be rewound after the dump is complete To back up all files and...

Page 447: ...tape drive should be checked for dump planning If your filer file system exceeds the capacity of the local tape drive or the cli ent system dump restore or you choose to dump multiple file system trees to make the restore process with multiple tape drives parallel you must seg ment your dump to meet these restrictions One way to plan a dump schedule with a UNIX client system is to go to the root m...

Page 448: ... tape volume CIFS Data The Data ONTAP 5 3 dump command dumps the CIFS attributes and 8 3 name data for each file that is backed up This data willnot be backed up by a dump run on an NFS client machine This data will not be restored by a restore run on an NFS client machine This data will only be restored if a local restore is done of a backup created by the Data ONTAP 5 3 dump command dump ...

Page 449: ...xported o option Specifies a list of comma separated options that describe how a file or direc tory is exported You can specify the option in one of the following formats access hostname hostname Give mount access to each host listed Alternatively you can specify a net group instead of a host in the list The netgroup must be defined in the etc netgroup file Whether the hosts can mount pathname wit...

Page 450: ...orted ancestor in the same file system Data ONTAP 5 3 does not have this restriction For example you can export both the directory and the home directory In determining per missions the filer uses the longest matching prefix EXAMPLES In the following example all network clients can mount the home directory but only the adminhost can mount the directory exportfs o access adminhost root adminhost ho...

Page 451: ...lue of 1 indicates that no significant errors were found Any value less than 1 indicates there are prob lems in the Fibre Channel loop that are likely to interfere with the normal operation of your appliance There is a troubleshooting checklist for Fibre Channel problems in your System Administrator and Command Reference Guide that may help identify and correct the problem If the confidence factor...

Page 452: ... System Administrator and Command Reference Guide Crc number of CRC errors observed in the Fibre Channel frames Sync number of Fibre Channel synchronization errors F the total number of inbound and outbound frames seen by the adapter fctest ...

Page 453: ...mple 900 4H 7D would pro duce a breakdown with 4 categories files accessed in the last 15 minutes files accessed in the last four hours files accessed in the last week and all other files expr expression This lets you specify a boolean expression that will be evaluated for each inode encountered and if the expression is true then the inode will be selected and included in the various breakdowns of...

Page 454: ...s the breakdown of sizes as a comma separated set of size values The values are in bytes but as a convenience you can add a K M or G suffix to a number to get kilobytes megabytes and gigabytes For example 500K 2M 1G would produce a breakdown with 4 categories files less than 500K files less than 2 megabytes files less than 1 gigabyte and all other files To produce a breakdown that includes all uni...

Page 455: ...heir total size You can control the set of ages and sizes that get used for this breakdown with the ages and sizes arguments The output also contains a breakdown of file usage by user id and group id filestats snapshot hourly 1 volume vol0 NOTES Currently the expression evaluating code does not do any optimizations so although you can use arithmetic expressions it is most efficient if you do not O...

Page 456: ...u invoke halt with out t it displays the number of CIFS users and the number of open CIFS files Then it prompts you for the number of minutes to delay cifs terminate automat ically notifies all CIFS clients that a CIFS shut down is scheduled inmins minutes and asks them to close their open files CIFS files that are still open at the time the filer halts will lose writes that had been cached but no...

Page 457: ...d DESCRIPTION help prints a summary for each command in its argument list With no argu ments help prints a list of all available Data ONTAP 5 3 commands Full UNIX style man pages for all filer commands and files are available in the etc man directory FILES etc man directory of UNIX style manual pages help ...

Page 458: ...name name DESCRIPTION hostname prints the name of the current host The hostname can be set by sup plying an argument This is usually done in the initialization script etc rc which is run at boot time name must exist in the etc hosts data base FILES etc hosts host name data base etc rc system initialization command script SEE ALSO hosts rc hostname ...

Page 459: ...fied statistical information since the last reboot is given The output consists of the number of GET requests successfully processed gets rejected requests badcalls currently open HTTP connections open conn and the maximum number of simultaneous connections peak conn If the interval argument is specified httpstat will continuously display the sum mary information for all the statistics The first l...

Page 460: ... will be followed by a letter indi cating which of the network interfaces on that card it is The network interface name vh is used to specify IP virtual host addresses associated with the filer Only alias addresses using the alias option may be assigned to the vh interface The network interface name a is special and it does not take any optional param eters It displays the current configuration fo...

Page 461: ...al address and the subnet part which is taken from the host field of the address The mask can be specified as a single hexadecimal number with a leading 0x with a dot notation Inter net address or with a pseudo network name listed in the network table etc networks The mask contains 1 s for the bit positions in the 32 bit address that are to be used for the network and subnet parts and 0 s for the ...

Page 462: ... relative to firewall style security wins Specifies that the network interface is to be registered with Windows Inter net Name Services default Such registration is only performed when CIFS is running and at least one WINS server has been configured wins Specifies that the network interface is not to be registered with Windows Internet Name Services SEE ALSO hosts networks ifconfig ...

Page 463: ... z argument clears the statistics The a argument displays statistics for all network interfaces including the virtual host and the loopback address If you don t use the a argument specify the name of a network interface EXAMPLES The following command displays network statistics for an Ethernet interface named e7 ifstat e7 The following command displays network statistics for the loopback address i...

Page 464: ...purchased services so you need to enter the license command only after you purchase a new service or after you reinstall the file system To disable a license enter the code DISABLE All license codes are case insensitive Do not leave a space before or after the equal sign in the command The following list describes the services you can license Enter nfs to enable NFS Enter cifs to enable CIFS Enter...

Page 465: ...e console are multiplexed into the same session there would be no way for a logout command to tell which connection to drop To log out type control D Over telnet typing control D disconnects the session On the console typing control D returns the console to the password prompt If no password is set control D has no effect SEE ALSO passwd logout ...

Page 466: ...is specified maxfiles displays the current value of max for all volumes in the system If just the vol_name argument is given the current value of max for the specified volume is displayed Because each allowable file consumes disk space and because the value ofmax can never be reduced increasing max consumes disk space permanently If maxfiles identifies a new size as unreasonably large it will quer...

Page 467: ...filemark bsf Backward spaces over count filemarks Positions the tape on the beginning of tape side of the filemark fsr Forward spaces count records Positions the tape on the end of tape side of the record s bsr Backward spaces count records Positions the tape on the beginning of tape side of the record s erase Erases the tape beginning at the current tape position When the erase completes the tape...

Page 468: ... rewind tape device unit zero highest format density filer mt f nrst0a status Tape drive Exabyte 8505 8mm Status ready write enabled Format EXB 8500C w compression fileno 0 blockno 0 resid 0 To skip over a previously created dump file to append a dump onto a no rewind tape device use the fsf forward space file command filer mt f nrst0a fsf 1 SEE ALSO sysconfig tape mt ...

Page 469: ...orm continuously displays information regarding packet traffic on the interface that was configured first or with an interface specified using the I option packet traffic for that interface It will also display the sum of the cumula tive traffic information for all configured network interfaces The fifth form displays statistics about the protocol specified by protocol OPTIONS a Show the state of ...

Page 470: ...t s address spec ifies a network but no specific host address If known the host and network addresses are displayed symbolically according to the databases etc hosts and etc networks respectively If a symbolic name for an address is not known or if the n option is specified the address is printed numerically according to the address family Unspecified or wildcard addresses and ports appear as The ...

Page 471: ...ackets sent using that route The interface entry indicates the network interface utilized for the route When netstat is invoked with the w option and an interval argument it displays a running count of statistics related to network interfaces An obsolescent ver sion of this option used a numeric parameter with no option and is currently supported for backward compatibility This display consists of...

Page 472: ...AME nfs turn NFS service off and on SYNOPSIS nfs on off DESCRIPTION nfs turns NFS service off or on With no arguments nfs shows the current state of NFS service nfs is normally used in the initialization command script etc rc FILES etc rc system initialization command script SEE ALSO rc nfs ...

Page 473: ...ng the options command see options and invoking nfsstat with the h or the l options Per client statistics are collected for up to the first 256 NFS clients that have mounted the filesystem on the given filer OPTIONS h Displays per client statistics since last zeroed with the z option or since reboot if statistics have not been zeroed The statistics are displayed on a per client basis with the IP a...

Page 474: ...r the sum of badlen and xdrcall as defined below nullrecv The number of times an RPC call was not available when it was thought to be received badlen The number of RPC calls with a length shorter than a minimum sized RPC call xdrcall The number of RPC calls whose header could not be XDR decoded The server NFS display shows the number of NFS calls received calls and rejected badcalls and the counts...

Page 475: ...active event log file The file must be in an existing directory in a network share cifs bypass_traverse_checking When on the default directories in the path to a file are not required to have the X traverse permission This option does not apply in UNIX qtrees cifs guest_account Enables a user to get access to the filer provided that either the filer uses a Domain Controller for authentication and ...

Page 476: ...bility or latency particularly wide area networks In general this option should be disabled only to isolate problems cifs perm_check_use_gid This option affects security checking for Windows clients of files with UNIX security where the requestor is not the file owner In all cases Windows client requests are checked against the share level ACL then if the requestor is owner the user perms are used...

Page 477: ...list that is searched in order If no list is supplied all domains are searched You use this option to control searches if you used an asterisk for a domain name in the usermap cfg file cifs show_snapshot By default this option is FALSE The snapshot directory snapshot is no longer shown at the root of a share This is a change in behav ior from previous versions Setting this to TRUE will restore the...

Page 478: ...an 0x7F and SGML characters for input utf8 UTF 8 character sets For input any character greater than 0x7F is the beginning of a UTF 8 encoding The default is nfs dns domainname Sets the DNS domainname to the specified domainname dns enable Enables DNS client on the filer The DNS domain must be set and the etc resolv conf file must exist prior to enabling DNS ip path_mtu_discovery enable Enables di...

Page 479: ...on the wrong interface If you are concerned about security you should turn this off nfs mount_rootonly When enabled the mount server will deny the request if the client is not root user using privileged ports By default the feature is enabled for more secure access nfs per_client_stats enable Enables disables the collection and display of per client NFS statis tics as described in nfsstat nfs tcp ...

Page 480: ...abling NIS raid timeout Sets the time in hours as a number greater than or equal to 1 that the system will run after a single disk failure has caused the system to go into degraded mode The default is 24 If the raid timeout option is specified after the system is already in degraded mode the timeout is set to the value specified and the timeout restarted raid reconstruct_speed Specifies the speed ...

Page 481: ...rted by the time server The maximum skew is specified in seconds suffix s minutes suffix m or hours suffix h Defaults to 30m timed proto Specifies the protocol used to synchronize time rdate specifies the rdate sntp specifies the Simple Network Time Protocol timed sched Specifies the timed synchronization schedule There are several pre defined schedules hourly synchronize every hour the default mu...

Page 482: ...default_UNIX_user Specifies the UNIX user account to use when an NT user attempts to log in and that NT user would not otherwise be mapped If this option is set blank such accesses will be denied wafl maxdirsize Sets the maximum size in K Bytes that a directory can grow to This is set to 10240 by default it limits directory size to 10MBytes and can hold over 300 000 files Most users should not nee...

Page 483: ...he value can range from 1 through 20160 The default is 20 Multiple options can be set at once in an options command For example options nfs tcp enable on nfs v2 df_2gb_lim on raid timeout 48 sets nfs tcp enable to on sets nfs v2 df_2gb_lim to on and sets raid timeout to 48 SEE ALSO disk nfsstat snap autosupport options ...

Page 484: ...the filer requests a new password The passwd command imposes no minimum length or special character requirements for root As with any password it is best to choose a password unlikely to be guessed by an intruder All non root administra tive user s password should meet the following restrictions it should be at least 6 characters long it should contain at least two alphabets it should contain at l...

Page 485: ...ne of output for every ECHO_RESPONSE that it receives ping computes the round trip times and packet loss statistics When the count number of pack ets have been sent or if the command is terminated with a C the summary statistics is displayed The default packetsize is 56 which translates into 64 ICMP bytes when combined with the 8 bytes of ICMP header OPTIONS R Record route Includes the RECORD_ROUT...

Page 486: ...You can use any qtree command whether or not quotas are enabled on your filer The qtree command without any arguments displays the attributes of all quota trees on the filer The qtree create command creates a qtree It is equivalent to the quota qtree command If name does not begin with a slash the qtree is created in the root volume To create a qtree in a particular volume specifyname in this form...

Page 487: ...on bits that are at least as restrictive as the Windows NT permissions The filer grants NFS access only if the UNIX style permission bits allow the user access If you change the security style of a qtree or a volume from UNIX to ntfs files created before the change do not have Windows NT per missions For these files the filer uses only the UNIX style permission bits to determine access mixed Some ...

Page 488: ...keting ntfs The following example sets the security style of a qtree named engineering in the vol1 volume to ntfs filer qtree security vol vol1 engr ntfs The following example sets the security style of the root volume to UNIX filer qtree security UNIX The following example sets the security style of the vol1 volume to UNIX filer qtree security vol vol1 UNIX The following example disables oplocks ...

Page 489: ...nd indicates whether quotas are on or off in each volume The following list describes how to use the variousquota commands quota on volume activates quotas in the specified volume based on the contents of etc quotas The volume name may be omitted if the sys tem has only one volume Changing etc quotas has no effect until the next time quota on or quota resize is executed The filer remembers whether...

Page 490: ...updated entries in etc quotas however it will generally ignore newly added entries A newly added entry will only take effect if the corresponding user or group has an active quota as a result of updating a file subject to default quotas quota report prints the current file and space consumption for each user or group with a quota and for each qtree With a path argument quota report displays inform...

Page 491: ...me server on hostname and sets the local date and time to the value returned by the server rdate will time out if the server doesn t respond in 10 seconds rdate can be added to etc rc to automatically synchronize the system time with the time server on each reboot FILES etc rc system initialization command script SEE ALSO date rc rdate ...

Page 492: ... possible be warned to close their open files If you did not use the t option to specify a maximum delay and there are CIFS cli ents with open files the reboot command displays the number of CIFS users and the number of open CIFS files Then it prompts you for the number of min utes to delay CIFS files that are still open at the time the filer halts will lose writes that had been cached but not wri...

Page 493: ...sfully the r key may be used to restore any necessary incremental backups on top of the level 0 Note that restore r will restore all files from the dump tape s An example restore rf rst0a Note that restore leaves a file restore_symboltable in the directory that was dumped to pass information between incremental restore passes This file should be removed when the last incremental has been restored ...

Page 494: ...tinue as best it can DIAGNOSTICS Complains about bad key characters Complains if it gets a read error If y has been specified or the user responds y restore will attempt to continue the restore If a backup was made using more than one tape volume restore will notify the user when it is time to mount the next volume There are numerous consistency checks that can be listed by restore Most checks are...

Page 495: ...ng skipped or the tape is trying to resynchronize then no extracted files have been cor rupted though files may not be found on the tape resync restore skipped num blocks After a dump read error restore may have to resynchronize itself This mes sage lists the number of blocks that were skipped over FILES tmp rstdir file containing directories on the tape tmp rstmode owner mode and time stamps for ...

Page 496: ...s part of INADDR_ANY i e 0 or if the destination is the symbolic name of a network then the route is assumed to be to a network otherwise it is presumed to be a route to a host If the route is to a destination via a gateway the metric parameter should be greater than 0 If metric is set to 0 the gateway given is the address of this host on the common network indicating the interface to be used for ...

Page 497: ...a message of this form network unreachable An attempt to add a route failed because the gateway listed was not on a directly connected network The next hop gateway must be given not in table A delete operation was attempted for an entry which wasn t present in the table entry already exists An add operation was attempted for an existing route entry routing table overflow An add operation was attem...

Page 498: ...s the value to use for highest preference 15 for the least If no value is speci fied metric defaults to the value 1 There can be a maximum of 128 valid entries in the etc dgateways file addi tional ones are ignored but cause an error message Duplicate gateway names or addresses are not allowed only the first one encountered in the file is added to the table and duplicates produce error messages Af...

Page 499: ...n routed is turned off routed status Displays the status of the default gateway list This shows whether RIP snooping is active the current list of default gate ways their metrics the state of the gateways ALIVE or DEAD and the last time each gateway was heard from The output looks like OPTIONS n If this option precedes status the command displays numeric values for gateway names maytag routed stat...

Page 500: ...up dgateways rc DIAGNOSTICS routed unable to allocate free entry too many valid entries were found in the etc dgateways file Only the first 128 are used routed duplicate gateway entry not allowed a duplicate gateway name or address was found in the etc dgateways file Only the first one found is used routed unable to open socket a networking error has prevented routed from ini tializing properly ro...

Page 501: ...se for initial troubleshooting Dell will only need to look at the large core file if the prob lem cannot be determined by examining the small one Before savecore writes out a core image it reads a number from the file etc crash minfree If the number of free kilobytes in the filesystem after saving the core would be less than the number obtained from minfree the core dump is not saved If minfree do...

Page 502: ...c All other NFS clients are granted access only to home If no adminhost is specified then all clients are granted root access to This is not recommended for sites where security is a concern If an adminhost is specified then an additional line is added to the etc hosts file to point the default mailhost to the adminhost If a default gateway is provided to setup it will be used in etc rc to specify...

Page 503: ...Command Reference A 89 SEE ALSO ifconfig reboot dgateways exports hosts hosts equiv resolv conf rc autosupport setup ...

Page 504: ...apping on the affected shelves The shelfchk command terminates as soon as you respond no to the prompt It does not continue to test the other disk shelves A possi ble cause of disk shelf problems is that the cables for the shelves are not connected properly Enter the shelfchk command immediately after you install one or more disk shelves This way if there are any cabling problems you can fix them ...

Page 505: ...finds an error filer shelfchk Only shelves attached to ha 9a should have all LEDs ON Are these LEDs all ON now n Your system may not be configured properly Check cable connections filer Mon Aug 25 11 44 34 GMT rc Disk Configuration Failure Identified by Operator shelfchk ...

Page 506: ...ings at an NFS mount point or at the root of CIFS share Each volume on the filer can have up to 20 snapshots at one time Because of the copy on write technique used to update disk blocks deleting a snapshot will gen erally not free as much space as its size would seem to indicate Blocks in the snapshot may be referenced by other snapshots or by the active file system and thus may be unavailable fo...

Page 507: ... 14 00 00 nightly 0 67 50 0 0 Nov 13 20 00 hourly 1 75 50 0 0 Nov 13 16 00 hourly 2 80 50 0 0 Nov 13 12 00 hourly 3 83 50 1 0 Nov 13 08 00 hourly 4 86 50 1 0 Nov 13 00 00 nightly 1 87 50 1 0 Nov 12 20 00 hourly 5 Volume marketing used total date name 0 0 0 0 Nov 14 08 00 hourly 0 17 16 0 0 Nov 14 00 00 nightly 0 28 16 0 0 Nov 13 20 00 hourly 1 37 16 0 0 Nov 13 16 00 hourly 2 44 16 0 0 Nov 13 12 00...

Page 508: ...g options specifying the option name alone prints the current value of that option variable If the option name is followed by one or more vari ables then the appropriate action to set or delete that variable will be taken Any variable with an inclusive space or tab must be enclosed in single quotes It is recommended that all snmp commands be added to the end of the etc rc file The last snmp comman...

Page 509: ...last snmp command in the filer s etc rc file On a query init will return the value 0 if the SNMP daemon has not yet been initialized Otherwise it will return the value 1 location location Used to set the location name returned by the SNMP agent as the System sysLocation 0 MIB II variable traphost add delete hostname ipaddress To add or delete SNMP managers who will be the recipient of the filer s ...

Page 510: ...p data parser function at the traphost application or a management script to interpret the TRAP name OID value fields and so on EXAMPLES A typical set of snmp commands in the etc rc file will look like the following snmp contact Network Manager snmp location Bldg 2 Lab 3a snmp community add ro private snmp traphost add snmp mgr1 snmp traphost add snmp mgr2 snmp init 1 FILES etc rc startup command ...

Page 511: ...ecified physical slot slot 0 is the system board and slot n is the nth expansion slot on the filer OPTIONS d Displays vital product information for each disk m Displays tape library information To use this option the autoload setting of the tape library must be off when the filer boots r Displays RAID configuration information t Displays device and configuration information for each tape drive v D...

Page 512: ... once every interval sec onds Use control C to stop sysstat EXAMPLE This is an example of sysstat running on a lightly loaded NFS only filer From left to right the columns indicate CPU the percentage CPU utilization during the previous interval seconds filer sysstat 1 CPU NFS CIFS HTTP Net kB s Disk kB s Tape kB s Cache in out read write read write age 5 82 0 0 15 17 16 0 0 0 8 6 105 0 0 24 98 100...

Page 513: ...of the server Disk kB s the kilobytes per second of disk traffic being read and written Tape kB s the number of kilobytes per second of tape traffic being read and written Cache age the age in minutes of the oldest read only blocks in the buffer cache Data in this column indicates how fast read operations are cycling through system memory when the filer is reading very large files larger than the ...

Page 514: ...ne name is printed Each timezone is described by a file that is kept in the etc zoneinfo directory on the filer The name argument is actually the name of the file under etc zoneinfo that describes the timezone to use For instance the name America Los_Angeles refers to the timezone file etc zoneinfo America Los_Angeles These files are in standard Arthur Olson timezone file format as used on many fl...

Page 515: ...ength of time the system has been up and the total number of NFS operations the system has performed since it was last booted The filer runs uptime automatically once an hour and automatically logs its out put to etc messages EXAMPLE filer uptime 8 54am up 2 days 22 23 3122520 NFS ops SEE ALSO netstat nfsstat sysstat messages uptime ...

Page 516: ...eradd option have the same privilege level as root Optionally any comment about the user being added could be provided Com ments about the user should be no longer than 128 characters and should not contain the character colon When users are added they are prompted for the password twice The password is case sensitive and it has the following restrictions it should be at least 6 characters long it...

Page 517: ...03 NAME version display Data ONTAP 5 3 version SYNOPSIS version DESCRIPTION version displays the version of Data ONTAP 5 3 running on the server and the date when the version was created SEE ALSO download sysconfig version ...

Page 518: ... network card However some Ethernet switches or routers require that all Ethernet interfaces forming a virtual interface be either half duplex or full duplex Check the documentation that comes with your Ether net switch or router to see whether you need to configure the filer Ethernet interfaces to be half duplex or full duplex The vif destroy command eliminates an existing virtual interface You m...

Page 519: ... e5c e5b e5a In Out In Out In Out In Out 8637076 47801540 158 159 7023083 38300325 8477195 47223431 1617 9588 0 0 634 3708 919 5400 1009 5928 0 0 925 5407 1246 7380 1269 7506 0 0 862 5040 1302 7710 1293 7632 0 0 761 4416 964 5676 920 5388 0 0 721 4188 981 5784 1098 6462 0 0 988 5772 1003 5898 2212 13176 0 0 769 4500 1216 7185 1315 7776 0 0 743 4320 530 3108 vif ...

Page 520: ...o 23 volumes on each filer The r raidsize argument specifies the maximum number of disks in each RAID group in the volume The maximum value of raidsize is 28 The default value is 14 ndisks is the number of disks in the volume including the parity disks The disks in this newly created volume come from the pool of spare disks The smallest disks in this pool join the volume first unless you specify t...

Page 521: ...vol lang volname displays the language of the specified volume vol lang volname language_code sets the language of volume volname to the language specified by language_code vol rename volname newname renames the volume named volname to the name newname If the volume named volname is referenced in the etc exports file remember to make the name change in etc exports also so that the affected file sy...

Page 522: ...tion on another volume raidsize number The value of this option is the maximum size of a RAID group within the vol ume Changing the value of this option will not cause existing RAID groups to grow or shrink it will only affect whether more disks will be added to the last existing RAID group and how large new RAID groups will be minra on off If this option is on the filer performs minimal read ahea...

Page 523: ...sconfig d com mand The l flag displays for each volume on a filer the name of the volume the language code and language being used by the volume vol copy start S s source destination copies all data including the snap shots from one volume to another If you use the S flag the command copies all snapshots in the source volume to the destination volume To specify a particular snapshot to copy use th...

Page 524: ...rformance of the volume copy operation The value ranges from 10 full speed to 1 one tenth of full speed You can apply the perfor mance value to an operation specified by the operation_number parameter If you do not specify an operation number in the vol copy throttle com mand the command applies to all volume copy operations Use this command to limit the speed of the volume copy operation if you s...

Page 525: ...sks which belong to one RAID group The second command specifies that if any disks are subsequently added to this volume they will not cause any current RAID group to have more than five disks Each existing RAID group will continue to have 10 disks and no more disks will be added to that RAID group When new RAID groups are created they will have a maximum size of five disks vol options vol1 root Th...

Page 526: ...or and Command Reference Guide vol copy status displays the status of all the volume copy operations vol copy abort 1 terminates volume copy operation 1 vol copy throttle 1 10 changes volume copy operation 1 to one tenth of its full speed SEE ALSO sysconfig vol ...

Page 527: ...enabled SYNOPSIS ypwhich DESCRIPTION ypwhich prints the name of the current NIS server if NIS is enabled If there is no entry for the server itself in the hosts database then it prints the IP address of the server The NIS server is dynamically chosen by the filer ypwhich ...

Page 528: ...A 114 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide LOH RUPDWV This section contains file formats ...

Page 529: ...wind the tape volume to beginning of tape on close rst the rst portion of the device name is always present and specifies that you are requesting a SCSI tape device u the logical unit number of the tape drive to use d the density or format to use for tape write operations The density specifications for an Exabyte 8505 8mm drive are l Exabyte 8200 format no compression m Exabyte 8200 format with co...

Page 530: ...m unload reload device format is EXB 8200C w compression rst0h rewind device format is EXB 8500 5 0GB nrst0h no rewind device format is EXB 8500 5 0GB urst0h unload reload device format is EXB 8500 5 0GB rst0a rewind device format is EXB 8500C w compression nrst0a no rewind device format is EXB 8500C w compression urst0a unload reload device format is EXB 8500C w compression tape ...

Page 531: ...Command ReferenceA 117 ...

Page 532: ...A 118 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide HDGHUV 7DVNV DQG 0DFURV This section contains headers tasks and macros ...

Page 533: ...nload copies these files from etc boot into the filer s boot block from which the system boots FILES etc boot directory of Data ONTAP 5 3 executables etc boot netapp alpha symbolic link to current version of Data ONTAP 5 3 for filers with Alpha processors etc boot fc hard alpha boot FCode for filers with Alpha processors etc boot 1 alpha second stage boot code for filers with Alpha processors SEE ...

Page 534: ...h directory The core files are very useful for finding and fixing bugs in Data ONTAP 5 3 so notify Dell technical support of any core files on your filer See savecore for more details about how core files are saved FILES etc crash core saved core files etc crash core small compact core file etc crash bounds suffix for next core file etc crash minfree free KB in FS to maintain after savecore SEE AL...

Page 535: ...nce weighting of the gateway 1 is the value to use for highest preference 15 for the least If no value is specified met ric will default to the value 1 There can be a maximum of 128 valid entries in the etc dgateways file addi tional ones will be ignored with an error message being displayed Duplicate gateway names or addresses are not allowed only the first one encountered in the file will be add...

Page 536: ...mpdates contains the subtree dumped the dump level and the creation date of the snapshot used by dump There is only one entry per subtree at a given dump level dumpdates may be edited to change any of the fields if necessary EXAMPLE This shows the dumpdate file for a system on which home and export are backed up using dump home 0 Tue Nov 2 10 56 27 1993 export 0 Tue Nov 2 13 51 17 1993 export 1 Tu...

Page 537: ...ss to each host listed Alternatively you can specify a net group instead of a host in the list The netgroup must be defined in the etc netgroup file Whether the hosts can mount pathname with root access read and write access or read only access depends on how you use the root rw and ro options as described below anon uid If a request comes from user ID of 0 root user ID on the client use uid as th...

Page 538: ...tmask field is the netmask In UNIX it is illegal to export a directory that has an exported ancestor in the same file system Data ONTAP 5 3 does not have this restriction For example you can export both the directory and the home directory In determining per missions the filer uses the longest matching prefix EXAMPLES In the following example all network clients can mount the home directory but on...

Page 539: ...ed fields groupname The name of the group password The group s password in an encrypted form This field may be empty gid An interger representing the group each group is assigned a unique integer user list The user list is a comma separated list of users allowed in the group EXAMPLE Here is a sample group file project asderghuIoiyw 12 dan dave myproject 11 steve jerry SEE ALSO nis nsswitch conf qu...

Page 540: ...and or tab characters A indi cates the beginning of a comment characters up to the end of the line are not interpreted by routines which search the file This file may be created from the official host data base maintained at the Net work Information Control Center NIC though local changes may be required to bring it up to date regarding unofficial aliases and or unknown hosts Network addresses are...

Page 541: ...al If the host on which you enter the filer command is a PC you must enter the user name for that PC in the etc hosts equiv file If you do not specify a user name for a UNIX host you must be root on that host to execute a filer command through rsh When you use an rsh application on your PC to issue a filer command specify that you are entering the command as root If multiple users on the same host...

Page 542: ...ted by NCSA and Apache You can copy an existing NCSA or Apache access to the filer without editing or reformatting SYNTAX The supported directives are Directory directory_name Directory AuthName Title phrase require user user_id user_id require group group_id group_id where Title phrase is a word or phrase that is passed to the authentication dialog as a title for the dialog that prompts the user ...

Page 543: ...f the users whose IDs are user1 user2 user3 and user4 The authentication dialog is titled Dell Directory home htdocs private storage AuthName Dell Limit GET require group group1 Limit GET Directory In this example group1 is defined by the following entry in etc httpd group group1 user1 user2 user3 user4 SEE ALSO httpd passwd httpd group httpd access ...

Page 544: ... HTTP access groups and their members SYNOPSIS etc httpd group DESCRIPTION The file declares the names of groups and the user IDs of the members of each group for use by the HTTP daemon in executing the access controls declared in etc httpd access SYNTAX group_id1 user_id1 user_id2 SEE ALSO httpd access httpd group ...

Page 545: ...ssociated with the given virtual host for IP level virtual hosting If you specify a name the virtual host root directory is associated with the virtual host with that name using HTTP level virtual hosting If the filer can resolve that name to an IP address which is used for an IP level host alias see the alias option in ifconfig the filer uses that IP address in the same way as it would if you spe...

Page 546: ... This field is always date The time and date the request was is reported in the format Day Mon Year HH MM SS which is logged in universal time GMT rather than the local time zone request A quoted string is recorded for the method request type and file involved in the request result The status code for the request bytes The size of the file in bytes Possible values for result codes include 200 Succ...

Page 547: ...he mapping of filename suffixes to MIME Content Type The format of each line is suffix Content Type Comments are introduced with a The filer is not shipped with the etc httpd mimetypes file Instead the filer s system files include a sample file named etc httpd mimetypes sample Before you start using HTTP make a copy of etc httpd mimetypes sample and name the copy etc httpd mimetypes If the file et...

Page 548: ...word is encrypted in the regular UNIX style User of NCSA or Apache can use their htpasswd program to generate the user_id passwd pair The HTTP access control does not use the existing CIFS password database on the filer because in http basic authentication in each request for protected pages the value of passwd is sent over the network in clear text and without encryption would compromise the user...

Page 549: ...es template is granted access and no further rule processing occurs An optional result can be used in place of the matching URL Fail template Any request which matches template is denied access Rule processing stops after a matched Fail Both templates and results may contain wildcards a star character The wildcard behaves like a shell wildcard in the template string matching zero or more character...

Page 550: ...mon see syslogd is to print all log ging messages of priority info or higher to the console and to the messages file Every Saturday at 24 00 etc messages is moved to etc messages 0 etc messages 0 is moved to etc messages 1 and so on Message files are saved for a total of six weeks FILES etc messages messages file for current week etc messages 0 5 messages file for previous weeks SEE ALSO syslogd s...

Page 551: ...n etc exports see exports the username entry is ignored The domain_name field refers to the domain in which the net group entry is valid It must either be empty or be the local domain otherwise the netgroup entry is ignored This allows a single etc netgroup file to be used for filers in multiple domains EXAMPLE This is a typical netgroup file trusted_hosts adminhost group1 group2 group3 untrusted_...

Page 552: ...e end of the line are not interpreted by routines which search the file This file is normally created from the official network data base maintained at the Network Information Control Center NIC though local changes may be required to bring it up to date regard ing unofficial aliases and or unknown networks Network number may be specified in the conventional dot notation or as a 32 bit integer Num...

Page 553: ...pported They are local files in the etc directory NIS and DNS The maps or databases that are supported are hosts passwd shadows group and netgroups Each line has the form map order of name services For example hosts files nis dns passwd files nis When trying to resolve a name the services are contacted one by one as per the order specified until the name is successfully resolved A name resolution ...

Page 554: ...tween 0 and 32767 gid An integer representing the group to which the user has been assigned Groups are created by the UNIX system administrator each is assigned a unique integer whose value is generally between 0 and 32767 gcos field The user s real name The name may be of any length it may include capital letters as well as lower case and may include blanks The name may be empty home_directory Th...

Page 555: ...Command Reference A 141 dan 2345 23 Dan jim SEE ALSO shadow options nis nsswitch conf quota cifs_access cifs_setup passwd ...

Page 556: ...ser lfine to 500 MB of disk space in the home volume but places no restriction on the number of files he can have You can leave the file limit blank to indicate that no limit is imposed but you cannot omit the value for disk space The third line places no restriction on either disk usage or file usage by using a limit field of This may be useful for tracking usage on a per user or per group basis ...

Page 557: ...the vol vol0 export tree Similarly the group stooges has been limited to 100 MB of disk space and 10 240 files under the vol vol0 export tree In any operation that creates files or writes to them all applicable quotas must be satisfied For example the user mhoward can write to a file in the vol vol0 export tree if all of these requirements are met his total disk usage in the root volume does not e...

Page 558: ...A 144 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide SEE ALSO qtree quota rquotad quotas ...

Page 559: ...Alternately you can use the setup command to generate a new etc rc file without using NFS EXAMPLE This is a sample etc rc file as generated by setup Auto generated by setup Tue Jun 2 21 23 52 GMT 1994 hostname filer dell com ifconfig e0 hostname 0 ifconfig e1a hostname 1 route add default MyRouterBox 1 routed on timezone US Central savecore exportfs a nfs on FILES etc rc SEE ALSO exportfs exports ...

Page 560: ...rying all the name servers until a maximum number of retries are made search domain list This specifies the search list for host name lookup The search list is normally determined from the local domain name by default it begins with the local domain name then successive parent domains that have at least two components in their names This may be changed by listing the desired domain search path fol...

Page 561: ...ent mount points can be obtained by using the MOUNTPROC_DUMP remote procedure call or by using the UNIX showmount command When the server successfully executes a mount request from a cli ent the server appends a new entry to the file When the client issues an unmount request the corresponding entry is marked as unused When the server reboots unused entries are deleted from the file rmtab ...

Page 562: ...CRIPTION The file etc serialnum should contain the serial number of your machine The serial number is found on the back of the machine in the lower right hand corner If the file does not exist on your system create it and put the machine s serial number in it The file should contain a single line that only has the serial number FILES etc serialnum serialnum ...

Page 563: ...ing entry with the same user name but a non empty encrypted password username password The following list explains the required fields username The user s login name not more than eight characters password The user s password in an encrypted form that is generated by the UNIX passwd function There can be other fields in the etc shadow file following the after the password EXAMPLE Here is a sample ...

Page 564: ...apshots should be kept on line the third how many daily and the fourth how many hourly If an argument is left off or set to zero then no snapshot of the corresponding type is created Daily snapshots are created at 24 00 of each day except Sunday and weekly snap shots are created at 24 00 on Sunday Only one snapshot is created at a time If a weekly snapshot is being created for instance no daily or...

Page 565: ...percent argument prints the percentage of disk space that is reserved for snapshots in the indicated vol ume With no argument the snap reserve command prints the percentage of disk space reserved for snapshots for each of the volumes in the system Reserve space can be used only by snapshots and not by the active file system SEE ALSO df sm ...

Page 566: ...llow file exists on the source filer used for SnapMirror It contains a list of filers to which you can replicate volumes from the source filer If the source volume and the mirror exist on the same filer you still must enter the filer name in this file In this file type one filer name per line EXAMPLE The following snapmirror allow file on filerA allows both filerB and filerC to rep licate volumes ...

Page 567: ...ed at which data is transferred which is specified in kbs kilobytes per second Enter a value greater than or equal to 11 By default the filer transfers the data as fast as it can To accept the default specify a dash schedule the schedule used by the destination filer for updating the mir ror The schedule contains four fields minute hour day of month and day of week The fields are separated from ea...

Page 568: ... s a short descrip tion of each facil_ity keyword kern Messages generated by the filer kernel daemon System daemons such as the rshd daemon see rshd the routing daemon see routed the SNMP daemon see snmpd etc auth The authentication system e g messages logged for Telnet sessions cron The system s internal cron facility The level describes the severity of the message and is a keyword from the fol l...

Page 569: ...e are four forms A pathname beginning with a leading slash Selected messages are appended to the specified file A hostname preceded by an at sign Selected messages are for warded to the syslogd daemon on the named host dev console Selected messages are written to the console An asterisk Selected messages are written to the console Blank lines and lines whose first non blank character is a pound ch...

Page 570: ...ministrator and Command Reference Guide Also see the sample configuration file in etc syslog conf sample FILES etc syslog conf The syslogd configuration file etc syslog conf sample Sample syslogd configuration file SEE ALSO syslogd messages syslog conf ...

Page 571: ... transition time at which the rules for computing local time change Next come tzh_timecnt one byte unsigned values each one tells which of the differ ent types of local time types described in the file is associated with the same indexed transition time These values serve as indices into an array of structures that appears next in the file these structures are written as a four byte signed tt_gmto...

Page 572: ...Savings Time On the other hand a time specified in wall clock time takes the prevailing value of Daylight Savings Time in to account Finally there are tzh_ttisgmtcnt GMT local indicators each stored as a one byte value they tell whether the transition times associated with local time types were specified as GMT or local time SEE ALSO timezone zoneinfo ...

Page 573: ...Command Reference A 159 6 VWHP 6HUYLFHV DQG DHPRQV This section contains system services and daemons ...

Page 574: ...voked to send the information through the options command Autosupport mail will also be sent on events that require corrective action from the system administra tor And finally the autosupport mechanism will send notification upon system reboot from disk The subject line of the mail sent by the autosupport mechanism contains a text string to identify the reason for the notification The messages an...

Page 575: ...ds the short note mail The setup command does the following for the autosupport feature If an adminhost is specified it adds an entry for mailhost with the same address as the adminhost to the etc hosts file The following information is sent 1 Generation date and time stamp 2 Software version 3 System ID 4 Hostname 5 SNMP contact name if specified 6 SNMP location if specified 7 Output from sysconf...

Page 576: ...tc rc with the command options autosupport enable off autosupport mailhost Default is mailhost Enter the list of mailhosts separated by and no spaces Up to 5 hosts will be accepted The autosupport mechanism will try to contact each listed host in turn until it gets a successful SMTP connection The default mailhost address is set to the adminhost address in etc hosts with a com mand such as options...

Page 577: ...port doit SYSTEM_INFO Error conditions are logged through syslog at level LOG_ERR SEE ALSO options setup hosts rc NOTES The autosupport mechanism is enabled by default When the system boots it will enable the feature If for security or other reasons you wish to disable this fea ture you should add a line in etc rc to disable it options autosupport enable off If you do keep autosupport enabled reme...

Page 578: ...ation files as described below If DNS is enabled by running the setup command then the DNS domain name needs to be entered Enabling DNS without the setup command 1 Create the etc resolv conf file see resolv conf with up to 3 nameservers Each line contains the keyword nameserver followed by the IP address of the server For example nameserver 192 9 200 1 nameserver 192 9 201 1 nameserver 192 9 202 1...

Page 579: ... consult the etc hosts file If the host name is not found in the local file it will then try the NIS service If the host name is still not found then it will attempt a DNS lookup The NIS client can be enabled on the filer by running the setup command see setup or by manually editing the configuration files as described below If NIS is enabled by running the setup command then the NIS domain name n...

Page 580: ...forms the commands then responds with a status indication This protocol is provided by rmt commands on many UNIX systems although UNIX systems may support more commands and may give more different error codes All responses are in ASCII and in one of two forms Successful commands have responses of Anumber n number is an ASCII representation of a decimal number Unsuccessful com mands are responded t...

Page 581: ...nt n Write data onto the open device If count exceeds the maximum data buffer size 64 kilobytes it is truncated to that size etc rmt then reads count bytes from the connection aborting if a premature end of file is encoun tered The response value is the number of bytes written if the write succeeds or 1 if the write fails Rcount n Read count bytes of data from the open device If count exceeds the ...

Page 582: ... Reference Guide 5 rewind the tape 6 rewind and unload the tape The return value is the count parameter when the operation is successful Any other command causes etc rmt to close the connection DIAGNOSTICS All responses are of the form described above SEE ALSO tape rshd rmt ...

Page 583: ...and Reference A 169 NAME rquotad remote quota server DESCRIPTION The filer supports the remote quota service that allows NFS clients to determine their quota allocation on the server SEE ALSO quota rquotad ...

Page 584: ...hosts equiv file controls which hosts have access to the filer remote shell The hosts listed in the etc hosts equiv file are called trusted hosts The filer accepts commands from the filer s administrative users only if the com mands are entered through a remote shell To see a list of filer commands that can be executed through rsh enter the rsh command on the trusted host EXAMPLE The following exa...

Page 585: ...B provides a means to obtain detailed information about many aspects of filer operation via SNMP The following is a summary of the top level groups in the Custom MIB and the information they contain product Product level information such as the software version string and system ID sysStat System level statistics such as CPU uptime idle time and aggregate kilo bytes received and transmitted on all...

Page 586: ...0N 740N and 760N System Administrator and Command Reference Guide raid Information on RAID equivalent to the output of the sysconfig r command see sysconfig SEE ALSO df maxfiles nfsstat options quota snap snmp sysconfig snmpd ...

Page 587: ...he files etc messages 0 through etc messages 5 This rotation is done once a week So the log messages of the current week will be saved in the file etc messages and the message logs of the six weeks prior to that are saved in the files etc messages 0 through etc messages 5 To prevent large numbers of repeated messages being logged thesyslogd dae mon will follow the first instance of a repeated mess...

Page 588: ...A 174 Dell PowerVault 720N 740N and 760N System Administrator and Command Reference Guide ...

Page 589: ...p program you can configure the filer to work with other clients in the same way as it does with the administra tion host DXWKHQWLFDWLRQ A security step performed by a domain controller for the filer s domain or by the filer itself using its etc passwd file DXWRVXSSRUW A filer daemon that triggers e mail mes sages from the customer site to a specified e mail recipient when there is a potential fil...

Page 590: ... The process of adding removing or replacing a disk while the filer is running KRW VZDS DGDSWHU An expansion card that makes it possible to add or remove a hard disk with mini mal interruption to file system activity LQRGH A data structure containing information about files on a filer and in a UNIX file system LQWHUUXSW VZLWFK A switch on some filer front panels used for debugging purposes PDJLF G...

Page 591: ...the quota qtree command 5 Redundant arrays of independent disks A technique that protects against disk failure by computing parity information based on the contents of all the disks in the array The filer uses RAID Level 4 which stores all parity information on a single disk 5 GLVN VFUXEELQJ The process in which the system reads each disk in the RAID group and tries to fix media errors by rewritin...

Page 592: ...ct disk usage by files with a given UID or GID 8 User identification number 8QLFRGH A 16 bit character set standard It was designed and is maintained by the non profit consortium Unicode Inc 9 DGDSWHU Expansion card for attaching a VGA ter minal as the console Write Anywhere File Layout The WAFL file system was designed for the Dell filer to optimize write performance 16 Windows Internet Name Serv...

Page 593: ...on 19 2 autosupport from option 19 2 autosupport mailhost option 19 2 autosupport noteto option 19 3 backup amount of data 12 7 data format 12 5 data not in qtrees 12 15 devices 12 3 excluding files 12 15 incremental 12 4 metadata 12 2 name in the etc dumpdates file 12 14 qtrees 12 7 reasons for 12 1 specifying files and directories 12 14 use of nonqualified tape drives 12 10 Windows NT ACL inform...

Page 594: ...26 lost record event detail display 7 28 oplocks 7 33 options 19 3 restoring files 13 2 rsh use to enter filer commands 7 7 session information displaying 7 35 CIFS continued shares changing description 7 16 creating and changing 7 12 deleting 7 17 displaying 7 10 displaying information 7 15 renaming volume effect on 7 1 statistics displaying 7 34 symbolic links 5 2 system ACL SACL setting 7 30 UN...

Page 595: ...ssibility 18 10 lost passwords 18 11 with etc rc file 18 10 console encoding setting 5 11 console encoding option 5 11 19 18 copying a volume changing the speed of 15 10 how to stop 15 10 possible errors during 15 8 copying a volume continued recommendation for 15 4 requirements for 15 3 copy on write technique 9 1 9 3 cpio copying files with 18 17 creating nvfail_rename file 4 31 creating and cha...

Page 596: ...custom MIB 4 4 installing new 3 10 management tasks 3 9 maximum number of files 11 10 parity 1 6 3 1 problems 18 5 quotas 4 4 9 11 11 1 removing 3 10 restricting usage 11 1 SCSI ID number 3 2 setting size of RAID group 3 9 snapshots space used 9 3 disks continued spare 1 6 swapping 3 11 usable space 3 4 DNS disabling 4 10 enabling 4 9 options 19 7 querying the name server 4 9 resolving names with ...

Page 597: ...3 3 filer description changing and viewing 7 2 restarting 18 3 filer information overall displaying 17 2 filer main unit components 1 3 filer system load systat command 3 6 FilerView use for filer administration 1 3 files copying with cpio 18 17 large 4 1 maximum size 4 1 same file criteria 9 2 setting maximum number of 11 10 working with large 4 1 filestats command 3 15 firewall virtual 8 5 gener...

Page 598: ...s are sent and received 4 14 using ifconfig to configure 4 15 invalid volume name message 18 5 IP addresses setting using ifconfig 4 15 ip match_any_ifaddr option 19 18 ip path_mtu_discovery enable option 19 18 languages supported list 5 9 large files 4 1 LCD filer main unit 1 4 legal characters in file names 5 6 local groups CIFS adding to filer 7 6 localhost 15 4 lost data from disk failures 18 ...

Page 599: ... networks continued network mask configuring using ifconfig 4 15 problems with 18 12 statistics 18 12 using ifconfig to configure 4 15 NFS how interfaces respond to packets 4 14 options 19 9 problems with 18 14 statistics in custom MIB 4 3 statistics displaying nfsstat command 6 1 6 15 NFS guest access 7 8 NFS over UDP requests 4 14 nfs big_endianize_fileid option 17 9 nfs mount_rootonly option 19...

Page 600: ...aliases 19 5 cifs oplocks enable 7 34 19 4 cifs save_case 5 15 options cifs scopeid 19 5 cifs show_snapshot 19 6 cifs symlinks cycleguard 5 4 19 6 cifs symlinks enable 5 3 19 7 console encoding 5 11 dns domainname 19 7 dns enable 19 7 httpd admin enable 19 8 httpd enable 8 1 19 8 httpd log max_file_size 8 1 19 8 httpd rootdir 8 1 8 6 19 8 httpd timeout 19 9 httpd timewait enable 19 9 ip path_mtu_d...

Page 601: ...mirror 16 6 resizing 11 6 quotas disk information available through SNMP 4 4 information available through the custom MIB 4 4 5 RAID 3 6 RAID Redundant Array of Independent Disks accessing information through SNMP 4 4 data reconstruction speed 3 6 disk scrubbing 3 3 displaying information about 17 1 group size characteristics 3 2 groups 1 6 3 1 information in the custom MIB 4 4 options 19 12 spare...

Page 602: ...on Protocol RIP 4 12 routing table filer 4 12 rsh enable option 19 19 6 SCSI ID identifying disks 3 2 second level virtual interfaces creating 4 25 serial ports filer main unit 1 5 shares creating and changing 7 12 deleting 7 17 displaying 7 10 displaying information about 7 15 renaming volume effect on 7 1 single mode trunk creating 4 23 single mode trunks 4 19 preferred links 4 23 slots filer ma...

Page 603: ...le option 19 19 spare disks in RAID groups 3 1 subnets exporting to 6 11 swapping out disks 3 11 symbolic links CIFS 5 2 sysconfig command filer configuration 17 1 hot spare disk availability 3 6 sysconfig d command 17 1 sysconfig m command 14 2 sysconfig r command 17 1 sysconfig t command 17 2 sysconfig v command 18 1 sysstat command 17 3 for filer system load 3 6 system ACL SACL setting 7 30 Sys...

Page 604: ...rements 4 20 physical interfaces adding 4 26 single mode 4 19 statistics displaying 4 28 status displaying 4 27 trusted host 15 4 8 UNIX access to NTFS files 5 16 UNIX file access detail displays CIFS 7 28 unrecognized volume name message 18 5 unsuccessful file access detail display CIFS 7 28 uptime command 17 4 URL how filer translates 8 8 usable space on disks 3 4 user quotas creating 11 7 users...

Page 605: ...r to regular 16 15 creating 3 11 defined 1 6 destroying 3 14 volumes continued differences between mirror and regular 16 3 displaying file statistics 3 15 displaying information about 17 2 displaying language use 5 13 displaying state information 17 2 error message about invalid names 18 5 handling failures 3 14 making inactive 3 13 monitoring status 3 12 mounting 3 7 naming conventions 3 6 proble...

Page 606: ...nistrator and Command Reference Guide warnings for disk failures 3 5 wcc command 5 17 WebNFS 6 1 6 12 weekly snapshots 9 5 Windows file access detail displays CIFS event 7 27 Windows NT commands performing Windows filer tasks 1 3 ypwhich command 4 11 ...

Reviews: